The potential for Denial of Service (DoS)
vulnerabilities in the _build()
function primarily arises from the use of two for-loops
to iterate over arrays of debtors (mFRAXDebtors and mxcDOTDebtors)
and the subsequent execution of actions based on the conditions within these loops.
At first, the function iterates over mFRAXDebtors
which involves an external function call to _pushAction()
:
Then over mxcDOTDebtors
which also involves an external function call to _pushAction()
:
Iteration over these arrays while performing the external calls
to _pushAction()
could consume a significant amount of gas, potentially leading to an Out of Gas (OOG) error
if the transaction does not have enough gas to complete.
There is a potential for Denial of Service (DoS)
vulnerabilities due to OOG
Manual Review
Gas Limits and Estimates:
Be mindful of the gas limits of transactions and use tools to estimate gas usage. This can help in designing contracts to avoid OOG errors by ensuring transactions have enough gas to complete.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.