Modifying utilitytoken would result in loss of user assets #241
Labels
bug
Something isn't working
disagree with severity
Sponsor confirms validity, but disagrees with warden’s risk assessment (sponsor explain in comments)
duplicate
This issue or pull request already exists
QA (Quality Assurance)
Assets are not at risk. State handling, function incorrect as to spec, issues with clarity, syntax
resolved
Finding has been patched by sponsor (sponsor pls link to PR containing fix)
responded
The Holograph team has reviewed and responded
sponsor confirmed
Sponsor agrees this is a problem and intends to fix it (OK to use w/ "disagree with severity")
Lines of code
https://github.com/code-423n4/2022-10-holograph/blob/main/contracts/HolographOperator.sol#L1049-L1053
Vulnerability details
Impact
The administrator can set utilityToken at will without any restrictions. Modifications impress the assets of the operator. For example, previously utilityToken was a high-price utilitytoken, and the user bondUtilityToken() would send high-price tokens. Then the administrator can modify the utilityToken to a lower-priced one. The operator then does unbondUtilityToken(), which can only get tokens that have a lower price than before or that have no value.
Proof of Concept
Tools Used
vscode
Recommended Mitigation Steps
Add a time lock or determine whether an operator currently exists
The text was updated successfully, but these errors were encountered: