Swivel contest - nikitastupin's results

The Decentralized Protocol For Fixed-Rate Lending & Tokenized Cash-Flows.

General Information

Platform: Code4rena

Start Date: 30/09/2021

Pot Size: $75,000 ETH

Total HM: 9

Participants: 15

Period: 7 days

Judge: 0xean

Total Solo HM: 2

Id: 39

League: ETH

Swivel

Findings Distribution

Researcher Performance

Rank: 9/15

Findings: 3

Award: $2,275.36

🌟 Selected for report: 0

🚀 Solo Findings: 0

Findings Information

🌟 Selected for report: 0xsanson

Also found by: 0xRajeev, GalloDaSballo, JMukesh, cmichel, defsec, leastwood, loop, nikitastupin, pants, pauliax

Labels

bug
duplicate
3 (High Risk)

Awards

0.1048 ETH - $310.65

External Links

Handle

nikitastupin

Vulnerability details

The return value of multiple external transfer / transferFrom calls is not checked. At least at these lines:

Impact

Some tokens do not revert in case of failure and return false instead. If one of these tokens is used in Swivel, it may lead to free minting of n- and zc- tokens.

Use SafeERC20, or ensure that the transfer / transferFrom return value is checked.

#0 - 0xean

2021-10-16T23:07:16Z

dupe of #155

Findings Information

🌟 Selected for report: gpersoon

Also found by: 0xRajeev, cmichel, nikitastupin

Labels

bug
duplicate
3 (High Risk)
sponsor disputed

Awards

0.6024 ETH - $1,786.10

External Links

Handle

nikitastupin

Vulnerability details

ecrecover function returns 0x0 address if a signature is invalid. However, this case is never checked (https://github.com/Swivel-Finance/gost/blob/ac304f22fd6c1500aa895e21e8787139afc4e1c7/test/swivel/Sig.sol#L22-L22). This may lead to creating dummy actions from 0x0 address.

Impact

In current version of the contract I don't see a direct impact. However, in the future this may lead to creating dummy actions from 0x0 address.

Revert if ecrecover returns 0x0.

#0 - JTraversa

2021-10-10T06:13:59Z

Not sure if it counts or not 🤷.

Id say this is noteable, but because all actions require approvals from o.maker, having 0x00 as o.maker with an "invalid" but valid signature should not be impactful.

The suggestion would be to filter 0x00 makers from the orderbook? (which we do)

#1 - 0xean

2021-10-16T23:22:06Z

dupe of #61

AuditHub

A portfolio for auditors, a security profile for protocols, a hub for web3 security.

Built bymalatrax © 2024

Auditors

Browse

Contests

Browse

Get in touch

ContactTwitter