A vulnerability found in the ECDSA library developed by the OpenZeppelin team. OpenZeppelin team published a security advisory on GitHub on August 22nd, 2022. According to the vulnerability, recover and tryRecover functions are vulnerable, as those functions accept the standard signature format and compact signature format. (EIP-2098)
The functions ECDSA is vulnerable to some sort of signature malleability because they accept compact EIP-
2098 signatures in addition to the traditional 65-byte signature format.
This is only an issue for the functions that take a single byte argument, and not the functions that take r, v, s or r, vs as
separate arguments
Potentially affected contracts are those that implement signature reuse or replay protection by marking the signature itself as used, rather than the signed message or a nonce included in it. A user can take a signature that has already been submitted, submit it again in a different form, and bypass this protection.
could cause loss of funds
Manual Review
It is suggested to update the version of the @openzeppelin/contracts package version to 4.7.3 to fix this finding
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.