Revert Lend Mitigation Review
A lending protocol specifically designed for liquidity providers on Uniswap v3.
- Start date19 Apr 2024
- End date29 Apr 2024
- Total awards$23,500 in USDC
- Duration10 days
- Details
Revert Lend Mitigation Review details
- Total Prize Pool: $23,500 in USDC
- HM awards: $21,150
- Judge awards: $2,350
- Warden guidelines for C4 mitigation reviews
- Submit findings using the C4 form
- Starts April 19, 2024 20:00 UTC
- Ends April 29, 2024 20:00 UTC
Important note
Each warden must submit a mitigation review for every individual PR listed in the Scope
section below. Incomplete mitigation reviews will not be eligible for awards.
Findings being mitigated
Mitigations of all High and Medium issues will be considered in-scope and listed here.
-
H-01: V3Vault.sol permit signature does not check receiving token address is USDC
-
H-02: Risk of reentrancy onERC721Received function to manipulate collateral token configs shares
-
H-04: V3Utils.execute() does not have caller validation, leading to stolen NFT positions from users
-
H-06: Owner of a position can prevent liquidation due to the 'onERC721Received' callback
-
M-01: An attacker can easily bypass the collateral value limit factor checks
-
M-02: Protocol can be repeatedly gas griefed in AutoRange external call
-
M-03: No minLoanSize means liquidators will have no incentive to liquidate small positions
-
M-05: setReserveFactor fails to update global interest before updating reserve factor
-
M-07: Large decimal of referenceToken causes overflow at oracle price calculation
-
M-08: DailyLendIncreaseLimitLeft and dailyDebtIncreaseLimitLeft are not adjusted accurately.
-
M-09: Liquidation reward sent to msg.sender instead of recipient
-
M-10: Users's tokens stuck in AutoCompound after Vault is deactivated.
-
M-13: User might execute PositionToken of token set by previous token owner.
-
M-20: Tokens can't be removed as a collateral without breaking liquidations and other core functions
-
M-22: dailyDebtIncreaseLimitLeft is not updated in liquidate().
-
M-23: AutoRange execution can be front-ran to avoid protocol fee, causing loss for protocol
Scope
Branch
https://github.com/revert-finance/lend/tree/audit
Mitigation of High & Medium Severity Issues
Wherever possible, mitigations should be provided in separate pull requests, one per issue. If that is not possible (e.g. because several audit findings stem from the same core problem), then please link the PR to all relevant issues in your findings repo.
Additional scope to be reviewed
These are additional changes that will be in scope.
URL | Mitigation of | Purpose |
---|---|---|
https://github.com/revert-finance/lend/pull/13 | ADD-01 - https://github.com/code-423n4/2024-03-revert-lend-findings/issues/220 | Improper return of chainlinkReferencePriceX96 |
https://github.com/revert-finance/lend/pull/27 | ADD-02 - https://github.com/code-423n4/2024-03-revert-lend-findings/issues/12 | Missing L2 sequencer checks for Chainlink oracle |
https://github.com/revert-finance/lend/pull/28 | ADD-03 - https://github.com/code-423n4/2024-03-revert-lend-findings/issues/14 | Some ERC20 can revert on a zero value transfer |
https://github.com/revert-finance/lend/pull/31 | ADD-04 - QA, GAS | Several small changes to address QA and GAS optimization issues |
https://github.com/revert-finance/lend/pull/33 | ADD-05 - QA, GAS | Several small changes to address QA and GAS optimization issues |
https://github.com/revert-finance/lend/pull/34 | ADD-06 - QA, GAS | Several small changes to address QA and GAS optimization issues |
Out of Scope
Please list any High and Medium issues that were judged as valid but you have chosen not to fix.
Issue | Comments |
---|---|
M-01 | Acknowlegded, see comments in https://github.com/code-423n4/2024-03-revert-lend-findings/issues/466 |
M-02 | Acknowlegded, this is solved off-chain by the operator bots, see discussion in https://github.com/code-423n4/2024-03-revert-lend-findings/issues/459 |
M-03 | Acknowlegded, at deployment a resonable value will be set for minLoanSize |
M-04 | Acknowlegded, we will monitor for this behaviour and adjust config if needed, see discussion in https://github.com/code-423n4/2024-03-revert-lend-findings/issues/435 |
M-13 | Acknowlegded, see comment in https://github.com/code-423n4/2024-03-revert-lend-findings/issues/256 |
M-17 | Acknowlegded, see comment in https://github.com/code-423n4/2024-03-revert-lend-findings/issues/216 |
M-23 | Acknowlegded, this is solved off-chain by the operator bots |