The function willPositionCollateralBeInsufficient
checks open interest but does not verify if sizeDeltaUsd
exceeds current position size:
if sizeDeltaUsd > positionInfo.position.numbers.sizeInUsd
, calculations become invalid.
Attackers could force the contract to return incorrect insufficiency results, affecting liquidations and collateral calculations.
Positions might become impossible to close properly.
require(sizeDeltaUsd <= positionInfo.position.numbers.sizeInUsd, "sizeDeltaUsd exceeds position size");
Please read the CodeHawks documentation to know which submissions are valid. If you disagree, provide a coded PoC and explain the real likelihood and the detailed impact on the mainnet without any supposition (if, it could, etc) to prove your point.
There is no real proof, concrete root cause, specific impact, or enough details in those submissions. Examples include: "It could happen" without specifying when, "If this impossible case happens," "Unexpected behavior," etc. Make a Proof of Concept (PoC) using external functions and realistic parameters. Do not test only the internal function where you think you found something.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.