Althea Liquid Infrastructure - slippopz's results

Liquid Infrastructure.

General Information

Platform: Code4rena

Start Date: 13/02/2024

Pot Size: $24,500 USDC

Total HM: 5

Participants: 84

Period: 6 days

Judge: 0xA5DF

Id: 331

League: ETH

Althea

Findings Distribution

Researcher Performance

Rank: 71/84

Findings: 1

Award: $7.18

🌟 Selected for report: 0

🚀 Solo Findings: 0

Lines of code

https://github.com/code-423n4/2024-02-althea-liquid-infrastructure/blob/main/liquid-infrastructure/contracts/LiquidInfrastructureERC20.sol#L143

Vulnerability details

Impact

add duplicated 0 share holder to holders can lead to dos function _afterTokenTransfer

Proof of Concept

https://github.com/code-423n4/2024-02-althea-liquid-infrastructure/blob/main/liquid-infrastructure/contracts/LiquidInfrastructureERC20.sol#L143 attacker can transfer 0 tokens to another account that is whitelisted but holds 0 shares. Since the function only checks if the recipient's balance is 0 before the transfer, it can result in numerous duplicated non-shareholders being added to the list of holders. This could cause the _afterTokenTransfer function to run out of gas.

Tools Used

code review

also include amount != 0 at https://github.com/code-423n4/2024-02-althea-liquid-infrastructure/blob/main/liquid-infrastructure/contracts/LiquidInfrastructureERC20.sol#L143

Assessed type

DoS

#0 - c4-pre-sort

2024-02-22T06:45:09Z

0xRobocop marked the issue as duplicate of #77

#1 - c4-judge

2024-03-04T13:23:32Z

0xA5DF marked the issue as satisfactory

#2 - c4-judge

2024-03-08T15:08:03Z

0xA5DF changed the severity to 3 (High Risk)

AuditHub

A portfolio for auditors, a security profile for protocols, a hub for web3 security.

Built bymalatrax © 2024

Auditors

Browse

Contests

Browse

Get in touch

ContactTwitter