26501 - [SC - Insight] Timelock should handle queuing transactions and...
Submitted on Dec 4th 2023 at 04:58:15 UTC by @conqueror for Boost | DeGate
Report ID: #26501
Report type: Smart Contract
Report severity: Insight
Target: https://etherscan.io/address/0xf2991507952d9594e71a44a54fb19f3109d213a5#code
Impacts:
Timelock should handle queuing deploys and initializing implementation contracts
Description
Bug Description
Even if an unauthorized party was able to gain access to the Multisig, they should not be able to queue up transactions besides upgrade transactions (for example, ones changing the proxy ownership).
Furthermore, your implementation contracts are currently uninitialized. While this is not a concern at the moment, if you ever upgrade to an implementation contract that uses delegatecall in any way, this could become a big problem.
The timelock contract therefore should be in charge of:
Queueing up implementation contract deploys (you can set delay to 0 here), and calling initialize on the implementation contract
Only allow upgrade to be called on the proxy contracts, and not other functions. Do this by checking the signature.
Impact
Mitigate damage if multisig is ever compromised and initialize implementations. Not initializing implementations can be extremely bad in the future if you ever upgrade them to use delegatecall
Risk Breakdown
Difficulty to Exploit: Easy Weakness: Low CVSS2 Score: L
Recommendation
Refactor the timelock contract a bit, as described above
References
Last updated