There is no mechanism to guard against unfavorable slippage, potentially exposing the
protocol to front-running. A malicious party can anticipate a large token-to-WETH trade, adjust
the on-chain liquidity or manipulate the price, and force the protocol to swap at a notably
worse rate. The code does not verify that the final output meets a minimum threshold, which
can result in significantly reduced WETH proceeds for the protocol and vault participants.
The convertAccumulatedFeesToWeth function lacks slippage control mechanisms, enabling front-running attacks.
The function does not verify that the final output meets a minimum threshold.
Malicious parties can manipulate on-chain liquidity or prices to force swaps at worse rates.
This vulnerability can lead to significantly reduced WETH proceeds, harming both the protocol and its participants.
Manual code review
Enforce slippage limits by integrating checks for acceptable price ranges.
Set minimum acceptable output amounts for swaps.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.