Closed code423n4 closed 1 year ago
0xSorryNotSorry marked the issue as duplicate of #484
berndartmueller marked the issue as not a duplicate
Closing as invalid as this is intentional.
berndartmueller marked the issue as unsatisfactory: Invalid
This unsatisfactory issue is marked as dup of #484
This unsatisfactory issue is marked as dup of #484
Hey @AhmadDecoded,
this submission is not a duplicate as there's no such GitHub issue label.
Lines of code
https://github.com/code-423n4/2023-07-axelar/blob/main/contracts/its/utils/FlowLimit.sol#L114 https://github.com/code-423n4/2023-07-axelar/blob/main/contracts/its/utils/FlowLimit.sol#L127
Vulnerability details
Impact
Token flow can reach 2*flow_limit in a very short time.
Proof of Concept
We store the flow out and flow in tokens numbers for every epoch:
So for every new epoch, the flow out/in number will be zero, so an attacker can:
Attackers can use this method to gain financial gain, etc.
Tools Used
Manual Review.
Recommended Mitigation Steps
Add a limit for every transfer, thus making the attack more expensive.
Assessed type
Context