Description:
The AaveDIVAWrapper
contract includes several batch functions (e.g., batchRegisterCollateralToken
, batchCreateContingentPool
) that loop over user-provided arrays without size limits. This creates a risk of denial-of-service (DoS) attacks and excessive gas consumption, as large arrays could cause transactions to exceed block gas limits or become prohibitively expensive.
impact:
Denial of Service (DoS): Attackers can submit large arrays to cause transactions to fail due to out-of-gas errors, rendering the contract temporarily unusable.
Excessive Gas Costs: Users may incur unexpectedly high gas fees when processing large batches, reducing the protocol’s usability.
Block Gas Limit Issues: Transactions may fail entirely if the gas required exceeds the block gas limit, even for legitimate use cases
Proof of Concept:
Recomended Mitigation:
Add Array Size Limits:
Introduce a maximum array size for batch operations to prevent excessive gas consumption and DoS attacks.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.