Core Contracts

Regnum Aurum Acquisition Corp
HardhatReal World AssetsNFT
77,280 USDC
View results
Submission Details
Severity: medium
Invalid

DoS via large NFT arrays

Summary

Loops in withdrawNFT() and finalizeLiquidation() can gas out with large arrays of NFTs, potentially leading to a denial of service.

Vulnerability Details

The withdrawNFT() function iterates over user.nftTokenIds, which could exceed gas limits if the array is large. Similarly, finalizeLiquidation() could face the same issue, causing transaction failures and preventing users from withdrawing their NFTs.

Impact

Large NFT arrays can cause transactions to fail due to gas limits, effectively denying service to users and potentially locking their assets in the protocol.

Tools Used

  • Manual review

Updates

Lead Judging Commences

inallhonesty Lead Judge 4 months ago
Submission Judgement Published
Invalidated
Reason: Design choice
Assigned finding tags:

LendingPool: Unbounded NFT array iteration in collateral valuation functions creates DoS risk, potentially blocking liquidations and critical operations

LightChaser L-36 and M-02 covers it.

inallhonesty Lead Judge 4 months ago
Submission Judgement Published
Invalidated
Reason: Design choice
Assigned finding tags:

LendingPool: Unbounded NFT array iteration in collateral valuation functions creates DoS risk, potentially blocking liquidations and critical operations

LightChaser L-36 and M-02 covers it.

Support

FAQs

Can't find an answer? Chat with us on Discord, Twitter or Linkedin.