Open c4-bot-7 opened 8 months ago
0xRobocop marked the issue as duplicate of #309
3docSec marked the issue as not a duplicate
Looks like a good candidate for an analysis report / systemic risk rather than a proper vulnerability, because I am not aware of anything that the protocol could do to mitigate the issue
3docSec changed the severity to QA (Quality Assurance)
3docSec marked the issue as grade-b
Lines of code
https://github.com/code-423n4/2024-03-ondo-finance/blob/78779c30bebfd46e6f416b03066c55d587e8b30b/contracts/ousg/ousgInstantManager.sol#L464-L465
Vulnerability details
Impact
Ondo's OUSG protocol could be DOSed and unuseable, effecting one of the core functionalities of
ousgInstantManager
i.e. instant Redeem.It is stated in the contest readme's ERC20 token behaviors in scope that for the BUILD token the given behaviours are in scope which one of them is Pausability. Which the BUILD token has this exact functionality.
Proof of Concept
See the pause function(no. 16) in etherscan in the BUILD contract where the owner has the privilege to pause it.
And also see this below test file where transfers are blocked when paused. Create a new test file under the test folder and paste this file and run
forge test --mt testCheckPausability
.This means when transfers are blocked investors of Ondo's OUSG cannot instant redeem their tokens in case BUILD needs to be redeemed.
Although some of the other mentioned behaviours are also present, we added in the QA report because it doesn't actually have any impact but this one is included because the pause could result in DOS(permanent or temporary depending on how long the BUILD token is paused) for the investors.
Tools Used
manual
Recommended Mitigation Steps
Assessed type
Other