Beginner FriendlyFoundryNFT
100 EXP
View results
Submission Details
Severity: medium
Valid

Potential DOS in Duplicate Player Check

Summary

The function enterRaffle employs a nested loop to check for duplicate players, which can be computationally expensive and potentially lead to denial-of-service (DOS).

Vulnerability Details

The contract's approach to checking for duplicate players in the function enterRaffle with a nested loop becomes inefficient as the players array grows, potentially opening the door to DOS attacks.

Impact

Inefficient duplicate player checks can lead to higher gas costs and DOS vulnerabilities if the array size becomes significant.

Tools Used

Manual Review

Recommendations

Enhance efficiency and mitigate DOS risks by implementing a more efficient algorithm

Updates

Lead Judging Commences

Hamiltonite Lead Judge almost 2 years ago
Submission Judgement Published
Validated
Assigned finding tags:

denial-of-service-in-enter-raffle

Support

FAQs

Can't find an answer? Chat with us on Discord, Twitter or Linkedin.