The VaultReader.sol
contract contains unbounded loops when iterating over user deposits. This could lead to gas exhaustion and denial of service (DoS) attacks.
The getUserDeposits
function iterates over all deposits for a given user without any limit. If a user has a large number of deposits, this function could run out of gas
An attacker could create a large number of deposits, causing the getUserDeposits
function to fail and potentially disrupting the protocol's functionality
Slither (static analysis tool)
Manual code review
Implement pagination or limit the number of deposits that can be retrieved in a single call
Please read the CodeHawks documentation to know which submissions are valid. If you disagree, provide a coded PoC and explain the real likelihood and the detailed impact on the mainnet without any supposition (if, it could, etc) to prove your point.
Please read the CodeHawks documentation to know which submissions are valid. If you disagree, provide a coded PoC and explain the real likelihood and the detailed impact on the mainnet without any supposition (if, it could, etc) to prove your point.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.