Open c4-bot-9 opened 5 months ago
Hello judge, even though this function is handling slippage it is still missing a deadline check, it is very common for the addLiquidity function to include a deadline please help me review this thank you!
Hey @pratokko, thank you for the PJQA contribution. I will preface all validation repository finding responses by stating that they are not evaluated by judges directly and are only evaluated by the validators if they are deemed unsatisfactory.
The liquidity provision highlighted is a full-range liquidity provision that is performed once during a project's launch. We can safely assume that no deadline is meant to be imposed in this particular case as no other user can supply liquidity to the pair until this point.
This paragraph is included in all of my responses and confirms that no further feedback is expected in this submission as PJQA has concluded. You are free to refute any of my statements factually, however, I strongly implore you to do this with actual code references and examples.
Lines of code
https://github.com/code-423n4/2024-06-vultisig/blob/main/src/ILOPool.sol#L296
Vulnerability details
Impact
The absence of a deadline check in the addLiquidity function can lead to transactions being executed at a much later time than intended, exposing users to significant price volatility. This can result in unfavorable exchange rates and potential financial losses.
Proof of Concept
Below is an example of the addLiquidity function in the
LiquidityManagement
which ls used in theILOPool
contract without a deadline check:this is later used in the
ILOPool
contract as below when launchingIn this implementation, there is no check to ensure that the transaction is executed within a certain timeframe.
Tools Used
Manual Review
Recommended Mitigation Steps
update the
AddLiquidityParams
struct to include a deadline parameter and modify theaddLiquidity
function to include a check against this deadline.Assessed type
MEV