Function _createDecreasePosition uses strict equality.
The function checks if collateral will be insufficient before reducing position size. An attacker can manipulate sizeDeltaInUsd by submitting a slightly higher or lower value to disrupt position adjustments, leading to potential market manipulation, forced liquidations, or position locking.
Example Attack Scenario
Bob holds a $1M for long position on ETH.
The attacker locks Bob’s position so that Bob cannot close or adjust.
The market moves against Bob, triggering forced liquidation.
Liquidation means ETH is sold at a discount.
The attacker buys Bob’s liquidated ETH at a lower price, profiting from the forced event.
Attacker Gains: Cheap ETH (or other assets) due to artificial liquidations.
Fail to adjust or close possitions
Potential loss of funds or funds locked
Forced liquidation
Creates liquidity risks by keeping unwanted positions open
Manual review
Don't use strict equality, instead use <=
There is no real proof, concrete root cause, specific impact, or enough details in those submissions. Examples include: "It could happen" without specifying when, "If this impossible case happens," "Unexpected behavior," etc. Make a Proof of Concept (PoC) using external functions and realistic parameters. Do not test only the internal function where you think you found something.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.