The selectWinner function is susceptible to a reentrancy attack. This vulnerability poses a significant risk to the security of the contract, as malicious actors can exploit it to manipulate the outcome of the winner selection process and potentially compromise the integrity of the entire system. It is crucial to address this vulnerability promptly to safeguard the contract against reentrancy attacks and maintain the trust of users
There is a potential vulnerability in the system where an attacker could drain all funds by calling (bool success, ) = winner.call{ value: prizePool }(""), especially when contracts have accumulated sufficient fees
use nonReentrant modifier from onlyOwner openZeppelin
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.