Closed howlbot-integration[bot] closed 3 months ago
thereksfour marked the issue as unsatisfactory: Out of scope
@thereksfour Thanks for your effort in judging this contest. I think broker.sol contract is in scope. Please let me know any other reason this is to be out of the scope.
https://github.com/code-423n4/2024-07-reserve-findings/issues/50#issuecomment-2310751884 Governance is considered non-malicious
Individual RTokens should assume they can trust veRSR governance. The governing veRSR body should be assumed to be non-malicious
Lines of code
https://github.com/code-423n4/2024-07-reserve/blob/main/contracts/p1/Broker.sol#L221 https://github.com/code-423n4/2024-07-reserve/blob/main/contracts/p1/Broker.sol#L199
Vulnerability details
Vulnerability details
dutchAuctionLength and batchAuctionLength are allowed set to zero in broker contract. So governance set
dutchAuctionLength
andbatchAuctionLength
to zero , two auction models can not be initiated since its revert the transaction. So protocol is going to be in insolvant condition.Proof of Concept
Governance able to set
dutchAuctionLength
to zero. If its zero thenopenTrade
function initiating anewDutchAuction
there its reveted due to this reqiure statement.Same thing happend with batch auction.
Impact
In case of governance set
dutchAuctionLength
andbatchAuctionLength
are set to zero , Protocol is not able to run the two auction models so eventually prpotocol is going to insolvant state.Tools Used
Manual Review
Recommended Mitigation Steps
Remove
newAuctionLength == 0
from setDutchAuctionLength function and setBatchAuctionLengthAssessed type
DoS