NFTBridge
60,000 USDC
View results
Submission Details
Severity: low
Invalid

All native tokens escrowed will get stuck in escrow forever if collection is removed form whitelist

Summary

If the admin removes a collection from the whitelist, all escrowed native tokens associated with that collection will become inaccessible until the collection is re-whitelisted. This poses a centralization risk, as users are dependent on the admin to regain access to their funds.

Vulnerability Details

The protocol relies on a whitelist managed by the admin to control which collections are active. If a collection is removed from the whitelist, any tokens escrowed under that collection are stuck and cannot be retrieved by users. This forces users to rely on the admin to re-enable the collection, leading to potential loss of assets and undermining the decentralized nature of the system.

Impact

The impact is significant, as users can lose access to their escrowed funds indefinitely, exposing the protocol to centralization risks and potential abuse by the admin.

Recommendations

  • Grace Period for Delisting: Implement a grace period before a collection is fully removed, allowing users to withdraw funds.

  • Automated Withdrawals: Ensure users can automatically withdraw escrowed tokens if a collection is delisted.

  • Decentralize Whitelist Management: Use decentralized governance to manage the whitelist, reducing reliance on a single admin.

  • Transparency: Provide clear communication before any whitelist changes.

Updates

Lead Judging Commences

n0kto Lead Judge 11 months ago
Submission Judgement Published
Invalidated
Reason: Non-acceptable severity
Assigned finding tags:

Informational / Gas

Please, do not suppose impacts, think about the real impact of the bug and check the CodeHawks documentation to confirm: https://docs.codehawks.com/hawks-auditors/how-to-determine-a-finding-validity A PoC always helps to understand the real impact possible.

Support

FAQs

Can't find an answer? Chat with us on Discord, Twitter or Linkedin.