Conversation
Signed-off-by: MathisGD <74971347+MathisGD@users.noreply.github.com>
Co-authored-by: Quentin Garchery <garchery.quentin@gmail.com> Signed-off-by: Adrien Husson <adhusson@gmail.com>
Co-authored-by: Quentin Garchery <garchery.quentin@gmail.com> Signed-off-by: Adrien Husson <adhusson@gmail.com>
Signed-off-by: Adrien Husson <adhusson@gmail.com>
Rubilmax
left a comment
There was a problem hiding this comment.
If we don't also enforce initiator to the withdrawal, the following scenario could happen:
- whitelisted user wraps USDC to verUSDC, deposits verUSDC to vault
- Transfer vault shares to non-whitelisted user
- non-whitelisted user redeems vault shares then unwraps verUSDC to USDC to the bundler (hypothetically whitelisted)
- non-whitelisted user transfers USDC to themselves
|
Interesting case. Note that in any case (even if we prevent this) this scenario could happen:
What I mean is that due to the fact that it's impossible to whitelist vault shares transfers, a malicious whiltelisted person could always make people profit from a vault with an whiltelisted underlying asset. I'm not sure if we need to make a change to withdrawTo. @adhusson wdyt EDIT: hardcoding the receiver wouldn't even fix this case |
|
I may be missing something.
The only way to prevent this would be to also force |
|
you're right, it wouldn't fix anything for classic implementations of permissioned wrappers |
No description provided.