-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
burn
Function in rUSDY.sol
is Overpowered
#36
Comments
raymondfam marked the issue as primary issue |
raymondfam marked the issue as low quality report |
Known issue in readme. Additionally, the sponsor has clarified in the discord channel this would only be done when users are not on the allowed list. |
raymondfam marked the issue as remove high or low quality report |
raymondfam marked the issue as sufficient quality report |
raymondfam marked the issue as duplicate of #85 |
kirk-baird changed the severity to QA (Quality Assurance) |
kirk-baird marked the issue as grade-c |
This previously downgraded issue has been upgraded by kirk-baird |
kirk-baird changed the severity to QA (Quality Assurance) |
Lines of code
https://github.com/code-423n4/2023-09-ondo/blob/47d34d6d4a5303af5f46e907ac2292e6a7745f6c/contracts/usdy/rUSDY.sol#L672-L683
Vulnerability details
Impact
The function
burn
gives too much power:Essentially it allows the Admin to burn shares and transfer the corresponding amount of
usdy
not to the contract, but to msg.sender.This imposes a great centralization risk, especially in the event of a compromised role where the malicious actor could then drain all shares in
totalSupply
.Tools Used
Manual Review, VSCode
Recommended Mitigation Steps
A few options are available:
msg.sender
Assessed type
Rug-Pull
The text was updated successfully, but these errors were encountered: