The protocol tracks individual user collateral balances independently without share-based accounting, but a malicious first depositor could exploit rounding by depositing minimal collateral then donating tokens directly to the contract, causing subsequent small deposits to round to zero in USD value calculations.
The protocol calculates collateral USD value by multiplying token amounts by oracle prices, with integer division causing small amounts to round down in conversions.
A first depositor can deposit 1 wei of collateral, then transfer large amounts directly to the contract (bypassing deposit function), inflating the "value per wei" to cause subsequent users' small deposits to round to nearly zero collateral value.
Likelihood:
A malicious actor monitors mempool for first deployment and races to become the first depositor with 1 wei collateral.
Attacker donates significant collateral amount directly via transfer() to contract address, bypassing accounting logic.
Impact:
Subsequent users depositing small amounts (< 1000 tokens) suffer from extreme rounding losses where their collateral value rounds to nearly zero USD.
Attack requires front-running deployment and donating value, making it economically viable only for high-value protocols or as griefing attack.
Note: This vulnerability has LOW severity for this protocol because:
Not a share-based vault (direct balance tracking)
Attack requires donating significant value with no profit mechanism
Victims can just deposit larger amounts (> 1000 tokens)
Economically irrational for attacker
The contest is live. Earn rewards by submitting a finding.
Submissions are being reviewed by our AI judge. Results will be available in a few minutes.
View all submissionsThe contest is complete and the rewards are being distributed.