Althea Liquid Infrastructure - xchen1130's results

Liquid Infrastructure.

General Information

Platform: Code4rena

Start Date: 13/02/2024

Pot Size: $24,500 USDC

Total HM: 5

Participants: 84

Period: 6 days

Judge: 0xA5DF

Id: 331

League: ETH

Althea

Findings Distribution

Researcher Performance

Rank: 54/84

Findings: 1

Award: $25.73

🌟 Selected for report: 0

🚀 Solo Findings: 0

Awards

25.7286 USDC - $25.73

Labels

bug
2 (Med Risk)
downgraded by judge
satisfactory
duplicate-87

External Links

Lines of code

https://github.com/code-423n4/2024-02-althea-liquid-infrastructure/blob/main/liquid-infrastructure/contracts/LiquidInfrastructureERC20.sol#L444

Vulnerability details

Impact

When "LockedForDistribution" is true, "distributableERC20s" must NOT be changed; otherwise "distribute()" will malfunction which may lead to:

  1. incorrect calculation because "erc20EntitlementPerUnit" does not match new "distributableERC20s"
  2. revert when length of new "distributableERC20s" is bigger than length of "erc20EntitlementPerUnit"

Proof of Concept

Provide direct links to all referenced code in GitHub. Add screenshots, logs, or any other relevant proof that illustrates the concept.

Tools Used

add a check in "setDistributableERC20s()" to make sure it can be called only when "!LockedForDistribution": require( !LockedForDistribution, "cannot change DistributableERC20s when already locked" );

Assessed type

Timing

#0 - c4-pre-sort

2024-02-20T05:56:51Z

0xRobocop marked the issue as duplicate of #260

#1 - c4-judge

2024-03-04T15:30:30Z

0xA5DF marked the issue as satisfactory

#2 - c4-judge

2024-03-08T15:13:03Z

0xA5DF changed the severity to 3 (High Risk)

#3 - c4-judge

2024-03-08T15:26:19Z

0xA5DF changed the severity to 2 (Med Risk)

AuditHub

A portfolio for auditors, a security profile for protocols, a hub for web3 security.

Built bymalatrax © 2024

Auditors

Browse

Contests

Browse

Get in touch

ContactTwitter