Yeti Finance contest - pauliax's results

Portfolio borrowing. 11x leverage. 0% interest.

General Information

Platform: Code4rena

Start Date: 16/12/2021

Pot Size: $100,000 USDC

Total HM: 21

Participants: 25

Period: 7 days

Judge: alcueca

Total Solo HM: 12

Id: 66

League: ETH

Yeti Finance

Findings Distribution

Researcher Performance

Rank: 7/25

Findings: 3

Award: $4,034.67

🌟 Selected for report: 8

πŸš€ Solo Findings: 0

Findings Information

🌟 Selected for report: cmichel

Also found by: WatchPug, kenzo, pauliax

Labels

bug
duplicate
3 (High Risk)

Awards

968.2846 USDC - $968.28

External Links

Handle

pauliax

Vulnerability details

Impact

function wrap can be called by anyone. It accepts arbitrary _from and _to, and transfers 'from', and mints 'to'. A malicious actor can transfer from other users that have approved the contract before, e.g. an EOA user will need to execute 2 txs: first, approve and then wrap, so an attacker can monitor the mempool and backrun the approval tx. Also, a common practice is to approve more (or even unlimited) amounts, so such users will also lose their tokens.

A simple solution would be to remove _from parameter and use msg.sender instead.

#0 - kingyetifinance

2022-01-07T06:46:55Z

Duplicate #58

#1 - alcueca

2022-01-15T06:41:41Z

Duplicate #208

AuditHub

A portfolio for auditors, a security profile for protocols, a hub for web3 security.

Built bymalatrax Β© 2024

Auditors

Browse

Contests

Browse

Get in touch

ContactTwitter