BelongCheckIn.sol is configured with slippageBps = 999999999999999999999999999 which causes amountOutMinimum to be 0 on all Uniswap V3 swaps. This allows MEV bots to sandwich attack every swap transaction, resulting in direct theft of funds in-motion.
Vulnerability Details
The protocol performs real token swaps through Uniswap V3 in multiple critical functions:
venueDeposit(): Swaps USDC convenience fees to LONG
distributePromoterPayments(): Swaps USDC to LONG for promoter payouts
payToVenue(): Auto-converts LONG payments to USDC
_handleRevenue(): Swaps USDC to LONG for buyback mechanism
The slippage protection calculation in _swapExact() (lines referenced in the report):
Set a reasonable slippage tolerance. Example from the report:
(Adjust the exact value to an appropriate tolerance consistent with the protocol's UX and risk profile.)
Current deployed value of slippageBps effectively nullifies slippage protection and allows trivial sandwich attacks. Prioritize fixing swaps that use the affected configuration.