Kelp DAO | rsETH - codynhat's results

A collective DAO designed to unlock liquidity, DeFi and higher rewards for restaked assets through liquid restaking.

General Information

Platform: Code4rena

Start Date: 10/11/2023

Pot Size: $28,000 USDC

Total HM: 5

Participants: 185

Period: 5 days

Judge: 0xDjango

Id: 305

League: ETH

Kelp DAO

Findings Distribution

Researcher Performance

Rank: 152/185

Findings: 1

Award: $2.76

QA:
grade-b

🌟 Selected for report: 0

🚀 Solo Findings: 0

Awards

2.7592 USDC - $2.76

Labels

bug
downgraded by judge
grade-b
insufficient quality report
QA (Quality Assurance)
duplicate-38
Q-94

External Links

Lines of code

https://github.com/code-423n4/2023-11-kelp/blob/main/src/LRTConfig.sol#L73 https://github.com/code-423n4/2023-11-kelp/blob/main/src/LRTDepositPool.sol#L79

Vulnerability details

Impact

In LRTConfig.sol, the MANAGER role can add new supported assets, but they cannot be removed once added.

https://github.com/code-423n4/2023-11-kelp/blob/main/src/LRTConfig.sol#L73

If an asset is vulnerable, malicious, or added by mistake, it could result in a permanent denial of service by disabling asset deposits on LRTDepositPool.sol. Allowing supported assets to be removed prevents the denial of service from being permanent.

This is medium severity due to having an external requirement.

Proof of Concept

If one of the balanceOf external calls in LRTDepositPool.getAssetDistributionData(address) fails, depositing assets will be disabled.

https://github.com/code-423n4/2023-11-kelp/blob/main/src/LRTDepositPool.sol#L79

This can be done by an ERC20 contract that simply reverts in the balanceOf(address) function.

Tools Used

Manual review

A function in LRTConfig should allow either the MANAGER or DEFAULT_ADMIN_ROLE roles to remove a supported asset if it is found to have an issue.

Assessed type

DoS

#0 - c4-pre-sort

2023-11-16T02:59:17Z

raymondfam marked the issue as insufficient quality report

#1 - c4-pre-sort

2023-11-16T02:59:27Z

raymondfam marked the issue as duplicate of #38

#2 - c4-judge

2023-12-01T17:45:49Z

fatherGoose1 changed the severity to QA (Quality Assurance)

#3 - c4-judge

2023-12-01T17:46:53Z

fatherGoose1 marked the issue as grade-b

AuditHub

A portfolio for auditors, a security profile for protocols, a hub for web3 security.

Built bymalatrax © 2024

Auditors

Browse

Contests

Browse

Get in touch

ContactTwitter