You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Nov 26, 2023. It is now read-only.
sherlock-admin opened this issue
May 24, 2023
· 0 comments
Labels
DuplicateA valid issue that is a duplicate of an issue with `Has Duplicates` labelHighA valid High severity issueRewardA payout will be made for this issue
No slippage control when performing swap in USSD.sol
Summary
Protocol doesn't set slippage when performs swap in UniswapV3Pool. That opens opportunity for sandwich attacks on protocol, which results in loss of funds
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Labels
DuplicateA valid issue that is a duplicate of an issue with `Has Duplicates` labelHighA valid High severity issueRewardA payout will be made for this issue
T1MOH
high
No slippage control when performing swap in USSD.sol
Summary
Protocol doesn't set slippage when performs swap in UniswapV3Pool. That opens opportunity for sandwich attacks on protocol, which results in loss of funds
Vulnerability Detail
Sets amountOutMinimum = 0 when perform swap
Attack scenario is very basic:
Protocol lose money
Impact
Rebalancer performs disadvantageous trades during rebalancing, which results in loss of funds.
Code Snippet
https://github.com/sherlock-audit/2023-05-USSD/blob/main/ussd-contracts/contracts/USSD.sol#L227-L240
Tool used
Manual Review
Recommendation
Set slippage when perform swap
Duplicate of #673
The text was updated successfully, but these errors were encountered: