20,000 USDC
View results
Submission Details
Severity: low

Large Array Manipulation Gas Limit Denial of Service (DoS) Attack

Summary

A malicious actor could attempt to call the refinance function with a very large refinances array. Each element of the array requires a certain amount of computational resources to process. When the array is large, it can lead to excessive resource consumption, causing the function call to exceed the block gas limit and hence fail.

Vulnerability Details

This vulnerability can only be exploited if:

The function accepts an array as input and performs operations that consume a significant amount of gas for each element in the array (such as writing to storage).
There is no limit on the size of the input array or the total gas that the function can consume.

Impact

The attack can block the functionality of a smart contract. If a function always fails because it consumes too much gas, it cannot be used for its intended purpose, effectively leading to a Denial-of-Service (DoS).

Tools Used

manual

Recommendations

Limit the size of the input array that a function can process in a single call

Support

FAQs

Can't find an answer? Chat with us on Discord, Twitter or Linkedin.