Latest news about Bitcoin and all cryptocurrencies. Your daily crypto news habit.
Claims by a self-professed white-hat hacker about a major security risk to SushiSwap liquidity providers have been rejected by one of the exchangeâs devs.
One of the developers behind popular decentralized exchange SushiSwap has rejected a purported vulnerability reported by a white-hat hacker snooping through their smart contracts.
According to media reports, the hacker claimed to have identified a vulnerability that could place more than $1 billion worth of user funds under threat, stating they went public with the information after attempts to reach out to SushiSwapâs developers resulted in inaction.
The hacker claims to have identified a âvulnerability within the emergencyWithdraw function in two of SushiSwapâs contracts, MasterChefV2 and MiniChefV2â â contracts that govern the exchangeâs 2x reward farms and the pools on SushiSwapâs non-Ethereum deployments, such as Polygon, Binance Smart Chain and Avalanche.
While the Emergency Withdraw function allows liquidity providers to immediately claim their liquidity provider tokens while forfeiting rewards in the event of an emergency, the hacker claims the feature will fail if no rewards are held within the SushiSwap pool â forcing liquidity providers to wait for the pool to be manually refilled over a roughly 10-hour process before they can withdraw their tokens.
âIt can take approximately 10 hours for all signature holders to consent to refilling the rewards account, and some reward pools are empty multiple times a month,â the hacker claimed, adding:
âSushiSwapâs non-Ethereum deployments and 2x rewards (all using the vulnerable MiniChefV2 and MasterChefV2 contracts) hold over $1 billion in total value. This means that this value is essentially untouchable for 10-hours several times a month.âÂ
However, SushiSwapâs pseudonymous developer has taken to Twitter to reject the claims, with the platformâs âShadowy Super Coderâ Mudit Gupta stressing that the threat described âis not a vulnerabilityâ and that âno funds are at risk.â
Gupta clarified that âanyoneâ can top up the poolâs rewarder in the event of an emergency, bypassing much of the 10-hour multi-sig process the hacker claimed is needed to replenish the rewards pool. They added:
âThe hackerâs claim that someone can put in a lot of lp to drain the rewarder faster is incorrect. Reward per LP goes down if you add more LP.â
Related: SushiSwapâs token launchpad, MISO, hacked for $3M
The hacker said they had been instructed to report the vulnerability on bug bounty platform Immunefi â where SushiSwap is offering to pay rewards of up to $40,000 to users who report risky vulnerabilities in its code â after they first reached out to the exchange.
They noted that the issue was closed on Immunefi without compensation, with SushiSwap stating it was aware of the matter described.
Disclaimer
The views and opinions expressed in this article are solely those of the authors and do not reflect the views of Bitcoin Insider. Every investment and trading move involves risk - this is especially true for cryptocurrencies given their volatility. We strongly advise our readers to conduct their own research when making a decision.