A vulnerability related to the usage of the abi.encodePacked() function with multiple dynamic arguments is used inside the computeEscrowAddress() function. which can potentially lead to a collision attack.
If the collision vulnerability is exploited by a hacker, they could tamper with the predictedAddress used during the creation of the escrow contract.
we can include input validation. This means we carefully check and ensure that all the dynamic arguments provided to the function are valid and safe to use. Proper input validation acts as a protective measure and helps prevent many types of attacks
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.