28702 - [SC - Insight] Malicious users can frontrun permits to DoS swaps
Last updated
Was this helpful?
Last updated
Was this helpful?
Submitted on Feb 24th 2024 at 12:22:34 UTC by @jaraxxus for
Report ID: #28702
Report type: Smart Contract
Report severity: Insight
Target: https://etherscan.io/address/0x7276925e42f9c4054afa2fad80fa79520c453d6a
Impacts:
Griefing (e.g. no profit motive for an attacker, but damage to the users or the protocol)
A novel attack recently discovered, if permit is used within a function, it can be frontrunned and griefed.
When swaps are available to the users (currently restricted), there is an option to do gasless transactions through the use of permit.
If permit is used within a larger function, it can be frontrunned. Also, since the try/catch block does not catch any errors, nothing will prevent the frontrunning.
Permit will be frontrunned and swaps can be griefed. The user will lose the functionality that follows the permit().
https://vscode.blockscan.com/ethereum/0x7276925e42f9c4054afa2fad80fa79520c453d6a
Permit issue: https://www.trust-security.xyz/post/permission-denied
The permit call is within the swapAndDepositWithPermit()
function. Also, the permit call does not catch any errors.
A better way to code the try/catch block is as such:
Try the permit first
If the permit fails, check if there is still allowance for the spender
Otherwise, revert the whole function.