Closed code423n4 closed 1 year ago
0xSorryNotSorry marked the issue as primary issue
Sidu28 marked the issue as sponsor disputed
This issue appears to rely on censoring of the Ethereum blockchain for any kind of feasibility.
With the information I have available:
I must dispute the finding
Feel free to follow up with me or the Sponsor if you can perform this on the live system
GalloDaSballo marked the issue as unsatisfactory: Insufficient proof
Lines of code
https://github.com/code-423n4/2023-04-eigenlayer/blob/main/src/contracts/core/Slasher.sol#L251-L252 https://github.com/code-423n4/2023-04-eigenlayer/blob/main/src/contracts/core/Slasher.sol#L121
Vulnerability details
Impact
freezeOperator will not be able to freeze an operator address in blockchain reorg situation
Proof of Concept
https://github.com/code-423n4/2023-04-eigenlayer/blob/main/src/contracts/core/Slasher.sol#L251-L252
canSlash function is relying on
block.number
as it should be lower thancontractCanSlashOperatorUntilBlock
. that will work fine until a reorg on Ethereum blockchain is done, in this case a sender caller might wait for few blocks till be able to freeze an operator address.Untrusted or bad actor operator address might continue to proceed until the reorg is not effective anymore and that for sure will put a damage or negative impact on a user who needed to freeze that bad actor operator address.
Tools Used
Manual Review
Recommended Mitigation Steps
Assessed type
DoS