{ skip to content }

Announcing the Winners of the Underhanded Solidity Contest 2022

Posted by Franziska Heintel & USC Judges on April 9, 2022

Announcements

The time has come to share this year's winners of the Underhanded Solidity Contest!

Before we dive into the winning submissions, let's revisit the most important features of the USC:

In a nutshell, the USC is about finding loopholes or “hiding spots” in the Solidity language and using those to write seemingly innocent and straightforward-looking Solidity code which contains malicious behavior or backdoors.

The Underhanded Solidity Contest aims to...

  • Raise awareness about smart contract security.
  • Uncover language design faults.
  • Battle-test recently introduced language features and restrictions.
  • Highlight anti-patterns in smart contact development.
  • Establish new best practices for secure smart contract development.

Each contest has a different theme or topic. This year, the task was to build a decentralized exchange that looks fair, but can be “manipulated”.

In total, we received 19 submissions, 18 of which are eligible for a “qualified submission” Underhanded Solidity POAP NFT. You can find all 18 qualified submissions in this repo.

A big thank you and props to all participants for taking part!

As always, the judges were presented with anonymized submissions and only after the judging process was finished, the identities of the participants were disclosed.

Now, without further ado, let's take a look at the winners, starting with the 3rd place!

Underhanded Solidity Contest 2022 Winners

🥉 Third Place: Michael Zhu

commentary by samczsun

This submission is a simple but elegant reminder that not everything is as it seems. The contract implements a very simple NFT sale mechanism where buyers can place bids and sellers can accept them. For optimization purposes, the addresses of the two assets (the NFT being purchased and the token used for purchasing) are XOR'ed together to form a single unique key. The comments helpfully remind us that the odds of finding another pair of contract addresses which collide to the same key is statistically impossible.

When a bid is accepted, safeTransferFrom is used to move the payment from the bidder to the sender, and transferFrom is used to move the NFT from the sender to the bidder. However, both ERC20 and ERC721 define a transferFrom function with the same parameters, which leads to them having the same selector. Furthermore, safeTransferFrom will succeed even if the token does not strictly comply with the ERC20 spec and returns no boolean. Finally, though it may be obvious to some, XOR is a commutative operation. Therefore, it's possible to accept a fake bid by swapping the ERC20 and ERC721 addresses when accepting a bid. This causes the NFT, rather than the payment token, to be transferred from the bidder. Clearly this is an undesirable result.

Although in its simplified form, the underhanded nature of the optimization might be easily spotted (especially in the context of an underhanded competition), we think that it acts as a good proxy for teaching users how to look past what the code and comments might suggest and read between the lines. Similar methods of thinking lead to the discovery of the Anyswap exploit, and to a lesser extent, the various "fake contract" exploits.

🥈 Second Place: Santiago Palladino

commentary by Hari Mulackal

The submission demonstrates what could go wrong if a non-standard signature scheme is used in contracts. The contract cleverly designs the Order struct in such a way that it can collide with the RLP encoding of an approve transaction. This allows an attacker to reuse the signature for the approve transaction to execute an order in the exchange!

There are several other issues with the implementation, and we leave it up to the reader to uncover all of them!

🥇 First Place: Tynan Richards

commentary by Duncan Townsend

This submission is subtle. Very subtle. Nobody on our judging panel was able to spot the trick without the help of the spoiler file. Although the behavior exploited here is explicitly documented in the Solidity docs, it's absolutely not something that programmers or security experts consider in their day-to-day.

On its face, this submission is a reasonably well implemented constant-product AMM. For those familiar with this kind of DEX, you'll probably recognize the formulas used for adding and removing liquidity, as well as the formula for taking a fee on the swap. This AMM pair helpfully includes the logic required to calculate input and output amounts without the help of a router. There are a number of security concerns that an auditor might catch in this contract that are not the core, catastrophic vulnerability that we're looking for here.

In order of least severe to most, some vulnerabilities caught by the judges are:

  • There's no ability for this AMM to provide a time-weighted average price oracle (or other form of manipulation resistant price oracle).
  • Liquidity isn't tokenized and can only be withdrawn by the same address that provided it.
  • The implementation of sqrt doesn't use the more common Babylonian method and instead uses Newton-Raphson to converge on the correct value.
  • transferFundsIn and transferFundsOut don't support ERC20 tokens that return nothing from their transferFrom and transfer functions. This is a common deviation from the standard, which requires that those functions return bool. The various iterations of SafeERC20 typically handle this.
  • There's no function for synchronizing the internal balances/reserves of the contract with its actual balances. If tokens move into or out of the contract outside of transferFundsIn or transferFundsOut (like a rebase or a direct call to transfer), that change in balances won't be accounted for.
  • There's no protection against loss-of-precision vulnerabilities in addLiquidity which reduces ratio of totalSupply to liquidity. However, this is effectively mitigated by the previous flaw.
  • There's no slippage parameter in trade, addLiquidity, or removeLiquidity, all of which can result in DEX interactions being sandwiched and the trader receiving a reduced payout.

The actual trick is far more catastrophic than any of these. The vulnerability lives in the way that admin fees are claimed. The author of this contract has helpfully added a way for liquidity providers to exit the DEX if the admin of the DEX sets the admin fee too large. A new admin fee can be scheduled, but it won't take effect for 7 days, allowing liquidity providers to exit. However, this protection is implemented wrong in a subtle and catastrophic way.

In Solidity, the order of evaluation of sub-expressions is unspecified. This means that in f(g(), h()), g() might get evaluated before h() or h() might get evaluated before g(). Practically, this order is predictable, but Solidity code shouldn't depend on that behavior between compiler versions. In most circumstances g() is evaluated before h() (left-to-right order), which is also the behavior that most languages specify in their standards. However, in the case of emitting an event with indexed arguments, the arguments are evaluated right-to-left.

Therefore, when the admin calls changeAdminFees, setNewAdminFee is evaluated before retireOldAdminFee. Since retireOldAdminFee calls _claimAdminFees, the new fee is enacted before the tokens are accounted and transferred. The require on line 67 is effectively useless because the 7-day delay in nextFeeClaimTimestamp hasn't been set yet. Additionally, there's no cap on newAdminFee. It can bet set above ONE (10**18), so it can be set high enough that the entire balance/reserves of the trading pair can be drained by the admin.

Although this submission is long and contains many red herrings, the judges chose it as our USC 2022 winner because of how the flaw is hidden in plain sight. A good unit test or fuzzer would definitely find this vulnerability, but manual code review was unable to catch it. We applied the standard that a successful USC submission is one that could trick a careful smart contract developer into trusting it with their money, only to steal it anyways. In that regard, this contract is an absolute winner. Additionally, this submission highlights an aspect of Solidity that most developers and auditors are probably unaware of. Order of evaluation of subexpressions doesn't usually matter, but in this case, it makes all the difference.

And here is that documentation I promised.

Honorable Mentions

💐 William Bowling

commentary by Anton Permenev

With Solidity v0.8, developers don't have to think about the overflow in arithmetic operations.

This submission is a good reminder that bit shift << and >> operators are not among the arithmetic ones, and thus don't revert on overflow.

However, such operators are quite rare and their usage is suspicious and raises eyebrows.

Trick us at the next Underhanded Solidity Contest, anon!

Once again, the Underhanded Solidity Contest showed interesting anti-patterns and intriguing ways to embed malicious exploits into smart contract systems. We can't wait to see what you come up with next time!

Thanks to ChainSecurity, ConsenSys Diligence, Immunefi, Solidified, Trail of Bits, Paradigm, the Ethereum Foundation for their support!

Last but not least, we'd like to extend a big thank you to our amazing judges for helping us make this contest happen: Alex Beregszaszi, Anton Permenev, Duncan Townsend, Gonçalo Sá, Hari Mulackal, Josselin Feist, samczsun and Stefan Beyer. 👏

Would you like to propose a topic for the next Underhanded Solidity Contest, provide feedback, or help with judging the next time? Then feel free to reach out to us at sol_underhanded@ethereum.org!

We will be in touch with all participants shortly with details on the claiming process for the NFTs as well as the main prizes.

Previous post

Next post

Get involved

GitHub

Twitter

Mastodon

Matrix

Discover more

BlogDocumentationUse casesContributeAboutForum

2023 Solidity Team

Security Policy

Code of Conduct