Beginner FriendlyFoundryNFT
100 EXP
View results
Submission Details
Severity: medium
Valid

PuppyRaffle::selectWinner, the winner address can cause DOS

Summary

In PuppyRaffle.selectWinner(), DOS attack.

Vulnerability Details

  • the winner address could be a smart contract that doesn't accept ether, or consume all gas and cause Denial of service.

  • Or the winner can be a contract that doesn't implement the ERC721Received standard.

Impact

  • severity : medium

  • likelihood : low

Tools Used

  • manual verification

Recommendations

  • no mitigation. But to keep trying the call/simulate the call locally before broadcasting to mainnet and check for if tx fails and try till some winner can pass.

Updates

Lead Judging Commences

Hamiltonite Lead Judge almost 2 years ago
Submission Judgement Published
Validated
Assigned finding tags:

smart contract wallet without fallback/receive will halt the raffle

Support

FAQs

Can't find an answer? Chat with us on Discord, Twitter or Linkedin.