The RAAC protocol's liquidation mechanism contains a critical vulnerability allowing attackers to manipulate the liquidation process through a sandwich attack. The vulnerability stems from:
Separation between liquidation initiation and finalization
Lack of price validation at finalization
Manager privilege abuse potential
Cascading liquidation effects
The vulnerability arises from three critical design flaws:
Temporal Separation
Liquidation process is split into two transactions
No state locking between initiation and finalization
Grace period creates manipulation window
Price Validation Gaps
No price validation at finalization step
Missing health factor re-verification
Lack of price deviation checks
Access Control Issues
Manager role has excessive privileges
No checks for manager's conflicts of interest
Missing rate limiting on manager actions
Required Resources:
Access to flash loan provider (e.g., Aave, dYdX)
Minimum capital: ~10% of target position value
Basic MEV capabilities (for sandwich execution)
Technical Requirements:
Ability to monitor mempool
Smart contract deployment capabilities
Price feed monitoring system
Optimal Conditions:
High market volatility periods
Large liquidatable positions
Multiple dependent positions (for cascading)
Direct financial impact through liquidation manipulation
Unfair liquidations of healthy positions
Core protocol safety mechanism compromise
No upper bound on potential losses
Cascading effects on multiple positions
Multiple unprotected steps in liquidation
No price validation at critical points
Low technical barrier to exploit
Profitable in most market conditions
Manager privilege abuse potential
Unfair liquidations: Up to 100% of affected positions
Price manipulation profit: 30-40% per position
Cascading effect: 2-3x initial impact
Market confidence loss: 20-30% TVL reduction
Venus Protocol (May 2021)
Loss: $200M
Vector: Liquidation + Oracle manipulation
Impact: 60% TVL drop
Compound (Nov 2020)
Loss: $89M
Vector: Liquidation timing manipulation
Impact: 30% TVL drop
[ ] Implement price locking between initiation and finalization
[ ] Add health factor recheck at finalization
[ ] Set maximum price deviation limits
[ ] Add manager action rate limiting
[ ] Implement multi-sig for critical manager actions
[ ] Add cooldown period between manager operations
[ ] Require collateral verification for managers
[ ] Implement action logging and monitoring
[ ] Add TWAP for price validation
[ ] Implement cross-validation with backup oracles
[ ] Add automatic circuit breakers
[ ] Deploy monitoring system for suspicious patterns
[ ] Price manipulation scenarios
[ ] Manager privilege abuse cases
[ ] Cascading liquidation tests
[ ] Circuit breaker effectiveness
[ ] Gas optimization verification
Price validation system
Circuit breakers
Emergency pause mechanism
Enhanced monitoring
Manager action validation
Cross-contract validation
Comprehensive security framework
Advanced price oracle system
Automated detection system
Impact: HIGH (>$10M potential loss)
Likelihood: HIGH (multiple vectors)
Overall: CRITICAL (immediate action required)
Total: 12 hours
Analysis: 5h
PoC: 3h
Validation: 2h
Documentation: 2h
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.