Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

theweb3mechanic - Malicious attacker can cheat the voting mechanism to sunset the collection #782

Open
sherlock-admin4 opened this issue Sep 15, 2024 · 0 comments

Comments

@sherlock-admin4
Copy link
Contributor

sherlock-admin4 commented Sep 15, 2024

theweb3mechanic

Medium

Malicious attacker can cheat the voting mechanism to sunset the collection

Summary

A dishonest party can cheat the voting mechanism to influence the vote when users are trying to sunset a collection

Vulnerability Detail

The protocol leaves a room for users to create and canceling listing at any instant. An attacker can create a malicuous contract that will do the following

  1. CreateListing from listing contract
  2. call start on the CollectionShutdown contract
  3. call CancelListing from the listing contract

Impact

Attacker can influence votes provided that they have enough collection ERC20 token

Code Snippet

https://github.com/sherlock-audit/2024-08-flayer/blob/0ec252cf9ef0f3470191dcf8318f6835f5ef688c/flayer/src/contracts/utils/CollectionShutdown.sol#L135

Tool used

Manual Review

Recommendation

consider setting a cool down time fot which users will be able to cancel, from when the listing was created

@sherlock-admin2 sherlock-admin2 changed the title Round Silver Cuckoo - Malicious attacker can cheat the voting mechanism to sunset the collection theweb3mechanic - Malicious attacker can cheat the voting mechanism to sunset the collection Oct 9, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant