Summary: Unauthorized modification of market parameters due to missing access controls in MarketMakingEngineConfigurationBranch.sol
.
Vulnerability Details:
The configureMarketParameters
function in MarketMakingEngineConfigurationBranch.sol
lacks access control modifiers, allowing any address to alter critical market configurations (e.g., fees, collateral ratios). Attackers could exploit this to destabilize markets by setting extreme values, enabling undercollateralized positions, or disabling markets entirely.
Code Reference:
The function does not restrict calls to authorized roles, making it publicly accessible.
Attack Scenario:
An attacker calls configureMarketParameters
to reduce the collateral ratio to 1%. Traders open large positions with minimal collateral. During market volatility, these positions cannot be liquidated efficiently, resulting in systemic undercollateralization and protocol insolvency.
Impact: Critical – Direct compromise of protocol integrity and user funds.
Recommendations:
Add an onlyAuthorized
modifier (e.g., onlyGovernance
or onlyAdmin
) to restrict access.
Implement a timelock mechanism for parameter changes to allow community veto.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.