Open howlbot-integration[bot] opened 4 months ago
CloudEllie marked the issue as not a duplicate
CloudEllie marked the issue as primary issue
sponsor confirmed
Mid
→ QA
Mid
to QA
.As the sponsor said, the effect of this vulnerability is that the pools' price drifts won't be balanced by a necessary arbitraging force which is required for the swap to meet the slippage / maxSwapAmount check, hence impacting the availability of the Onboarding functionality. For this reason, I find M an appropriate severity for this finding.
3docSec marked the issue as satisfactory
3docSec marked the issue as selected for report
@poorphd Sponsors are not allowed to close, reopen, or assign issues or pull requests.
Lines of code
https://github.com/code-423n4/2024-05-canto/blob/d1d51b2293d4689f467b8b1c82bba84f8f7ea008/canto-main/proto/canto/coinswap/v1/tx.proto#L96-L104
Vulnerability details
Impact
MsgSwapOrder will never work for Canto nodes
Proof of Concept
An oversight in the MsgSwapOrder where the tag is directed to nested Input message lacks the necessary cosmos.msg.v1.signer to indirectly identify the signer
Tools Used
Eyes
Recommended Mitigation Steps
Add DefineCustomGetSigners call in app.go for the coinswap Input message like u did for MsgConvertERC20
https://github.com/code-423n4/2024-05-canto/blob/d1d51b2293d4689f467b8b1c82bba84f8f7ea008/canto-main/app/app.go#L316
Assessed type
Other