code-423n4 / 2024-01-salty-findings

11 stars 6 forks source link

In `DAO::formPOL()`, `DAO::withdrawPOL()`, `Liquidity::_dualZapInLiquidity()`, swaps are executed without slippage protection, invites sandwich attacks and will cause loss of funds #831

Closed c4-bot-1 closed 7 months ago

c4-bot-1 commented 7 months ago

Lines of code

https://github.com/code-423n4/2024-01-salty/blob/53516c2cdfdfacb662cdea6417c52f23c94d5b5b/src/dao/DAO.sol#L321 https://github.com/code-423n4/2024-01-salty/blob/53516c2cdfdfacb662cdea6417c52f23c94d5b5b/src/dao/DAO.sol#L372 https://github.com/code-423n4/2024-01-salty/blob/53516c2cdfdfacb662cdea6417c52f23c94d5b5b/src/staking/Liquidity.sol#L62-L72

Vulnerability details

Impact

Proof of Concept

Tools Used

Manual review

Recommended Mitigation Steps

Parameterize the token receiving value.

Assessed type

MEV

c4-judge commented 7 months ago

Picodes marked the issue as duplicate of #805

c4-judge commented 7 months ago

Picodes marked the issue as not a duplicate

Picodes commented 7 months ago

How this is still actionable in a real scenario is not discussed.

c4-judge commented 7 months ago

Picodes marked the issue as duplicate of #224

c4-judge commented 7 months ago

Picodes marked the issue as unsatisfactory: Invalid

c4-judge commented 6 months ago

Picodes changed the severity to 2 (Med Risk)

c4-judge commented 6 months ago

Picodes marked the issue as satisfactory