The Standard

The Standard
DeFiHardhat
20,000 USDC
View results
Submission Details
Severity: low
Invalid

Potential Re-org Attack Vector

Summary

The contract appears to deploy new contracts using the new keyword.

Vulnerability Details

In a re-org attack scenario, such deployments can be exploited by a malicious actor who might deploy the contract at an expected address.

File: contracts/LiquidationPoolManager.sol
23: pool = address(new LiquidationPool(_TST, _EUROs, _eurUsd, ISmartVaultManager(_smartVaultManager).tokenManager()));

Tools Used

VSCode

Recommendations

Consider deploying the contract via CREATE2 opcode with a specific salt that includes msg.sender and the existing contract address.
This will ensure a predictable contract address, reducing the chances of such an attack.

Updates

Lead Judging Commences

hrishibhat Lead Judge over 1 year ago
Submission Judgement Published
Invalidated
Reason: Non-acceptable severity
Assigned finding tags:

informational/invalid

Support

FAQs

Can't find an answer? Chat with us on Discord, Twitter or Linkedin.