I received a message on Telegram from username drdr_zz:
Damian, [31.08.21 11:40]
Hey, are you the CTO of Schnoodle? You have a vuln in your code. Do you have any seucrity disclosure process or bug boiunty program?Neo, [31.08.21 11:50]
Yes, what's the vuln?Damian, [31.08.21 11:53]
I would rather do it officially, do tou have any security process or bug bounty program?Neo, [31.08.21 11:55]
Not per se. But if the vulnerability is serious, then happy to talk about a reward.Damian, [31.08.21 11:55]
You can verify me on Twitter drdr_zz. Just to make sure - are you working on any vuln at the moment?Neo, [31.08.21 11:55]
NoDamian, [31.08.21 11:56]
You are using govwrnance right?Neo, [31.08.21 11:56]
yesDamian, [31.08.21 11:56]
https://github.com/schnoodledefi/contracts/blob/15cab8b4fa28a5eb410e4ef0143d426007281a8b/contracts/SchnoodleGovernance.solthis one, right?
Neo, [31.08.21 11:56]
yesDamian, [31.08.21 11:56]
and this version: "@openzeppelin/contracts": "^4.2.0",it has a crit vuln that allows to gain admin in governance and someone couldk call changeFeePercent and make it 100% and DoS your contracts. you must update gvernance asap. If you need a PoC let me know.
Neo, [31.08.21 12:23]
Some questions:
- Is this resolved by upgrading to OpenZeppelin Contracts 4.3.1?
- Does OpenZeppelin know about this vulnerability? If so, please share reference.
- Did OpenZeppelin document this vulnerability? If so, please share link.
- Did OpenZeppelin put this in their release notes? If so, please share link.
- Where in the code is this vulnerability? Is it in OpenZeppelin base code, or Schnoodle concrete code? Please could you point it out?
- Are there other verifiable instances of this vulnerability in other contracts? If so, please share link.
- How did you find this vulnerability yourself? What is your interest in Schnoodle? Or, are you searching for all contracts that use this OpenZeppelin Contracts version?
- What would be the nature of the PoC? Please clarify what you mean by that.
- How would a DoS take place in this case? Where is the code susceptible to this precisely?
And lastly:
- What is your motivation?
- How much would you expect as a bounty if this is found to be an issue?
Is this most likely a scam, or something I should be concerned about?