The getNegativeFundingFeeAmount function does not fully validate the funding fee data returned by GMX, such as checking for negative values or ensuring the data is not stale
The vulnerability can be found in the lines of code below;
Proof of Concept (PoC):
GMX returns incorrect funding fee data due to a bug or manipulation.
The getNegativeFundingFeeAmount function uses the incorrect data to calculate funding fees, leading to incorrect valuations.
Example:
return positionInfo.fees.funding.fundingFeeAmount;
If fundingFeeAmount is incorrect, the funding fee calculation will be wrong.
Incorrect calculations could lead to financial losses and protocol instability
Deepseek
Add checks for negative values and ensure the funding fee data is not stale.
Implement additional validation mechanisms to ensure data accuracy.
There is no real proof, concrete root cause, specific impact, or enough details in those submissions. Examples include: "It could happen" without specifying when, "If this impossible case happens," "Unexpected behavior," etc. Make a Proof of Concept (PoC) using external functions and realistic parameters. Do not test only the internal function where you think you found something.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.