A critical vulnerability exists due to the hardcoded acceptablePrice parameter being set to 0 in the settle function. This dangerous configuration allows position settlements to execute at any market price, including near-zero values, enabling complete collateral liquidation under adverse market conditions. The flaw fundamentally compromises position safety guarantees.
Price Validation Bypass:
Setting acceptablePrice = 0 disables price validation checks in GMX's order execution system, violating the basic principle of price-protected settlements.
Tha variable acceptablePrice is meaning less. It will bypass all the price.
Manual review
There is no real proof, concrete root cause, specific impact, or enough details in those submissions. Examples include: "It could happen" without specifying when, "If this impossible case happens," "Unexpected behavior," etc. Make a Proof of Concept (PoC) using external functions and realistic parameters. Do not test only the internal function where you think you found something.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.