• Dapps:16.23K
  • Blockchains:78
  • Active users:66.47M
  • 30d volume:$303.26B
  • 30d transactions:$879.24M

Code4rena Identifies Vulnerability in DittoETH

user avatar

by Giorgi Kostiuk

2 years ago


  1. Vulnerability Discovery
  2. Mechanism of the Vulnerability
  3. Countermeasures and Consequences

  4. The decentralized auditing platform Code4rena discovered a vulnerability in an upcoming patch of the DittoETH algorithmic stablecoin platform. The exploit would have allowed a user with a large amount of deposited tokens to make excessive profits, increasing bad debts in the protocol and ultimately compromising its ability to survive.

    Vulnerability Discovery

    The vulnerability was identified by Code4rena, a crowd-sourced auditing platform. This discovery ensures that the vulnerability will not be added to the production version of DittoETH, as it has been mitigated in a newer test version.

    Code4rena's participants are divided into three groups: sponsors, wardens, and judges. Sponsors are Web3 protocols that offer rewards for discovering vulnerabilities. Wardens compete to discover vulnerabilities in exchange for prize money. Judges adjudicate disputes between sponsors and wardens about whether a vulnerability is real and its severity.

    Mechanism of the Vulnerability

    According to a report from one of the Code4rena wardens, the vulnerability was related to a faulty mechanism for distributing stablecoin rewards to depositors in DittoETH's yDUSD vault. Users can add the stablecoin dUSD to this vault to receive a yield.

    The warden discovered a mathematical flaw in the "matchIsDiscounted" function that could create large amounts of debt from a small amount of trading volume, contradicting the protocol's intended design. This could lead to disproportionate new debt creation and token minting.

    Countermeasures and Consequences

    After identifying the vulnerability, the warden posted an explanation on the project's GitHub. Initially, the DittoETH team and at least one Code4rena judge claimed that an attacker would not be able to create bad debt because other members would join the pool and "dilute" the attacker's gains.

    However, further tests demonstrated that the attack was indeed possible, allowing the attacker to gain significant profits. Ultimately, the judge confirmed the vulnerability, and the DittoETH representatives acknowledged its validity.

    This vulnerability concerned a non-production copy of the protocol's code. However, if it had been missed, it could have been deployed to the blockchain and exploited by attackers.

    The discovered vulnerability in the DittoETH platform highlights the importance of thorough and regular audits to ensure the security of DeFi protocols. In this case, the prompt actions of Code4rena helped prevent potential financial losses and damage to the platform's reputation.

0

Rewards

chest
chest
chest
chest

More rewards

Discover enhanced rewards on our social media.

chest

Other news

XWIN Research Japan Identifies 93,000 as Medium-Term Target for Bitcoin

chest

XWIN Research Japan identifies 93,000 as a potential medium-term target for Bitcoin, emphasizing the importance of CME gaps in trading.

user avatarJacob Williams

PEPE Faces Critical Support Challenge Amidst Market Fluctuations

chest

PEPE is facing a critical support challenge in the meme coin market, with potential implications for its price movement.

user avatarZainab Kamara

Bitcoin Surges Above $82,000 Amid US-Iran Agreement Hopes

chest

Bitcoin's price rose above $82,000 as markets reacted to potential US-Iran agreement news.

user avatarSon Min-ho

Long-Term Projections for Bitcoin: Up to 29 Million by 2050

chest

Matthew Siegel has made a long-term projection suggesting that Bitcoin could climb to as much as 29 million per coin by 2050.

user avatarAyman Ben Youssef

US Bitcoin ETFs See $532 Million in Inflows Amid Market Recovery

chest

US spot Bitcoin ETFs saw a remarkable start with $532 million in single-day inflows, led by BlackRock's IBIT and Fidelity's FBTC.

user avatarTando Nkube

Privacy Researcher Reveals Chrome's Covert AI Model Download

chest

A privacy researcher reveals that Google Chrome is downloading a 4GB AI model named Gemini Nano without user consent, raising significant privacy concerns.

user avatarKofi Adjeman

Important disclaimer: The information presented on the Dapp.Expert portal is intended solely for informational purposes and does not constitute an investment recommendation or a guide to action in the field of cryptocurrencies. The Dapp.Expert team is not responsible for any potential losses or missed profits associated with the use of materials published on the site. Before making investment decisions in cryptocurrencies, we recommend consulting a qualified financial advisor.