Description: The protocol reads Chainlink oracle prices during flash loan execution to calculate position health and leverage ratios. An attacker can manipulate these prices via large swaps on 1inch within the same transaction, causing incorrect valuations.
Code:
Likelihood:
Flash loans are atomic - attacker can manipulate price in same transaction
1inch integration allows large swaps that move market prices
Chainlink oracles update based on market data that includes manipulated trades
No time-weighted average or circuit breaker protection implemented
Impact:
Attacker creates under-collateralized positions using inflated collateral values
Protocol left with bad debt when positions liquidate at real prices
Historical precedent: Mango Markets ($110M), Cream Finance ($130M) used identical attack pattern
PROOF OF CONCEPT
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.
The contest is complete and the rewards are being distributed.