Fundamental design flaw in order state management that allows sellers to maliciously modify active orders during buyer transaction processing, enabling direct theft of funds and artificial price manipulation.
Expected Behavior: Order terms (price, quantity, and expiration) should remain immutable from creation through execution to maintain market integrity and prevent manipulation.
Vulnerability: The amendSellOrder
function permits real-time modifications to active orders while they are being processed by buyers, creating a dangerous race condition that can be exploited through transaction ordering attacks.
Likelihood:
Guaranteed exploitation by sophisticated MEV bots that monitor pending transactions
All orders are vulnerable regardless of size due to public mempool visibility
Requires no special privileges - any seller can execute this attack
Impact:
Buyers receive significantly reduced asset quantities
Enables artificial price inflation (300x price spikes demonstrated)
Complete Lack of trust in order book integrity
Purchase Freeze Lock Implementation
Temporarily block order modifications during buy transactions by setting a "locked" flag when purchases begin, preventing front-running attacks.
A malicious seller can front-run a buy order for their order, and decrease the amount of assets to be sold. If the price is unchanged, the buy transaction fulfills, but the buyer gets lesser amount than expected.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.