MorpheusAI

MorpheusAI
Foundry
22,500 USDC
View results
Submission Details
Severity: medium
Invalid

Relying on block.timestamp for setting a swap deadline

Summary

The L2TokenReceiver.sol contract implements the deadline of the swap and increaseLiquidityCurrentRange wrong.

Vulnerability Details

Proposers can anticipate proposing single or consecutive blocks in advance. In this situation, a malicious validator can delay the transaction, strategically executing it at a more advantageous block number.

Impact

This provides no safeguard, as the block.timestamp will reflect the value of the block in which the transaction is included. Consequently, malicious validators can indefinitely withhold the transaction.

Tools Used

Manual review.

Recommendations

Consider enabling users to specify a deadline parameter for their transactions

Updates

Lead Judging Commences

inallhonesty Lead Judge over 1 year ago
Submission Judgement Published
Validated
Assigned finding tags:

Protocol should not use block.timestamp as deadline in Uniswap interactions because it renders the protection mechanism useless

inallhonesty Lead Judge over 1 year ago
Submission Judgement Published
Invalidated
Reason: Non-acceptable severity
tpiliposian Submitter
over 1 year ago

Support

FAQs

Can't find an answer? Chat with us on Discord, Twitter or Linkedin.