DeFiFoundry
50,000 USDC
View results
Submission Details
Severity: low
Invalid

M-1 Lack of Validation on _callbackGasLimit

Summary

_callbackGasLimit is directly added to estimatedGasLimit without any upper bound check.

uint256 _callbackGasLimit

Vulnerability Details

  • If _callbackGasLimit is too large, it could result in excessively high gas usage and potential DoS (Denial of Service) attacks.

Impact

  • Attackers could inflate gas costs to prevent other users from executing transactions.

Tools Used

  • Manual review

Recommendations

  • Set an upper bound for _callbackGasLimit where the treshhold is a reasonable limit based on expected execution gas.

Updates

Lead Judging Commences

n0kto Lead Judge 5 months ago
Submission Judgement Published
Invalidated
Reason: Non-acceptable severity
Assigned finding tags:

Informational or Gas

Please read the CodeHawks documentation to know which submissions are valid. If you disagree, provide a coded PoC and explain the real likelihood and the detailed impact on the mainnet without any supposition (if, it could, etc) to prove your point.

Suppositions

There is no real proof, concrete root cause, specific impact, or enough details in those submissions. Examples include: "It could happen" without specifying when, "If this impossible case happens," "Unexpected behavior," etc. Make a Proof of Concept (PoC) using external functions and realistic parameters. Do not test only the internal function where you think you found something.

Support

FAQs

Can't find an answer? Chat with us on Discord, Twitter or Linkedin.