hats-finance / Proof-Of-Humanity-V2-0xef0709445d394a22704850c772a28a863bb780b0

Proof of Humanity Protocol v2
2 stars 1 forks source link

Malicious Users Can Bypass the Challenge System #140

Open hats-bug-reporter[bot] opened 2 months ago

hats-bug-reporter[bot] commented 2 months ago

Github username: @0xmahdirostami Twitter username: 0xmahdirostami Submission hash (on-chain): 0xdc12ade9ef4583fe8053d07c2292fa8283180a41391629e596b6110be63ef968 Severity: medium

Description:

Summary

The protocol relies on a challenge system to ensure that only legitimate humanity requests are approved. However, there's a way for malicious users to trick this system by submitting fake challenges, allowing them to bypass the process and get their fake requests approved.

Impact:

Bypassing challenge phase

Vulnerability Detail


user will gain that humanity.

A malicious user can exploit this by submitting fake challenges during challengePeriodDuration. For all reasons, they could repeatedly submit challenges with fake evidence, like saying the person is "Deceased" with false evidence. By doing this, they can `fill full_reason_ser`, letting their fake request go through without proper review.
clesaege commented 2 months ago

Even if the evidence is fake, the jurors should still rule in favor of the challenger if the challenge reason is valid. See the registry policy: image

As per competition rules are excluded: