System keepers can arbitrarily call settleVaultsDebt
and rebalanceVaultsAssets
to manipulate collateral flows.
Attack Path:
Malicious keeper calls settleVaultsDebt
with manipulated swap parameters
Routes vault assets to attacker-controlled addresses
Proof of Concept:
Full Drain Possible: If keeper keys compromised
Low Difficulty: Single transaction exploit
Access control analysis
Privilege escalation scenarios
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.