Bug Description:
In the AaveDIVAWrapper.sol contract, specifically within the _removeLiquidity function, there is an implicit assumption that the user has approved the contract to transfer their short and long tokens without explicitly checking.
This code assumes that the user has already given approval for the contract to use their tokens. However, if the user has not given this approval or if the approval has been revoked, these transferFrom calls will revert, leading to transaction failure. There's no check to verify the approval amount before attempting the transfer.
Impact:
The primary impact is transaction reversion due to inadequate permission, which not only frustrates users but also affects the reliability and user experience of the contract's functionality.
Mitigation:
Add checks for the allowance of both short and long tokens before attempting to transfer.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.