DeFiLayer 1Layer 2
14,723 OP
View results
Submission Details
Severity: high
Invalid

Lack of Input Validation on External Calls

Summary

Vulnerability Details

Functions like update_price() and update_profit_max_unlock_time() do not properly validate inputs, which can lead to incorrect calculations or unexpected behavior.

example:

def update_price(_parameters: uint256[ALL_PARAM_CNT], _ts: uint256, _block_number: uint256) -> uint256:

_parameters should have explicit range checks (e.g., ensuring nonzero values for total supply).

_ts should be checked against block.timestamp to avoid future timestamps.

_block_number should be validated to prevent invalid updates.

Impact

Attackers could provide malicious values to corrupt the oracle's price feed, leading to financial losses.

Recommendations

Add explicit range checks for _parameters, _ts, and _block_number.

Updates

Lead Judging Commences

0xnevi Lead Judge 5 months ago
Submission Judgement Published
Invalidated
Reason: Incorrect statement
Assigned finding tags:

[invalid] finding-missing-proof-content-validation

- See [here]([https://github.com/CodeHawks-Contests/2025-03-curve?tab=readme-ov-file#blockhash-oracle)](https://github.com/CodeHawks-Contests/2025-03-curve?tab=readme-ov-file#blockhash-oracle) on how it is used to verify storage variable - All state roots and proofs must be verified by the OOS `StateProofVerifier` inherited as `Verifier` (where the price values and params are extracted), so there is no proof that manipulating timestamp/inputs can affect a price update - It is assumed that the OOS prover will provide accurate data and the OOS verifier will verify the prices/max unlock time to be within an appropriate bound/values - There is a account existance check in L96 of `ScrvusdVerifierV1.sol`, in which the params for price updates are extracted from

Support

FAQs

Can't find an answer? Chat with us on Discord, Twitter or Linkedin.