20,000 USDC
View results
Submission Details
Severity: high

Potential `reentrancy` attack

Summary

The function claim is vulnerable to reentrancy attack

Vulnerability Details

The mapping claimable is updated after token transfer. Malicious user could make use of that and perform reentrancy attack

Impact

Tokens being drained from the smart contract

Tools Used

Manual review

Recommendations

Update the mapping before transfer of the token or use the nonReentrant modifier from OZ ReentrancyGuard contract

Support

FAQs

Can't find an answer? Chat with us on Discord, Twitter or Linkedin.

Give us feedback!