40,000 USDC
View results
Submission Details
Severity: high

Collision Vulnerability in EscrowFactory.computeEscrowAddress()

Summary : potential collision attack possible in abi.encodePacked()function of the contract.

Vulnerability Details :

A vulnerability related to the usage of the abi.encodePacked() function with multiple dynamic arguments is used inside the computeEscrowAddress() function. which can potentially lead to a collision attack.

Impact :

If the collision vulnerability is exploited by a hacker, they could tamper with the predictedAddress used during the creation of the escrow contract.

Tools Used : Slither Analyzer tool

Recommendations :

we can include input validation. This means we carefully check and ensure that all the dynamic arguments provided to the function are valid and safe to use. Proper input validation acts as a protective measure and helps prevent many types of attacks

Support

FAQs

Can't find an answer? Chat with us on Discord, Twitter or Linkedin.