A critical miscalculation in the veRAAC token locking mechanism allows users to bypass supply caps and mint excessive governance tokens. The veRAACToken.lock
function improperly validates total supply against raw token amounts rather than time-weighted voting power, enabling attackers to systematically exceed protocol-defined supply limits through strategic long-duration locks. This flaw fundamentally undermines the governance system's integrity by allowing artificial inflation of voting power beyond designed constraints.
The vulnerability exists in the voting power calculation and supply limit enforcement of the veRAAC token locking mechanism veRAACToken.lock
(veRAACToken.sol#L215). The function improperly validates the total supply limit against the raw locked amount rather than the actual minted voting power amount, which is calculated using a time-weighted formula.
The lock function calculates voting power (newPower
) using a duration-based multiplier but only checks the supply limit against the base token amount being locked. This allows attackers to mint more veRAAC tokens than permitted by the protocol's supply cap when creating long-duration locks, as the voting power increases with lock duration while the validation remains based on the initial token amount.
This vulnerability directly impacts the protocol's governance integrity and token supply control mechanisms:
Governance Manipulation Risk
Attackers could accumulate disproportionate voting power by exploiting long-duration locks, enabling them to:
Control proposal outcomes
Bypass quorum requirements
Influence protocol parameter changes
Tokenomics Inflation
Unauthorized veRAAC minting bypasses the supply cap, potentially:
Diluting legitimate users' voting power
Devaluing locked positions
Creating artificial scarcity for governance participation
Protocol Parameter Integrity
The MAX_TOTAL_SUPPLY constant becomes ineffective, removing a key safeguard against:
Voting power concentration
Sybil attack mitigation
Long-term sustainability controls
The vulnerability enables systemic governance takeover at the cost of temporary capital lockup rather than genuine protocol commitment, fundamentally undermining the ve-token model's security assumptions.
Manual Review
Replace the existing supply check with a validation against the calculated voting power:
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.