The issue is that the flashloan function can be exploited to be called by externally owned addresses (EOAs) when it should only be accessible to smart contracts.
The vulnerability details involve the potential for external addresses (EOAs) to bypass the contract-only restriction and exploit the flashloan
function.
External addresses (EOAs) can initiate flash loans, which should only be available to contracts, potentially leading to misuse of the flash loan functionality and destabilization of the system.
This test successfully passes by utilizing an external owner address (EOA) to call the flash loan function, despite the intended restriction that only contracts should have access to it.
Foundry
Manual review
To address this vulnerability, ensure that only contract addresses are allowed to initiate flash loans by improving the check for receiverAddress.isContract()
to be more robust and prevent EOA bypasses.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.