A malicious user can DDoS the consolidatePendingStakes function.
When a user increases their position through the increasePosition function, a new pending stake is created.
It has only one require statement, which is for _tstVal
and _eurosVal
to be greater than 0. A malicious user can create many pending stakes with very low amounts of _tstVal
or _eurosVal
, which will lead to a DDoS attack on the consolidatePendingStakes
function. Any function calling the consolidatePendingStakes
function will be permanently DDoSed because during the looping of all pending stakes, the gas will be depleted.
Blocking the user from increasing/decreasing their position, as well as blocking the distribution of fees.
Mannual Review
Add a limit for how many active pending stakes can exist or add a minimum amount requirement for creating a new pending stake.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.