Note: Questions 1 & 2 are based on the below code snippet. You will see the same code snippet for these two questions. The questions are below the code snippet.
Question 1 ✅
contract USDCCollateral {// This is a contract that's part of a larger system implementing a lending protocol// This particular contract concerns itself with allowing people to deposit USDC as collateral for their loans// A list of all the addresses lendingaddress[] lenders;// A mapping to allow efficient is lender checksmapping(address=>bool) isLender;addressimmutable lendingPlatform;address token =ERC20(USDC_ADDRESS);// We use a mapping to store the deposits of all lendersmapping (address=>bool) balance;// USDC is very stable, so for every 1 USDC you can borrow 1 DAI or 1 USD worth of the other currency// Similar to other lending platforms, this lending system uses an oracle to determine how much one can borrow. // The following describes how the system determines the max borrow value (ignoring precision for simplicity).// maxBorrow = (collateralRatio * underlying * underlyingValueUSD) / otherValueUSD // This encodes the margin requirement of the system.uint collateralRatio =100_000_000; constructor() { periodicFee =1;// approved collateral contracts are deployed by the lending platform// assume it is implemented correctly, and doesn't allow false collateral contracts. lendingPlatform = msg.sender; }functiondeposit(uint amount) external {require(!isLender[msg.sender]); isLender[msg.sender] =true; lenders.push(msg.sender); ... }functioncomputeFee(uint periodicFee,uint balance) internalreturns (uint) { // Assume this is a correctly implemented function that computes the share of fees that someone should receive based on their balance.
}// this function is called monthly by the lending platform// We compute how much fees the lender should receive and send it to themfunctionpayFees() externalonlyLendingPlatform {for (uint i=0; i<lenders.length; i++) {// Compute fee uses the balance of each lenderuint fee =computeFee(periodicFee, balance[lenders[i]]); token.transferFrom(lendingPlatform, lenders[i], fee); } } ...}
Lending platforms have a few options to configure when it comes to adding new tokens as collateral. For example, you’ll have to set up an oracle for the price of the collateral, and you have to configure a margin requirement. The security concern with using the given collateral configuration is:
Question 2 ✅
Assuming payFees() is periodically called by a function, which iteratively calls payFees() of all collateral contracts, the security concern(s) is/are:
Question 3 ✅
modifiernoETH {require(balanceOf(this) ==0); _;}
The developers want to prevent people from accidentally sending ETH instead of WETH and have implemented a noETH modifier, as defined above, and annotated the deposit function with it. They have also not implemented a receive function. Which of the following statements is true?
My comment:
This modifier brings DoS because attacker can forcefully send ETH to the contract, for example, via selfdestruct(). In that case, this contract's balance will be nonzero and this modifier makes functions unusable.
Developers have used assembly to make their code a bit less repetitive. They use it to annotate a bunch of functions that have as their last argument a pool address. Unfortunately they made a mistake. Which of the following options fixes the bug?
Questions 5 & 6 are based on the below code snippet. You will see the same code snippet for these two questions. The questions are below the code snippet.
Question 5 - This one tricky
interface Lender {functiononLiquidation() external;}interface IERC20 {eventTransfer(addressindexed from, addressindexed to, uint256 value);eventApproval(addressindexed owner, addressindexed spender, uint256 value);functiontotalSupply() externalviewreturns (uint256);functionbalanceOf(address account) externalviewreturns (uint256);functiontransfer(address to,uint256 amount) externalreturns (bool);functionallowance(address owner,address spender) externalviewreturns (uint256);functionapprove(address spender,uint256 amount) externalreturns (bool);functiontransferFrom(address from,address to,uint256 amount) externalreturns (bool);}contract ERC20Collateral {// This contract is different from the one in Questions 1 & 2, please read it carefully!!!// This is a contract that's part of a larger system implementing a lending protocol// A list of all the addresses lendingaddress[] lenders;// A mapping to allow efficient is lender checksmapping(address=>bool) isLender;addressimmutable lendingPlatform = msg.sender; IERC20 token;// We use a mapping to store the deposits of all lendersmapping (address=>uint256) balance;eventLiquidation(addressindexed lender, uint256 liquidatedAmount);constructor(IERC20_token) {// Consider this contract is now part of a new permissionless factory// built by the protocol. The factory behaves very much like a UniswapV2 factory// that allows anyone to deploy their own collateral contract token = _token; }functiondeposit(uint amount) external { isLender[msg.sender] =true; lenders.push(msg.sender); token.transferFrom(msg.sender, lendingPlatform, amount); balance[msg.sender] += amount; }functionliquidate(address lender) external {// We call the protocol factory to check for under-collateralization conditionsrequire(lendingPlatform.undercollateralized(lender, balance[lender]));uint256 oldDeposit = balance[lender]; balance[lender] =0;uint256 fee = oldDeposit /1000; // fee ratio == 1/1000// Give the caller his liquidation execution fee token.transferFrom(address(this), msg.sender, fee);// Transfer the rest of the collateral to the platform token.transferFrom(address(this), lendingPlatform, oldDeposit - fee);// Now ping the liquidated lender for him to be able to react to the liquidation// We need to use a low-level call because the lender might not be a contract// and the compiler checks code size on high-level calls, reverting if it's 0address(lender).call(abi.encodePacked(Lender.onLiquidation.selector));emitLiquidation(lender, oldDeposit - balance[lender]); }}
The lending protocol has also built in a liquidation function to be called in the case of under-collateralization. Anyone can call the function and be rewarded for calling it by taking a small percentage of the liquidation. The liquidation function has a vulnerability which can be exploited because:
Comment:
At first the code might look like the checks-effects-interactions pattern is followed (ie. no harmful reentrancy is possible) but there's actually another check happening when the Liquidation event is emitted: If the current balance is suddenly larger than the oldDeposit. Since the lender is called before this check happens, they could reenter via the deposit() function and increase the balance causing the liquidation to fail (ie. potentially making the position "unliquidatable").
Aside from answer B, the other options are mostly nonsensical decoys.
Question 6 ✅
Assume that the vulnerability referenced in the previous question has been fixed by changing the line with the Liquidation event emission to emit Liquidation(lender, oldDeposit). The protocol team has built a bot that monitors and liquidates under-collateralized positions automatically. Even though the bot does not monitor the mempool, it simulates the full transaction and, if successful, sends transactions with the exact amount to be able to execute the function + 100000 gas for minimal execution in the onLiquidation() callback. Which of these attacks can be executed in a harmful way towards the protocol?
Comment:
First option is nonsensical.
Although the revert via reentrancy in the deposit() function has been fixed, it's still possible that the bot is simply frontrun by a lender who increases their collateral via deposit() just in time to make the bot's liquidation attempt fail.
A liquidated lender could, when called, only use up all of the gas it was given via the CALL, which is 63/64 of the total gas. With a sufficiently high gas limit it is still possible to liquidate the lender.
Gas tokenization is no longer viable since EIP-3529 has reduced refunds.
Question 7 ✅
In the context of Questions 5 and 6, someone built a MEV frontrunner bot that is exploiting liquidations in different protocols. It monitors the mempool for collateral contracts deployed from the lending factory and simulates transactions in a mainnet fork within Foundry to check whether it should attack them. The logic behind the bot is that it checks only the token’s “Transfer” events for its success conditions. More precisely, it checks if there is liquidity in an AMM to exchange to ETH and make sure it turns a profit at the end. If so, it sends a Flashbot bundle to make a profit by frontrunning the liquidator. Knowing the factory for this new contract is permissionless, how could you extract assets out of this bot?
Comment:
Griefing the bot would not extract assets from it.
Since it's using Flashbot Bundles, frontrunning it should not be possible since the transaction would be private.
Question 8 ✅
// Assume as adding to the code shown for Questions 5 & 6contract ERC20Collateral {// This is a contract that's part of a larger system implementing a lending protocol ...functiontransferCollateral(address signer,address receiver,uint256 amount,bytes32 sigR,bytes32 sigS,uint8 sigV ) external {require(signer !=address(0),"INVALID_SIGNER");// Check that the signer is the one who actually signed the messagerequire(signer ==ecrecover(keccak256(abi.encodePacked(receiver, amount)), sigV, sigR, sigS )); deposits[receiver] += amount; deposits[signer] -= amount; } ...}
The protocol implemented a function to transfer collateral from lender A to lender B with a signature from A, as shown above. Is there a way you can break it?
Comment:
There's nothing preventing the same signature to be re-used over and over again. So as long as the signer has a balance higher than the signed amount, the receiver can transfer their collateral.
Even if the code would keep track of the signatures that were already used once, the code would still be exploitable via signature malleability. A correct way to fix it would be to track a nonce for each signer.
A malformed signature would cause ecrecover to return a zero-address, but is prevented since the return value must be equal to the signer who may not be the zero-address.