Open sherlock-admin opened 1 year ago
1 comment(s) were left on this issue during the judging contest.
Trumpero commented:
invalid, as the submission stated: "Admin of curve pools can easily drain curve pools via reentrancy", so no vulnerability for tokemak here
Escalate
as the protocol docs mentioned
https://audits.sherlock.xyz/contests/101
In case of external protocol integrations, are the risks of external contracts pausing or executing an emergency withdrawal acceptable? If not, Watsons will submit issues related to these situations that can harm your protocol's functionality.
Pausing or emergency withdrawals are not acceptable for Tokemak.
in the issue got exploit in this report, user from tokenmak lose fund as well
Escalate
as the protocol docs mentioned
https://audits.sherlock.xyz/contests/101
In case of external protocol integrations, are the risks of external contracts pausing or executing an emergency withdrawal acceptable? If not, Watsons will submit issues related to these situations that can harm your protocol's functionality.
Pausing or emergency withdrawals are not acceptable for Tokemak.
in the issue got exploit in this report, user from tokenmak lose fund as well
You've created a valid escalation!
To remove the escalation from consideration: Delete your comment.
You may delete or edit your escalation comment anytime before the 48-hour escalation window closes. After that, the escalation becomes final.
Hi @JeffCX, based on this comment of sponsors in the contest channel, I think this issue should be marked as low/invalid: https://discord.com/channels/812037309376495636/1130514263522410506/1143588977962647582
Sponsor said emergency withdrawal or pause is an unacceptable risk.
Did you read it as "acceptable" sir?
Some discussion is happening https://github.com/sherlock-audit/2023-06-tokemak-judging/issues/899
but this is a separate external integration risk than the balancer one that can impact tokemak user :) and don't think this is a known issue
Hello @JeffCX,
Upon further consideration of this matter, I find it to be valid. The potential for the curve admin to exploit the reentrancy-attack and drain the curve pool could have a direct impact on the Tokemak protocol.
I suggest that you review this issue as well, @codenutt.
Hello @JeffCX,
Upon further consideration of this matter, I find it to be valid. The potential for the curve admin to exploit the reentrancy-attack and drain the curve pool could have a direct impact on the Tokemak protocol.
I suggest that you review this issue as well, @codenutt.
Thank you very much! ๐๐๏ผ๏ผ
Thanks @Trumpero / @JeffCX! Just to confirm, this is an issue with some Curve pools just in general, correct? Not necessarily with a particular interaction we have with them.
Yes, you are right
Planning to accept escalation and label issue as valid
thanks๐๐
@Trumpero would you agree with high severity?
No I think it should be medium since it assume the curve admin become malicious
Agree with medium, https://github.com/sherlock-audit/2023-06-tokemak-judging/issues/570 similar finding about external admin turn into malicious risk is marked as medium as well
Result: Medium Unique
ctf_sec
high
curve admin can drain pool via reentrancy (equal to execute emergency withdraw and rug tokenmak fund by third party)
Summary
curve admin can drain pool via reentrancy (equal to execute emergency withdraw and rug tokenmak fund)
Vulnerability Detail
A few curve liquidity is pool is well in-scope:
one of the pool is 0x21E27a5E5513D6e65C4f830167390997aA84843a
https://etherscan.io/address/0x21E27a5E5513D6e65C4f830167390997aA84843a#code#L1121
Admin of curve pools can easily drain curve pools via reentrancy or via the
withdraw_admin_fees
function.if admin of the curve can set a receiver to a malicious smart contract and reenter withdraw_admin_fees a 1000 times to drain the pool even the admin_balances is small
the line of code
trigger the reentrancy
This is a problem because as stated by the tokemak team:
As you can see above, pausing or emergency withdrawals are not acceptable, and this is possible for cuve pools so this is a valid issue according to the protocol and according to the read me
Impact
curve admins can drain pool via reentrancy
Code Snippet
https://etherscan.io/address/0x21E27a5E5513D6e65C4f830167390997aA84843a#code#L1121
Tool used
Manual Review
Recommendation
N/A