The LendingPool contract implements basic ownership-based access control without multi-signature authentication or timelocks, creating a critical security vulnerability. This allows a single compromised admin key to execute sensitive protocol modifications without any oversight or delay, potentially leading to catastrophic consequences for user funds and protocol stability.
Vulnerability Type: Unprotected Administrative Privileges
Severity: Critical
Location: Multiple admin functions throughout the LendingPool contract
Affected Functions:
- setParameter
for protocol parameters
setPrimeRateOracle
for oracle management
setStabilityPool
for pool configuration
setCurveVault
for vault integration
Basic Access Control Implementation - Uses simple onlyOwner
modifier without additional security layers
No multi-signature requirements for critical operations
Absence of timelock mechanisms for sensitive changes
Single Point of Failure - Complete reliance on single admin key
No distributed decision-making process
Immediate execution capability without oversight
Protocol Security Risks - Potential for unauthorized protocol parameter modifications
Risk of compromised collateral ratios
Immediate execution of malicious changes
User Fund Exposure - Direct risk to user deposits
Potential for manipulated lending terms
No protection against rapid protocol changes
Solidity compiler for contract analysis
Hardhat for testing and simulation
Ethers.js for transaction simulation
demonstrating the vulnerability using a Hardhat test that shows how quickly an admin can modify critical protocol parameters:
run, this test will demonstrate how quickly an admin can modify critical protocol parameters without any protection mechanisms. The output show:
Initial liquidation threshold value
Timestamp before modification
New threshold value after immediate modification
Timestamp after modification
Time difference between operations (typically near zero)
This PoC clearly demonstrates the vulnerability by showing how quickly critical protocol parameters can be modified by a single admin without any security checks or delays.
Immediate Actions - Implement multi-signature authentication for critical functions
Add timelock mechanisms for parameter changes
Document and implement proper key management procedures
Long-term Improvements
Implement role-based access control (RBAC)
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.