Closed c4-submissions closed 1 year ago
raymondfam marked the issue as low quality report
raymondfam marked the issue as duplicate of #110
fatherGoose1 marked the issue as unsatisfactory: Invalid
fatherGoose1 marked the issue as not a duplicate
fatherGoose1 marked the issue as unsatisfactory: Invalid
Lines of code
https://github.com/code-423n4/2023-10-ethena/blob/ee67d9b542642c9757a6b826c82d0cae60256509/contracts/StakedUSDe.sol#L106
Vulnerability details
Impact
The protocol will not be able to stop the stolen funds, OFAC-sanctioned users
Proof of Concept
addToBlacklist -as per the NATSPEC- allows the owner (DEFAULT_ADMIN_ROLE) and blacklist managers to blacklist addresses.
However, the effects of having the role can be avoided by frontrunning the TX by the address being blacklisted. Accordingly, the address has options to frontrun the
addToBlacklist
functiontransfer()
their tokens to their contract addressTools Used
Manual Review
Recommended Mitigation Steps
While the protocol doesn't implement blacklisting the users in USDe contract as the Circle does, the protocol might consider restricting withdrawals in the Silo contract OR
addToBlacklist
TX should be bundled in private mempools like the Flashbots.Assessed type
MEV