The _swapUnderlyingToAsset
function in the StrategyArb.sol
contract uses a hardcoded block.timestamp
as the deadline for token swaps. While the likelihood of exploitation is low, the use of a static deadline allows validators to manipulate transaction execution timing, potentially causing failures or exploiting Miner Extractable Value (MEV) opportunities in specific scenarios.
Location: StrategyArb and StrategyOP contracts:
_swapUnderlyingToAsset
function
Problem:
Using block.timestamp
directly as the swap deadline gives validators, who have control over transaction ordering in block production, the opportunity to exploit the system. Validators can:
Delay Transactions: Intentionally reorder transactions within a block or across blocks to ensure that a swap fails due to an expired deadline.
MEV Exploitation: Use the knowledge of swap parameters to reorder transactions for personal financial gain.
This vulnerability is categorized as Low
because:
Validators have limited incentives to execute such attacks, especially in decentralized or well-monitored networks.
Most attacks would require collusion or centralized control to effectively exploit this vulnerability.
The financial impact is minor unless the transaction size is significant.
Although in OP and arbitrum the ordering is done by sequencer, its still safer to use an input parameter instead of block.timestamp
Manual Review
Allow Configurable Deadlines
Replace the hardcoded block.timestamp
with a configurable deadline
parameter:
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.