A significant vulnerability exists in the LiquidationPool contract, specifically within the decreasePosition function.
This function improperly handles user input values, leading to potential manipulation and unintended asset liquidation.
The decreasePosition function allows users to input arbitrary values for _tstVal and _eurosVal without adequate validation.
It triggers the ILiquidationPoolManager to call distributeFees, resulting in an increase in every position.
Users can exploit this by repeatedly calling the function with minimal or zero values for _tstVal and _eurosVal, unjustifiably triggering fee distribution and accumulating positions.
The flaw can lead to an unfair and disproportionate increase in positions.
Manaul Review
Implement strict validation checks on _tstVal and _eurosVal within the decreasePosition function to prevent arbitrary inputs.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.