The setParameter
function in the LendingPool.sol allows modifying HealthFactorLiquidationThreshold
without any validation. Unlike other parameters, this lacks a require()
check to enforce safe value ranges. This oversight could lead to liquidation failures or unnecessary liquidations if an extreme value is set.
The setParameter
function allows the contract owner to modify various risk-related parameters, including HealthFactorLiquidationThreshold
. However, unlike other parameters, there is no validation on this specific variable, allowing the owner to set an arbitrarily high or low value.
If too low, users could get liquidated unnecessarily, causing fund losses.
If too high, liquidations might never trigger, leading to bad debt.
No upper/lower bound allows setting arbitrary values.
Manuel Review
Add a require()
statement to enforce reasonable thresholds:
Where minThreshold
and maxThreshold
are protocol-defined safe values.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.