Centrifuge Protocol

Centrifuge Protocol

@centrifuge
Live

Maximum reward

$250,000

Severity

Max. Reward

Critical

$250,000

High

$50,000

Medium

$5,000

No deposit required

Findings submitted

229

Start date

17 Jul 2025

Please sign in as a researcher to join the bounty.

Log in

In scope

Severity

Min and Max Reward

Critical

Up to $250,000


High

Up to $50,000


Medium

Up to $5,000


Low

Up to $0


Informational

Up to $0

Centrifuge V3.1 operates on a hub-and-spoke model. Each pool chooses a single hub chain, and can tokenize and manage liquidity on many spoke chains.

Out of scope

  • Pool managers (which include hub and balance sheet managers) are fully trusted within the context of their pool.
  • Ability to manipulate prices of the SimplePriceManager if on/offramp manager or sync deposits are enabled is known (by depositing to raise assets) => it is up to the pool manager to manage this, e.g. by using max reserve.
  • Prices computed in SimplePriceManager may be off if approve and issue or approve and revoke are called separately, as then assets and shares are imbalanced.
  • SimplePriceManager.onUpdate may revert, when the ShareClassManager issuance is negative, due to a transfer of shares before a submitQueuedShares, blocking updating a holding value.
  • Hub.createPool can be frontrun leading to griefing
  • Any issue related to arbitrage between different assets/currencies in the same pool. Should be managed by pool manager
  • Any arbitrage related to cross-chain price updates
  • Issues related to cross-chain messages not being executed for a long time, in the wrong order or create race-conditions
  • GasService estimate is under/overestimated.
  • Subsidized funds can be spammed.
  • AsyncRequest._withdraw() using current pricePoolPerAsset which is potentially unlikely pricePoolPerAsset during approval of redemption
  • Only deployed on chains with Cancun EVM support. And no zksync.
  • After Root.relySchedule executes, the timelock does not apply anymore => intentional, combined with spell pattern it works
  • Guardian only works with Safe, if the admin is not a Safe the pause can only be executed by the full Safe and not individual owners
  • Liquidity can be stuck if a user is frozen
  • Liquidity can be stuck if all vaults are unlinked
  • While paused, users can still claim assets/shares
  • Auth pattern does not check that there is at least 1 ward
  • Manager needs to ensure hooks across domains are compatible
  • User needs to ensure they transfer valid share tokens eg member
  • Issues with underlying networks being compromised affecting the pools deployed on that network
  • Missing existence checks in Hub for pool/sc/asset and other IDs
  • Updating vault or request manager can cause loss of pending request state
  • Compromise of underlying chains.