MorpheusAI

MorpheusAI
Foundry
22,500 USDC
View results
Submission Details
Severity: high
Invalid

Use of `bock.timestamp` as deadline in the `L2TokenReceiver::increaseLiquidityCurrentRange`, makes it susceptible to Timestamp manipulation.

Summary

the use of block.timestamp as a deadline in the increaseLiquidityCurrentRange
function introduces a potential risk due to miner manipulation of block timestamps.
This manipulation could allow a malicious actor to front-run the function by submitting their transaction with a higher gas price,
taking advantage of the extended deadline caused by the miner's manipulation

Vulnerability Details

This vulnerability in the increaseLiquidityCurrentRange function of the provided
smart contract stems from the use of block.timestamp as a deadline.
Miners can manipulate this timestamp, leading to potential front-running attacks where malicious actors exploit the extended deadline to preempt the intended transaction.

Impact

The impact of the block.timestamp manipulation includes:

-Disruption of contract functionality due to delayed or expedited execution of functions.
-Enabling front-running attacks, where transactions are executed before their intended time, giving attackers an unfair advantage.
-Potential financial losses resulting from manipulated timestamps, especially in financial applications like games or trading platforms.
-Compromised integrity of smart contracts, leading to unauthorised activities or fund mismanagement

Tools Used

Taking into consideration the well-known issues relating to block.timestamp and randomness in the ethereum ecosystem, i observed that a miner or an attacker can take advantage of the deadline set to block.timestamp to perform a series a of malicious attacks. Hence breaking the functionality of the protocol.

Recommendations

Here are some mitigations for the block.timstamp manipulation:

-Avoid Using block.timestamp for Critical Decisions: Especially in financial transactions.
-Use External Randomness Sources: Integrate external randomness sources or oracles to generate random numbers for your smart contract. These sources can provide a layer of security against timestamp manipulation by miners

Updates

Lead Judging Commences

inallhonesty Lead Judge over 1 year ago
Submission Judgement Published
Validated
Assigned finding tags:

Protocol should not use block.timestamp as deadline in Uniswap interactions because it renders the protection mechanism useless

inallhonesty Lead Judge over 1 year ago
Submission Judgement Published
Invalidated
Reason: Non-acceptable severity

Support

FAQs

Can't find an answer? Chat with us on Discord, Twitter or Linkedin.