Title: [ARFC] Retroactive bug bounties proposal (pre-Immunefi)
Author: BGD Labs @bgdlabs
Date: 2024-01-09
Request for bounties pending from before the setup of the Aave <> Immunefi official bug bounty program, amounting a grand total of $86’500.
The objective of this ARFC is to pre-authorise such payments, to be processed via an on-chain AIP
Before the setup of the Aave <> Immunefi bug bounty program on September 25th 2023, security reports by white hats where evaluated in an ad-hoc basis, proposing bounties/rewards following an approach like on this proposal. That was not optimal, as there was no formal scope defined, or strict ranges of bounties depending on severity and impact.
Currently, every report is being processed via Immunefi and the rules of the Aave program, however, there were other reports submitted via other channel before that (usually security@aave.com). As these reports should be evaluated at time of submission for fairness, and outside of the Immunefi scope defined afterwards, we think it is a good idea to reward them separately and retro-actively outside the program.
First of all, we want to clarify certain aspects for the community:
When calling borrow() with stable rate mode on Aave v2 and v3, one of the validations is that not more than a percentage of the total available liquidity can be borrowed at once.
However, swapBorrowRateMode() doesn’t validate the same, which is unexpected and could lead to more stable rate borrowings than intended.
It is important to highlight that this is not possible at the moment, with minting of stable rate disabled.
Severity: Low
The issue didn’t create any immediate problem in the protocol, but overexposure to stable rate mode is not expected.
Likelihood: Certain
This problem was present on the deployed versions of Aave v2 and v3, on those assets with stable rate enabled.
Proposed bounty: 10’000 USD
When swapping borrow rate mode, the HF of an user is not validated, as debt should remain the same. However, under edge scenarios, the HF of an user could slightly change (by ~1 unit of lowest asset’s decimals).
Severity: No impact
This is not a bug or creates any exploit scenario, but it is unexpected behaviour.
Likelihood: Certain
This problem was present on the deployed versions of Aave v2 and v3, on those assets with stable rate enabled.
Proposed bounty: 5’000 USD
By executing a complex strategy (involving compromising the asset’s trusted infrastructure), it could be possible to inflate the price of one of the assets listed on Aave v2.
Even if this belongs more to the centralisation risk of the asset, and we don’t consider a bug of the protocol, it was taken into account for off-boarding consideration of the asset by risk providers of Aave, and we believe it is fair to reward retro-actively.
As this risk still exist on the asset itself and more protocols could be using it, even if we don’t really see any immediate risk, we will not be disclosing at the moment details of it, until the team applies extra measures.
Severity: Critical
Being a price manipulation, the impact on the protocol would hypotetically be important.
Likelihood: Not likely
The attack involves compromising asset’s infrastructure (which would directly disqualify on the current Aave <> Immunefi program), together with extra techniques; so we consider it theoretically possible, but highly improbable.
Proposed bounty: 65’000 USD. Additionally, 6’500 USD as Immunefi fee.
If this ARFC is positive, afterwards we will proceed with an on-chain governance proposal, releasing the funds to the corresponding addresses.