Missing staleness check in price validation will cause financial losses for the protocol as malicious actors can exploit outdated NFT prices for collateral calculation.
In LendingPool.sol the getNFTPrice() function lacks validation for price staleness, allowing outdated prices to be used for collateral calculations.
NFT price oracle needs to return stale price data that differs significantly from current market value
Attacker waits for NFT market prices to decrease significantly
Attacker uses stale (higher) price data from oracle for collateral calculations
Protocol accepts overvalued collateral due to missing staleness validation
The protocol risks significant financial losses by accepting overvalued collateral based on stale prices. This could lead to undercollateralized positions when real NFT prices have decreased.
Add price staleness validation in getNFTPrice():
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.