Open sherlock-admin2 opened 2 months ago
Escalate
Noticed there were 19 escalations on preliminary valid issues. This is final escalation to make it 20/20 🙂
Escalate
Noticed there were 19 escalations on preliminary valid issues. This is final escalation to make it 20/20 🙂
You've created a valid escalation!
To remove the escalation from consideration: Delete your comment.
You may delete or edit your escalation comment anytime before the 48-hour escalation window closes. After that, the escalation becomes final.
bruh
Planning to reject the escalation and leave the issue as it is.
Result: Medium Has duplicates
bughuntoor
High
Usage of
tx.origin
to determine the user is prone to attacksSummary
Usage of
tx.origin
to determine the user is prone to attacksVulnerability Detail
Within
core.vy
to user on whose behalf it is called is fetched by usingtx.origin
.This is dangerous, as any time a user calls/ interacts with an unverified contract, or a contract which can change implementation, they're put under risk, as the contract can make a call to
api.vy
and act on user's behalf.Usage of
tx.origin
would also break compatibility with Account Abstract wallets.Impact
Any time a user calls any contract on the BOB chain, they risk getting their funds lost. Incompatible with AA wallets.
Code Snippet
https://github.com/sherlock-audit/2024-08-velar-artha/blob/main/gl-sherlock/contracts/core.vy#L166
Tool used
Manual Review
Recommendation
Instead of using
tx.origin
incore.vy
, simply passmsg.sender
as a parameter fromapi.vy