setGladiusReactor function has no zero address check.
Summary
On RubiconFeeController , setGladiusReactor simply sets new GladiusReactor contract address for the protocol. which could lead to fund loses for protocol.
Vulnerability Detail
On RubiconFeeController , setGladiusReactor simply sets new GladiusReactor contract for the protocol. However ,as you can see there is no zero address check on this function even though it has made by trusted actors in auth modifier.
function setGladiusReactor(address payable gr) external auth {
gladiusReactor = GladiusReactor(gr);
}
Trusted actors could pass zero address to setGladiusReactor function by mistake. This leads to locking the protocol itself and causes to fund loses for protocol
Impact
Trusted actors could pass zero address to setGladiusReactor function by mistake. This leads to locking the protocol itself and causes to fund loses for protocol
taner2344
high
setGladiusReactor function has no zero address check.
Summary
On
RubiconFeeController
,setGladiusReactor
simply sets new GladiusReactor contract address for the protocol. which could lead to fund loses for protocol.Vulnerability Detail
On
RubiconFeeController
,setGladiusReactor
simply sets new GladiusReactor contract for the protocol. However ,as you can see there is no zero address check on this function even though it has made by trusted actors inauth
modifier.Trusted actors could pass zero address to
setGladiusReactor
function by mistake. This leads to locking the protocol itself and causes to fund loses for protocolImpact
Trusted actors could pass zero address to
setGladiusReactor
function by mistake. This leads to locking the protocol itself and causes to fund loses for protocolCode Snippet
https://github.com/sherlock-audit/2024-02-rubicon-finance/blob/main/gladius-contracts-internal/src/fee-controllers/RubiconFeeController.sol#L142-L144
Tool used
Manual Review
Recommendation
To mitigate this issue kindly consider to add following