Underpaid Computation Attack Through Access List Manipulation #97
Labels
bug
Something isn't working
downgraded by judge
Judge downgraded the risk level of this issue
edited-by-warden
grade-b
Q-05
QA (Quality Assurance)
Assets are not at risk. State handling, function incorrect as to spec, issues with clarity, syntax
🤖_17_group
AI based duplicate group recommendation
sponsor disputed
Sponsor cannot duplicate the issue, or otherwise disagrees this is an issue
sufficient quality report
This report is of sufficient quality
Lines of code
https://github.com/kkrt-labs/kakarot/blob/7411a5520e8a00be6f5243a50c160e66ad285563/src/kakarot/interpreter.cairo#L922-L930
Vulnerability details
Impact
An attacker can force expensive Starknet computations (Cairo steps) while only paying for minimal EVM gas. This creates an economic imbalance where the paymaster bears the computational cost of processing large access lists, while the attacker only pays minimal EVM gas. The attack can be repeated causing significant economic damage to the paymaster.
Proof of Concept
The exists in Kakarot's execution flow where access list entries are processed and cached before validating if the transaction has sufficient gas to cover all operations.
Interpreter.cairo:L922
Access list caching happens in State.cairo:L175
Attack Flow:
Attack Steps:
Tools Used
Manual Review
Recommended Mitigation Steps
Calculate and validate minimum required gas (including access list costs) before processing any access list entries.
Assessed type
Other
The text was updated successfully, but these errors were encountered: