In the withdraw function, there's an inconsistent use of token transfer methods. While the function uses a secure _transfer method for wrapped native tokens, it directly calls _safe_transfer_from for other ERC20 tokens. This bypasses the security checks implemented in the _transfer function.
In the TokenManager::withdraw
function, within the if (_tokenAddress == wrappedNativeToken)
block the _transfer
function is used but in the else block Rescuable::_safe_transfer_from
is used instead as seen below
looking at the _transfer function, various checks are made as seen below and it indeed uses the Rescuable::_safe_transfer_from
to do the actual transfer.
but Rescuable::_safe_transfer_from
doesn't implement any checks and should not be called directly within that else block shown above.
By not using the _transfer function for non-wrapped ERC20 tokens, the withdrawal process loses several critical security checks:
Balance verification before and after the transfer
Protection against fee-on-transfer tokens
Safeguards against rebasing tokens
Manual review
Modify the TokenManager::withdraw
function to use the _transfer
method for all token types, not just for wrapped native tokens.
This issue's severity has similar reasonings to #252, whereby If we consider the correct permissioned implementation for the `approve()` function within `CapitalPool.sol`, this would be a critical severity issue, because the withdrawal of funds will be permanently blocked and must be rescued by the admin via the `Rescuable.sol` contract, given it will always revert [here](https://github.com/Cyfrin/2024-08-tadle/blob/04fd8634701697184a3f3a5558b41c109866e5f8/src/core/CapitalPool.sol#L36-L38) when attempting to call a non-existent function selector `approve` within the TokenManager contract. Similarly, the argument here is the approval function `approve` was made permisionless, so if somebody beforehand calls approval for the TokenManager for the required token, the transfer will infact not revert when a withdrawal is invoked. I will leave open for escalation discussions, but based on my first point, I believe high severity is appropriate. It also has a slightly different root cause and fix whereby an explicit approval needs to be provided before a call to `_safe_transfer_from()`, if not, the alternative `_transfer()` function should be used to provide an approval, assuming a fix was implemented for issue #252
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.