Replies: 5 comments 3 replies
-
I think your colleagues caught up on a good point regarding security. If we have automatic payment live without considering security, there may be an attack vector. because every step is fully automatic starting from I am still not sure how the attack vector looks like but we SHOULD dig into it and make the automatic payment live after that. |
Beta Was this translation helpful? Give feedback.
-
I will keep posting my research about that |
Beta Was this translation helpful? Give feedback.
-
Yes it is possible if supabase is compromised. An attacker can update all wallet addresses and bounty hunters, if not paying enough attention to a withdraw address, can claim future bounties directly to the attacker's address. All currently unclaimed bounties won't be affected because attacker would need a bot's private key to modify permits. But if the attacker has the bot's private key it is simpler for the attacker to move funds directly from the bot's address. For now I would restrict automatic payments only for amounts, say less than 100$. Then, when we intergrate multisig, we could remove this restriction. Another layer of security is simply adding a banner "check the withdraw address" at https://pay.ubq.fi/ |
Beta Was this translation helpful? Give feedback.
-
We can invalidate a permit nonce https://github.com/Uniswap/permit2/blob/main/src/SignatureTransfer.sol#L130 |
Beta Was this translation helpful? Give feedback.
-
Possible attack vectors1/ Update wallet addresses for hunters by compromising supabase project. 2/ Drain funds from the admin wallet by acting as an assignee by exploiting the normal bounty process. [x] Anyone can be assigned by himself using How to preventIt should be continuously tried to figure out. It looks like either of us doesn't have a clear solution to prevent it. my quick suggestion is to add admins confirmation to both |
Beta Was this translation helpful? Give feedback.
-
One of my colleagues had a security related concern about updating wallet addresses. Can you walk me through how an exploit could occur, and what measures are being put into place to combat these vectors?
The scenario he presented was if somebody is able to update all the wallets in our system and then front-run/claim new bounties posted. I think its unlikely to occur but I didn't have an answer for him as I am not 100% clear on the full architecture related to this system.
Originally posted by @pavlovcik in #138 (comment)
Beta Was this translation helpful? Give feedback.
All reactions