Closed howlbot-integration[bot] closed 5 months ago
The cost of manipulating is way higher than the cost of just submitting the transaction, and it can just be redeployed so there is no upside in doing this
Picodes marked the issue as unsatisfactory: Insufficient proof
Lines of code
https://github.com/code-423n4/2024-06-panoptic/blob/153f0d82440b7e63075d55b0659706531431145f/contracts/PanopticFactory.sol#L230 https://github.com/code-423n4/2024-06-panoptic/blob/153f0d82440b7e63075d55b0659706531431145f/contracts/PanopticFactory.sol#L321
Vulnerability details
During Pool deployment, Uniswap's
slot0.sqrtPriceX96
is being used to calculate required liquidity. This value represents the most recent price and can be easily manipulated.There are slippage checks in
PanopticFactory.sol
to ensure that the user does not spend moretoken0
andtoken1
than intended :However, a malicious user can still DoS pool deployment by taking advantage of these strict slippage checks.
To make pool deployment revert, an attacker needs to manipulate the price to the extent that either
amount0 > amount0Max
oramount1 > amount1Max
.Attack path :
amount0Max
andamount1Max
values.amount0
oramount1
go past their slippage limits.One can argue that the
amount0Max
andamount1Max
values can be set to a really large value to mitigate this. However, this is highly impractical as a higher token spend is beneficial to the attacker and causes a loss for the user.Impact
DoS / Loss of funds
Proof of Concept
Tools Used
Manual Review
Recommended Mitigation Steps
Use TWAP price
Assessed type
DoS