Part 2

Zaros
PerpetualsDEXFoundrySolidity
70,000 USDC
View results
Submission Details
Severity: high
Invalid

[H-2] Incorrect Debt Accounting Allows Premium/Discount Exploitation at `StabilityBranch`

Summary

The getAmountOfAssetOut function uses unvalidated debt values to compute premiums/discounts, enabling artificial inflation of asset outputs.

Vulnerability Details

Affected Code:

// StabilityBranch.sol
SD59x18 vaultDebtUsdX18 = vault.getTotalDebt();
UD60x18 premiumDiscountFactorX18 = ... // Depends on debt

Exploit Scenario:

  1. Attacker opens positions to artificially inflate vault debt.

  2. Triggers swaps during high debt to get inflated asset outputs.

  3. Profit from arbitrage between real and protocol prices.

Impact

Protocol Insolvency: Vault assets depleted via inflated swaps.

Severity: High (CVSS 8.7).

Tools Used

Debt simulation scripts.

Differential price analysis.

Recommendations

// Add debt sanity bounds
require(vaultDebtUsdX18.abs() < MAX_DEBT, "Debt exceeds safe limit");
Updates

Lead Judging Commences

inallhonesty Lead Judge 5 months ago
Submission Judgement Published
Invalidated
Reason: Lack of quality

Support

FAQs

Can't find an answer? Chat with us on Discord, Twitter or Linkedin.