A malicious actor could attempt to call the refinance function with a very large refinances array. Each element of the array requires a certain amount of computational resources to process. When the array is large, it can lead to excessive resource consumption, causing the function call to exceed the block gas limit and hence fail.
This vulnerability can only be exploited if:
The function accepts an array as input and performs operations that consume a significant amount of gas for each element in the array (such as writing to storage).
There is no limit on the size of the input array or the total gas that the function can consume.
The attack can block the functionality of a smart contract. If a function always fails because it consumes too much gas, it cannot be used for its intended purpose, effectively leading to a Denial-of-Service (DoS).
manual
Limit the size of the input array that a function can process in a single call
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.