Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

H-04 MitigationConfirmed #58

Open
c4-bot-10 opened this issue Jun 7, 2024 · 1 comment
Open

H-04 MitigationConfirmed #58

c4-bot-10 opened this issue Jun 7, 2024 · 1 comment
Labels
edited-by-warden mitigation-confirmed MR-H-04 satisfactory satisfies C4 submission criteria; eligible for awards

Comments

@c4-bot-10
Copy link
Contributor

c4-bot-10 commented Jun 7, 2024

Lines of code

Vulnerability details

C4 Issue

H-04: code-423n4/2024-04-renzo-findings#326

Issue Details

Issue of this vuln come from withdraw mechanism. When withdrawal amount is calculated at withdrawal request submission time instead of at withdrawal claim time:

function withdraw(uint256 _amount, address _assetOut) external nonReentrant {
  .   .   .   .   .   .
    uint256 amountToRedeem = renzoOracle.calculateRedeemAmount( // <--
        _amount,
        ezETH.totalSupply(),
        totalTVL
    );
  .   .   .   .   .   .
}

Along with there is no fee in deposit and withdraw, which can lead to arbitrage risk.

Mitigation

Solution to mitigate is good enough to fix the issue. This design is also used in other protocols.

Conclusion

Mitigation confirmed.

c4-bot-10 added a commit that referenced this issue Jun 7, 2024
@c4-judge c4-judge added the satisfactory satisfies C4 submission criteria; eligible for awards label Jun 9, 2024
@c4-judge
Copy link

c4-judge commented Jun 9, 2024

alcueca marked the issue as satisfactory

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
edited-by-warden mitigation-confirmed MR-H-04 satisfactory satisfies C4 submission criteria; eligible for awards
Projects
None yet
Development

No branches or pull requests

3 participants