stake.link

stake.link
DeFiHardhatBridge
27,500 USDC
View results
Submission Details
Severity: low
Invalid

SDLPoolCCIPControllerPrimary.sol Validation Concern

Summary

This report focuses on a validation issue in the SDLPoolCCIPControllerPrimary.sol smart contract, identified in the handleIncomingRESDL function. The concern revolves around the absence of a validity check for _sourceChainSelector.

Vulnerability Details

In SDLPoolCCIPControllerPrimary.sol:131, the function handleIncomingRESDL lacks a validation check for _sourceChainSelector. This parameter is used directly in the function without verifying its legitimacy or existence within the context of the contract's logic, particularly in relation to the reSDLSupplyByChain.

Impact

Since it this _sourceChainSelector ultimately comes from the CCIP message the bridge receives the chances of it being maliciously used are low.

Tools Used

Manual Review

Recommendations

To mitigate these risks, the following actions are recommended:

  1. Implement Validity Check: Before proceeding with any operations in handleIncomingRESDL, add a check to ensure _sourceChainSelector is valid. This could involve verifying its existence in a list of valid chain selectors or checking against other relevant criteria.

  2. Revert on Invalid Input: If the _sourceChainSelector is found to be invalid, the function should revert the transaction to prevent any unintended state changes.

Updates

Lead Judging Commences

0kage Lead Judge over 1 year ago
Submission Judgement Published
Invalidated
Reason: Non-acceptable severity

Support

FAQs

Can't find an answer? Chat with us on Discord, Twitter or Linkedin.