Skip to content

Deposit Capacity Attacks #283

@UlyanaAndrukhiv

Description

@UlyanaAndrukhiv

Context

Current Gap: Tests cover normal usage, need adversarial scenarios.

Missing Test Coverage:

  • Griefing Attacks

    • Attacker creates 1000 positions
    • Each position deposits minimum amount
    • Total consumes all deposit capacity
    • Legitimate users cannot deposit
  • Front-Running Capacity

    • User A prepares large deposit transaction
    • Attacker sees pending transaction
    • Attacker front-runs and consumes capacity
    • User A transaction fails due to insufficient capacity
  • Per-User Limit Bypass

    • User limit = 5% of capacity
    • User creates multiple accounts
    • Each account deposits up to limit
    • Effectively bypasses individual limit (Sybil attack)
  • Capacity Regeneration Manipulation

    • Attacker monitors regeneration timing
    • Submits deposits immediately after regeneration
    • Monopolizes regenerated capacity
    • Legitimate users starved
  • Queued Deposit Exploitation

    • User deposits exceed per-deposit limit
    • Excess queued for async processing
    • User cancels queued deposits after manipulating state
    • Potential for race conditions

Recommended Tests:

Test: Create 100 positions, each deposits 1% of capacity
Test: Front-run large deposit, consume capacity first
Test: User A creates 20 accounts, bypasses per-user limit
Test: Attacker deposits immediately after each regeneration cycle
Test: Queue large deposit, attempt to exploit during async processing

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions