Open hats-bug-reporter[bot] opened 5 months ago
Note: this compound doesn't gain any value for victim users because their value_at_redemption
is already calculated.
If no one wants to unstake, their funds will be permanently frozen.
Scenario which attacker gains:
I don't see any issue, as per design, user funds transferred after 48 hours window period.
Again , it would be nice if you can share the code links to get clear view of the function calls.
Invalid due to a couple issues:
Github username: @0xmahdirostami Twitter username: 0xmahdirostami Submission hash (on-chain): 0x29c81863c2d782c4373e7f4dac5a9de857ddd4d97d87afe2878f3d74849cdeff Severity: high
Description: Description After the
send_batch_unlock_requests
function is called, users must wait for aCooldown Period
before they can redeem their funds. If there are insufficient funds in the vault, users can callwithdraw
and then redeem. However, anyone can callcompound
beforewithdraw
, which will restake the funds, forcing users to wait for anotherCooldown Period
before they can attempt to redeem their funds again.Impact Anyone can prevent users from redeeming their tokens, effectively locking the funds in the contract indefinitely by continuously restaking the funds before users can withdraw.
Scenario
send_batch_unlock_requests
.withdraw
, an attacker callscompound
.