Crypto Flexs
  • DIRECTORY
  • CRYPTO
    • ETHEREUM
    • BITCOIN
    • ALTCOIN
  • BLOCKCHAIN
  • EXCHANGE
  • TRADING
  • SUBMIT
Crypto Flexs
  • DIRECTORY
  • CRYPTO
    • ETHEREUM
    • BITCOIN
    • ALTCOIN
  • BLOCKCHAIN
  • EXCHANGE
  • TRADING
  • SUBMIT
Crypto Flexs
Home»HACKING NEWS»Lido Triggerable Withdrawal Audit – Ackee Blockchain
HACKING NEWS

Lido Triggerable Withdrawal Audit – Ackee Blockchain

By Crypto FlexsNovember 20, 20255 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Lido Triggerable Withdrawal Audit – Ackee Blockchain
Share
Facebook Twitter LinkedIn Pinterest Email

Lido is a decentralized liquid staking protocol for Ethereum. Triggerable withdrawals are a new feature based on the EIP-7002 standard that allows the withdrawal of validators who have previously deposited via the Lido protocol.

The main purpose of triggerable withdrawals is to allow Lido DAO to withdraw funds locked in a validator when the node operator refuses to submit a withdrawal request. This feature was made available after EIP-7002 was implemented on mainnet.

Withdrawal triggers are unauthorized. However, the user must either provide data whose hashes match what they have already submitted in Easy Track or trigger the shutdown after Oracle provides the report data.


Lido worked with Ackee Blockchain Security to conduct a security review of Lido Triggerable Withdrawals, donating a total of 38 engineering days from June 5 to July 14, 2025. Ten engineering days were allocated to manually guided fuzzing using Wake.

Lido then worked with Ackee Blockchain Security to conduct a revision review of the results of previous revisions. The review was conducted between July 23 and July 25, 2025, and revealed no new findings.

Lido conducted a third review in collaboration with Ackee Blockchain Security. This time, we donated 0.5 total engineering days for the period between September 8 and September 16, 2025, a change since the previous revision and no new results were found.

methodology

We began our review by implementing and running manually guided differential fuzz tests in Wake to verify the correctness of the new features and ensure that the changes did not break existing invariants. Fuzzing was conducted targeting contracts that were forked from the mainnet and related contracts that were upgraded to the latest version. This ensures full compatibility with mainnet deployments. Two staking modules were used to test the triggerable withdrawal feature: Node Operator Registry and Community Staking Module v2. More information about the fuzzing process can be found in the full audit report linked at the end of this article.

In parallel, we performed an in-depth manual review of the code, focusing particularly on triggerable retract functionality, compatibility with EIP-7002, and new code changes (commits) since the last audit. 1ffbb7e). During our review we focused on:

  • A permissionless mechanism that triggers validator termination;
  • Compatibility with EIP-7002;
  • Explore new attack vectors due to triggerable fetch functionality
  • A permissionless mechanism for reporting delayed termination validators;
  • Ensures that all state variables are updated appropriately and that immutability is not broken.
  • Ensure access controls are neither too lax nor too strict. and
  • I’m looking for common problems like data validation.

Static analysis tools were also used to review the code, resulting in I4 and I5.

range

The first audit was performed on commit. 628c873 In the core repository, the scope is:

  • contracts/0.4.24/nos/NodeOperatorRegistry.sol
  • contracts/0.8.9/LidoLocator.sol
  • contracts/0.8.9/StakingRouter.sol
  • contracts/0.8.9/TriggerableWithdrawalsGateway.sol
  • contracts/0.8.9/WithdrawalVault.sol
  • contracts/0.8.9/WithdrawalVaultEIP7002.sol
  • contracts/0.8.9/oracle/AccountingOracle.sol
  • contracts/0.8.9/oracle/ValidatorsExitBus.sol
  • contracts/0.8.9/oracle/ValidatorsExitBusOracle.sol
  • contracts/0.8.9/lib/ExitLimitUtils.sol
  • contracts/0.8.25/lib/BeaconTypes.sol
  • contracts/0.8.25/lib/GIndex.sol
  • contracts/0.8.25/lib/SSZ.sol
  • contracts/0.8.25/ValidatorExitDelayVerifier.sol

Early review commit 8beee97 Changed to a commit 4 days after the start of the audit. 628c873.

The classification of security findings is determined by two subscales: Impact and Probability. This two-dimensional rating provides a more noise-free view of the severity of the problem without loss of information. The probability factor reduces the severity of intermediate issues that the team typically recognizes as information and warnings.

Here are the results of our review: 11 items found Severity levels range from information to low severity. The most severe findings, L1 and L2, are respectively associated with limited responsiveness of the system when changing shutdown limiting configuration parameters and inconsistencies in the total number of shutdown requests processed. The overall code quality is high, with comprehensive documentation and good architecture.

critical severity

No critical severity issues were found.

Severity High

No high severity issues were found.

medium severity

No medium severity issues were found.

low severity

L1: Termination limits updated inconsistently when configuration changes

L2: Inconsistent calculation of total requests processed

warning severity

W1: Call to unimplemented function

W2: Missing interface inheritance.

w3:outdated IConsensusContract interface

W4: _setExitDeadlineThreshold underflow

Information Severity

I1: Code optimization

I2: Lack of event occurrence

I3: Lack of context for deprecated function NatSpec

I4: Unused error

I5: Deprecated using-for directive

trust model

Lido allows unauthorized triggering of validator termination when a validator is included in a report submitted via Easy Track or Oracle. This protocol relies on two trusted components to submit retraction reports:

The flow to trigger validator termination via Easy Track is as follows:

  1. The hash of the report is submitted to: SUBMIT_REPORT_HASH_ROLE Role assigned to Easy Track;
  2. Anyone can submit report data using the same hash you provided in the first step. and
  3. Anyone can trigger the termination of any validator included in the report.

The flow to trigger validator termination via Oracle is as follows:

  1. A hash of the report is submitted by consensus agreement.
  2. Report data will be submitted to: SUBMIT_DATA_ROLE by role or consensus membership; and
  3. Anyone can trigger the termination of any validator included in the report.

Easy Track is an on-chain component that performs lightweight voting. If the minimum objection threshold is not met, the proposal passes.

Trigger Exits Bot is an off-chain component that ensures withdrawal requests are not unnecessarily delayed so that users can experience a smooth exit.

The Validator Late Prover Bot is an automated tool that detects and reports late validators who fail to terminate within the required time period after requesting termination.

Addresses containing: ADD_FULL_WITHDRAWAL_REQUEST_ROLE Roles can submit withdrawal requests through the Triggerable Withdrawal Gateway.

To use the Staking Router feature, the caller’s address must be assigned a specific role.

conclusion

Ackee Blockchain Security recommended Lido Finance:

  • Ensures that contract upgrades and initialization occur atomically to prevent proactive attacks that could lead to loss of control over the contract.
  • It is always inherited from the interface of the contract that implements the interface. and
  • Address any identified issues.

Ackee Blockchain Security’s full Lido Finance Triggerable Withdrawals audit report can be found here.

We were delighted to thank Lido Finance and look forward to working with them again.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Vault12 Guard now uses the CXP industrial protocol to retrieve iOS credentials from Apple Password.

November 18, 2025

Cryptocurrency romance scams are now not only a consumer scam, but also a national threat.

November 16, 2025

As RWA momentum accelerates, BlackRock’s BUILD launches on the BNB chain.

November 14, 2025
Add A Comment

Comments are closed.

Recent Posts

BTC price could be range-bound to $60,000-$80,000 pending a rate cut.

November 20, 2025

VerifiedX Partners With Crypto.com For Institutional Custody And Liquidity Solution

November 20, 2025

Bitcoin Policy Institute Launches Interactive US Tax Payment Model to Support Bitcoin For America Act

November 20, 2025

Lido Triggerable Withdrawal Audit – Ackee Blockchain

November 20, 2025

Numerai Raises $30 Million Series C Led By Top University Endowments, At $500 Million Valuation

November 20, 2025

Logos Unifies Under One Identity To Deliver A Private Tech Stack To Revitalise Civil Society

November 20, 2025

Tapbit Marks 4th Anniversary With Continued Focus On Innovation And User Trust

November 20, 2025

Reuters: Brazil considers taxing international cryptocurrency payments

November 20, 2025

3 Altcoins enter the danger zone

November 20, 2025

Touareg Group Technologies Co. Launches With USD 1 Billion Capital To Power TrustglobeX — A New Era For Global Crypto Exchange

November 20, 2025

MultiVM Support Now Live On A Supra Testnet, Expanding To EVM Compatibility

November 19, 2025

Crypto Flexs is a Professional Cryptocurrency News Platform. Here we will provide you only interesting content, which you will like very much. We’re dedicated to providing you the best of Cryptocurrency. We hope you enjoy our Cryptocurrency News as much as we enjoy offering them to you.

Contact Us : Partner(@)Cryptoflexs.com

Top Insights

BTC price could be range-bound to $60,000-$80,000 pending a rate cut.

November 20, 2025

VerifiedX Partners With Crypto.com For Institutional Custody And Liquidity Solution

November 20, 2025

Bitcoin Policy Institute Launches Interactive US Tax Payment Model to Support Bitcoin For America Act

November 20, 2025
Most Popular

Is encryption a traditional finance 2.0?

February 13, 2025

Akash Network Surges 20%, AAVE and KASPA Seek Further Gains

June 29, 2024

SHIBA INU Price Analysis: Shib Whales quietly move millions to Wallitiq (WLTQ). What is the leading shift?

January 28, 2025
  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms and Conditions
© 2025 Crypto Flexs

Type above and press Enter to search. Press Esc to cancel.