Project documentation states that:
In case a smart contract calls EscrowFactory::newEscrow, given that the caller of this contract is in control of the salt, frontrunning is a possibility.
When an address is (pre)calculated using the same logic as create2, it is derived from a variety of inputs with the address of the sender as one of the them.
While every other input in the computing of the address can be mimicked, msg.sender
is the only one no attacker can replicate. As such, there will never be a possibility for a front-run attack to happen (by launching an escrow on the same address before hand).
Remove the salt parameter.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.