Low Findings
Front-Running Vulnerability in Liquidity Management
Severity: Low
Ecosystem: Sui
Protocol: Full Sail CLMM
Auditor: Asymptotic
Report: https://info.asymptotic.tech/full-sail-clmm-audit
Report Date: May 2025
Description:
The remove_liquidity function in the pool module lacks slippage protection mechanisms, making users vulnerable to front-running attacks that can result in substantial financial losses. Unlike add_liquidity which provides a two-step process allowing users to review amounts before committing, remove_liquidity executes immediately without any user-controlled protection parameters.
Attack Strategy: • Find large positions (>5% of pool liquidity) • Manipulate price to push victim's position out of range • Victim removes large liquidity, reducing pool depth • Exploit reduced liquidity for cheaper price restoration • Profit from asymmetric price impact before/after liquidity removal
The seed for minting does not update
Severity: Low
Ecosystem: Sui
Protocol: MystenLabs Sui
Auditor: OtterSec
Report:
https://ottersec.notion.site/Sampled-Public-Audit-Reports-a296e98838aa4fdb8f3b192663400772
Report Date: May 2023
Description: This field should update after every mint with a new value.