In all three strategy contracts, the claimAndSwap
function performs a sequence of operations that could be vulnerable to MEV attacks and sandwich transactions. The function claims WETH from the transmuter and then performs a DEX swap, with a check for minimum output amount only at the end.
This creates a window where arbitrageurs can frontrun the swap transaction to manipulate the price and extract value, then backrun to restore the price. While there is a minimum output check, it only protects against excessive slippage but not against MEV extraction.
The issue is exacerbated by the fact that these functions are permissionless (only requiring keeper role) and the claimed amounts are visible in the mempool before the swap executes.
https://github.com/Cyfrin/2024-12-alchemix/blob/82798f4891e41959eef866bd1d4cb44fc1e26439/src/StrategyArb.sol#L71
https://github.com/Cyfrin/2024-12-alchemix/blob/82798f4891e41959eef866bd1d4cb44fc1e26439/src/StrategyMainnet.sol#L92
https://github.com/Cyfrin/2024-12-alchemix/blob/82798f4891e41959eef866bd1d4cb44fc1e26439/src/StrategyOp.sol#L79
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.