From 80720896b6638b69c108ac6aa83ce3e3c3918b20 Mon Sep 17 00:00:00 2001 From: bt3gl <1130416+bt3gl@users.noreply.github.com> Date: Mon, 13 Jun 2022 18:03:46 -0700 Subject: [PATCH] Update polygon.md --- Top-Immunefi-Vulnerabilities/polygon.md | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/Top-Immunefi-Vulnerabilities/polygon.md b/Top-Immunefi-Vulnerabilities/polygon.md index 00a3e13..9ad2409 100644 --- a/Top-Immunefi-Vulnerabilities/polygon.md +++ b/Top-Immunefi-Vulnerabilities/polygon.md @@ -55,12 +55,12 @@ updateTimeline(-(int256(amount) + delegationAmount), -1, targetEpoch); 1. Create a new validator using the stakeFor function. 2. Call the buyVoucher function with a big delegated amount to buy the shares of the validators by staking tokens. 3. The attacker can now repeat the following steps until validatorState.amount (total staking power) is low enough to bypass the consensus majority check (⅔) requirement. - a. Catch an available validator slot via an on-chain auction process which happens at regular intervals. - b. Migrate staking tokens into that validator by calling a migrateDelegation function. - c. Unstake the validator. (validatorState.amount is decreased again) - d. Wait for a checkpoint (for this validator slot to open) + a. Catch an available validator slot via an on-chain auction process which happens at regular intervals. + b. Migrate staking tokens into that validator by calling a migrateDelegation function. + c. Unstake the validator. (validatorState.amount is decreased again) + d. Wait for a checkpoint (for this validator slot to open) -* These steps will repeatedly decrease the total staking power by the same amount of delegated amount for each iteration. An attacker can repeat this until the total staking power is low enough to start accepting new checkpoints. He can bypass the required ⅔ consensus majority check. An attacker can lower the total staking power up to a low point that a sole validator can pass the majority check. +These steps will repeatedly decrease the total staking power by the same amount of delegated amount for each iteration. An attacker can repeat this until the total staking power is low enough to start accepting new checkpoints. He can bypass the required ⅔ consensus majority check. An attacker can lower the total staking power up to a low point that a sole validator can pass the majority check.