Maia DAO Ecosystem - Oxsadeeq's results

Efficient liquidity renting and management across chains with Curvenized Uniswap V3.

General Information

Platform: Code4rena

Start Date: 30/05/2023

Pot Size: $300,500 USDC

Total HM: 79

Participants: 101

Period: about 1 month

Judge: Trust

Total Solo HM: 36

Id: 242

League: ETH

Maia DAO Ecosystem

Findings Distribution

Researcher Performance

Rank: 99/101

Findings: 1

Award: $5.20

🌟 Selected for report: 0

🚀 Solo Findings: 0

Awards

5.2022 USDC - $5.20

Labels

bug
2 (Med Risk)
downgraded by judge
partial-50
duplicate-577

External Links

Lines of code

https://github.com/code-423n4/2023-05-maia/blob/main/src/talos/base/TalosBaseStrategy.sol#L182

Vulnerability details

Impact

Detailed description of the impact of this finding. When depositiing liquidity to a position or initializing a position,WithdrawingAll liqudity from a position the Amount0Min and Amount1Min are hardcoded to 0.When depositing/initializing setting minimum values to zero means that the minimum amount of token1 and token0 that should be taken from the protocol should be Zero, this could easily exploited by Mev attacks to make profit same with the withdrawal means the agreeable minimum value accepted by the protocol should be Zero.Mev bots could easily make some money due to the absence of slippage protection in the trade.

Proof of Concept

Provide direct links to all referenced code in GitHub. Add screenshots, logs, or any other relevant proof that illustrates the concept. (_tokenId, _liquidity, amount0, amount1) = _nonfungiblePositionManager.mint( INonfungiblePositionManager.MintParams({ token0: address(_token0), token1: address(_token1), fee: poolFee, tickLower: tickLower, tickUpper: tickUpper, amount0Desired: amount0Desired, amount1Desired: amount1Desired, amount0Min: 0, amount1Min: 0, recipient: address(this), deadline: block.timestamp }) );

Tools Used:Manual Review

Assessed type

MEV

#0 - c4-judge

2023-07-10T14:05:09Z

trust1995 marked the issue as duplicate of #828

#1 - c4-judge

2023-07-10T14:05:15Z

trust1995 marked the issue as partial-50

#2 - c4-judge

2023-07-11T17:03:23Z

trust1995 marked the issue as duplicate of #177

#3 - c4-judge

2023-07-11T17:04:19Z

trust1995 changed the severity to 3 (High Risk)

#4 - c4-judge

2023-07-25T08:54:03Z

trust1995 changed the severity to 2 (Med Risk)

AuditHub

A portfolio for auditors, a security profile for protocols, a hub for web3 security.

Built bymalatrax © 2024

Auditors

Browse

Contests

Browse

Get in touch

ContactTwitter