The RAACPrimeRateOracle::_processResponse
function lacks crucial validation checks and rate limiting mechanisms when processing oracle responses, allowing manipulation of the protocol's prime rate which directly impacts lending and borrowing calculations.
The implementation has critical flaws:
No bounds checking on prime rate values
Direct lending pool updates without validation
Missing rate change limits
Lack of update frequency controls
No governance approval requirements for significant changes
Instant mass liquidations through extreme rates
Borrowing cost manipulation
Protocol instability through rate volatility
Economic attacks through rate arbitrage
Potential system-wide DoS
Manual code review
Hardhat testing
Formal verification tools
Implement min/max bounds for prime rates
Add rate change limits between updates
Enforce minimum time delays between updates
Require governance approval for large changes
Add circuit breaker for extreme rates
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
View preliminary resultsAppeals are being carefully reviewed by our judges.
The contest is complete and the rewards are being distributed.