Skip to content

Latest commit

 

History

History
32 lines (19 loc) · 1.27 KB

File metadata and controls

32 lines (19 loc) · 1.27 KB

Sparkly Fleece Mammoth

High

Morphol.sol functions are public hence non-validated isetToken.sol can lead to Stolen Funds

Summary

morpho.sol has all its functions as external. function getSupplyCollateralCalldata, function invokeSupplyCollateral,function getBorrowCalldata function invokeBorrow, function getWithdrawCollateralCalldata, function invokeWithdrawCollateral function invokeRepay, a malicious actor can deploy a malicious isetToken.sol. and front-run an actual transaction that deposits asset and shares that into the actual isetToken.solsimply because it is not validated.

I1. malicious actor deploys a contract that implements the ISetToken interface but contains harmful logic 2. when a honest user calls any function in morpho.sol , he frontruns it so as to achieve; Redirecting of Funds: The malicious contract could redirect borrowed assets to an unintended address or drain funds. Manipulate State: They could manipulate the state of the lending protocol in a way that benefits them at the expense of other users or the protocol itself. Reentrancy Attacks: the malicious contract calls back into the Morpho library and can claim ownership roles, completely hacking the protocol

PoC

No response

Mitigation

No response