Submitted by QuantumBrief
DDOS to liquidity providers in BalLiquidityProvider.
An attacker can front-run liquidity providers by sending 1 Wei of the asset to make the balance not equal to the input. This can be repeated and be used to impede the liquidity provider from using the function which will always revert since bal != _request.maxAmountsIn[i]
Balances shouldnt be required to be equal to an input variable. An attacker can always make the balance a little bigger.  This check should be removed or changed to require (bal >=  _request.maxAmountsIn[i]).
0xMaharishi (Aura Finance) acknowledged, but disagreed with severity and commented:
0xMaharishi (Aura Finance) resolved:
