The AMM should validate the token_program account in CPIs to ensure it’s the SPL Token program, preventing unauthorized token transfers.
Specific Issue: Functions in transfer.rs, liquidity_operations.rs, and swap_operations.rs use token_program without verifying it matches SPL_TOKEN_PROGRAM_ID, allowing a malicious program to intercept transfers and steal funds.
Likelihood: Medium
Attackers can pass a malicious token_program during CPI calls in permissionless AMMs.
Solana’s open ecosystem increases the risk of untrusted program interactions.
Impact:
> Funds are stolen from user or vault accounts during transfers.
> Severe disruption of AMM functionality, undermining trust.
Proof of Concept
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.