Potential Denial-of-Service (DoS) in Timelock pause
Function
#41
Labels
2 (Med Risk)
Assets not at direct risk, but function/availability of the protocol could be impacted or leak value
bug
Something isn't working
duplicate-24
partial-75
Incomplete articulation of vulnerability; eligible for partial credit only (75%)
🤖_06_group
AI based duplicate group recommendation
sufficient quality report
This report is of sufficient quality
Lines of code
https://github.com/code-423n4/2024-10-kleidi/blob/ab89bcb443249e1524496b694ddb19e298dca799/src/Timelock.sol#L687-L698
Vulnerability details
Proof of Concept
The current implementation of the
pause
function attempts to cancel all live proposals within a single transaction:This implementation is vulnerable to a DoS attack in the following scenario:
_liveProposals
set.pause
function exceeds the block gas limit.As a result, it becomes impossible to pause the contract, potentially leaving it in a vulnerable state during emergencies
Recommended Mitigation Steps
Separate the pausing mechanism from the proposal cancellation process
Assessed type
DoS
The text was updated successfully, but these errors were encountered: