User could get his funds locked using a particular type of tokens #52
Labels
3 (High Risk)
Assets can be stolen/lost/compromised directly
bug
Something isn't working
duplicate-15
edited-by-warden
🤖_primary
AI based primary recommendation
🤖_07_group
AI based duplicate group recommendation
sufficient quality report
This report is of sufficient quality
Lines of code
https://github.com/code-423n4/2024-06-thorchain/blob/e3fd3c75ff994dce50d6eb66eb290d467bd494f5/chain/ethereum/contracts/THORChain_Router.sol#L26
Vulnerability details
Impact
Whenever a user deposits a fee on transfer token like
PAXG
orSTA
(both are whitelisted), there are a few ways he could get his funds locked into the contract.Proof of Concept
Fee on transfer tokens are tokens that charge a fee on transfer making recipients receive less than the sent amount.
This creates a few possible issues for the contract.
Imagine the following scenario:
PAXG
(an allowed token) into the contract usingdepositWithExpiry()
specifying that he wants to calltransferOutAndCallV5()
using the memo input parameterThis is the part of
_transferOutAndCallV5()
responsible for swapping from a token to another token:aggregationPayload.fromAmount
of thePAXG
asset to the target aggregator contract and the target contract will receive less than the amount specifiedswapOutV5
on the target contract with that samefromAmount
and that contract will conduct the swapfromAmount
specified is not actually available in the aggregator contractNow, the funds will be locked in the aggregator contract until they are manually rescued.
Tools Used
Manual Review
Recommended Mitigation Steps
Handle such cases appropriate or disallow such tokens altogether.
Assessed type
Under/Overflow
The text was updated successfully, but these errors were encountered: