Closed sherlock-admin closed 1 year ago
Escalate This should be a duplicate of #41
Escalate This should be a duplicate of #41
You've created a valid escalation!
To remove the escalation from consideration: Delete your comment.
You may delete or edit your escalation comment anytime before the 48-hour escalation window closes. After that, the escalation becomes final.
Agree with escalation
Agree this is a duplicate of #41 and it patched in the remediations
Result: Medium Duplicate of #41
Arabadzhiev
medium
Malicious actors can DoS users, that want to buy all / most of the remaining quantity of a component, by frontrunning them with dust amount bids
Summary
When users place bids that are very close, or equal to the maximum available amount for that particular component, malicious users can frontrun them with a small bid for the same asset, in turn, making their transaction revert.
Vulnerability Detail
Lets take the following example:
There is a currently ongoing auction and one of the components that it sells is WETH. The currently available quantity for that component is 10.
Alice sees that this auction, and since she is really bullish on WETH, she decides to buy all of the available quantity from the auction. We can then observe the following flow of actions:
The above scenario can repeat itself a few times, until Alice either buys an amount significantly lower the the one she initially anticipated, or she simply gives up on participating in the auction entirely.
Impact
The following negative impacts can be observed:
Code Snippet
https://github.com/sherlock-audit/2023-06-Index/blob/8d348ed344635a068d458aa04956f966b6d3d4f3/index-protocol/contracts/protocol/modules/v1/AuctionRebalanceModuleV1.sol#L796
Tool used
Manual Review
Recommendation
To mitigate this issue, you can either:
Duplicate of #41