The Wildcat Protocol - _nd_koo's results

Banking, but worse - a protocol for fixed-rate, undercollateralised credit facilities.

General Information

Platform: Code4rena

Start Date: 16/10/2023

Pot Size: $60,500 USDC

Total HM: 16

Participants: 131

Period: 10 days

Judge: 0xTheC0der

Total Solo HM: 3

Id: 296

League: ETH

Wildcat Protocol

Findings Distribution

Researcher Performance

Rank: 117/131

Findings: 1

Award: $0.06

🌟 Selected for report: 0

🚀 Solo Findings: 0

Lines of code

https://github.com/code-423n4/2023-10-wildcat/blob/main/src/market/WildcatMarket.sol#L142

Vulnerability details

Impact

The WildcatMarket.sol#closeMarket function is restricted by the onlyController modifier, ensuring that only the controller can invoke this function. However, the WildcatMarketController.sol contract lacks an implementation of a function that would trigger closeMarket. Consequently, borrowers are unable to exit the current market.

Proof of Concept

There is no function within the controller that invokes the closeMarket function of the market contract. Image: https://github.com/ndkoo/dalgarim/assets/21157356/9e03d8ca-50d2-46e3-af76-3d61c0af0e61

Tools Used

Manual review.

Introduce a function in the WildcatMarketController.sol contract that calls the closeMarket function of the market contract.

Assessed type

Access Control

#0 - c4-pre-sort

2023-10-27T07:17:29Z

minhquanym marked the issue as duplicate of #147

#1 - c4-judge

2023-11-07T13:53:20Z

MarioPoneder changed the severity to 2 (Med Risk)

#2 - c4-judge

2023-11-07T14:04:25Z

MarioPoneder marked the issue as partial-50

#3 - c4-judge

2023-11-07T14:16:53Z

MarioPoneder changed the severity to 3 (High Risk)

AuditHub

A portfolio for auditors, a security profile for protocols, a hub for web3 security.

Built bymalatrax © 2024

Auditors

Browse

Contests

Browse

Get in touch

ContactTwitter