The setParameter function in the LendingPool.sol allows modifying HealthFactorLiquidationThreshold without any validation. Unlike other parameters, this lacks a require() check to enforce safe value ranges. This oversight could lead to liquidation failures or unnecessary liquidations if an extreme value is set.
The setParameter function allows the contract owner to modify various risk-related parameters, including HealthFactorLiquidationThreshold. However, unlike other parameters, there is no validation on this specific variable, allowing the owner to set an arbitrarily high or low value.
If too low, users could get liquidated unnecessarily, causing fund losses.
If too high, liquidations might never trigger, leading to bad debt.
No upper/lower bound allows setting arbitrary values.
Manuel Review
Add a require() statement to enforce reasonable thresholds:
Where minThreshold and maxThreshold are protocol-defined safe values.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.