QuantAMM

QuantAMM
49,600 OP
View results
Submission Details
Severity: low
Invalid

Malicious Pool Admin Bypass via Upgradeable Hooks

Summary

While UpdateWeightRunner implements access controls for pool management, it fails to protect against malicious admins deploying upgradeable hooks that can be later modified to extract value from users through excessive fees or liquidity manipulation.

Vulnerability Details

  1. Admin deploys seemingly benign upgradeable hook with normal fees

  2. Users trust and interact with pool using this hook

  3. Admin can upgrade hook implementation to:

    • Increase swap fees up to 50%

    • Reduce liquidity provided to users

    • Extract value through manipulated calculations

  4. UpdateWeightRunner's access controls cannot prevent this attack vector

Impact

  • Users lose funds through excessive fees

  • Protocol reputation damage

Tools Used

Manual review

Recommendations

in QuantAMMWeightedPoolFactory white list NewPoolParams.poolHooksContract

Updates

Lead Judging Commences

n0kto Lead Judge 10 months ago
Submission Judgement Published
Invalidated
Reason: Non-acceptable severity
Assigned finding tags:

Informational or Gas / Admin is trusted / Pool creation is trusted / User mistake / Suppositions

Please read the CodeHawks documentation to know which submissions are valid. If you disagree, provide a coded PoC and explain the real likelyhood and the detailed impact on the mainnet without any supposition (if, it could, etc) to prove your point.

Support

FAQs

Can't find an answer? Chat with us on Discord, Twitter or Linkedin.

Give us feedback!