The GmxProxy::validCallback modifier does not validate the bytes32 key parameter, making its inclusion redundant and potentially leading to unexpected behavior.
The validCallback modifier takes a bytes32 key parameter but does not use it within its logic. This indicate an oversight where validation or processing of the key was intended but not implemented. If the key is meant to be validated, failing to do so could introduce logical errors or security risks.
If the key is meant to be validated, its absence in the logic could allow unintended access or incorrect processing.
If the key is not needed, its presence in the modifier creates confusion and unnecessary complexity.
If the events like GmxPositionCallbackCalled PerpetualVault::afterOrderExecution() , PerpetualVault::afterOrderCancellation()' or afterOrderFrozen` meant to be pick by offchain scripts that would cause trouble
Manual Code Review
Either remove the key parameter from the modifier if it is unnecessary or implement a validation check such as:
Please read the CodeHawks documentation to know which submissions are valid. If you disagree, provide a coded PoC and explain the real likelihood and the detailed impact on the mainnet without any supposition (if, it could, etc) to prove your point.
There is no real proof, concrete root cause, specific impact, or enough details in those submissions. Examples include: "It could happen" without specifying when, "If this impossible case happens," "Unexpected behavior," etc. Make a Proof of Concept (PoC) using external functions and realistic parameters. Do not test only the internal function where you think you found something.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.