You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Nov 26, 2023. It is now read-only.
sherlock-admin opened this issue
May 24, 2023
· 0 comments
Labels
DuplicateA valid issue that is a duplicate of an issue with `Has Duplicates` labelHighA valid High severity issueRewardA payout will be made for this issue
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Labels
DuplicateA valid issue that is a duplicate of an issue with `Has Duplicates` labelHighA valid High severity issueRewardA payout will be made for this issue
qckhp
high
No slippage protection in USSD UniV3SwapInput function
Summary
There is no protection agains slippage in UUSD UniV3SwapInput input function which can lead to swandich attack and loss of funds
Vulnerability Detail
Attacker can trigger and swandich a rebalancing transaction
Impact
Attacker's ability to sandwitch attack a rebalance transaction as the amountOutMinimum parameter set to 0 when swapping in uniswap.
Code Snippet
https://github.com/USSDofficial/ussd-contracts/blob/f44c726371f3152634bcf0a3e630802e39dec49c/contracts/USSD.sol#L237
Tool used
Manual Review
Recommendation
Use the amountOutMinimum parameter instead of hardcoded 0 as value.
Duplicate of #673
The text was updated successfully, but these errors were encountered: