Streaming Protocol contest - wuwe1's results

General Information

Platform: Code4rena

Start Date: 30/11/2021

Pot Size: $100,000 USDC

Total HM: 15

Participants: 36

Period: 7 days

Judge: 0xean

Total Solo HM: 4

Id: 62

League: ETH

Streaming Protocol

Findings Distribution

Researcher Performance

Rank: 23/36

Findings: 2

Award: $1,335.77

🌟 Selected for report: 1

πŸš€ Solo Findings: 0

Findings Information

🌟 Selected for report: toastedsteaksandwich

Also found by: Meta0xNull, Omik, ScopeLift, bitbopper, gzeon, pedroais, wuwe1

Labels

bug
duplicate
3 (High Risk)
disagree with severity
sponsor confirmed

Awards

481.7736 USDC - $481.77

External Links

Handle

wuwe1

Vulnerability details

(Sorry, my last summit for this function is wrong)

Governance can observe the mempool for any createIncentive at Streaming/src/Locke.sol:500 and call arbitraryCall function at Streaming/src/Locke.sol:733.

Proof of Concept

When a user call createIncentive with token the first time, the governance can frontrun and call arbitraryCall which in turn call approve in token contract. Governance can set the approve amount to max and transfer all the incentive token out from the Stream contract.

Consider adding a Timelock for the arbitraryCall function

#0 - brockelmore

2021-12-02T10:58:40Z

This should maybe bumped up to medium severity

#1 - brockelmore

2021-12-06T16:42:29Z

duplicate #107

#2 - 0xean

2022-01-14T22:01:35Z

dupe of #199

AuditHub

A portfolio for auditors, a security profile for protocols, a hub for web3 security.

Built bymalatrax Β© 2024

Auditors

Browse

Contests

Browse

Get in touch

ContactTwitter