Beginner FriendlyFoundryNFT
100 EXP
View results
Submission Details
Severity: high
Invalid

selectWinner vulnerable to reentrancy attack

Summary

The selectWinner function is susceptible to a reentrancy attack. This vulnerability poses a significant risk to the security of the contract, as malicious actors can exploit it to manipulate the outcome of the winner selection process and potentially compromise the integrity of the entire system. It is crucial to address this vulnerability promptly to safeguard the contract against reentrancy attacks and maintain the trust of users

Impact

There is a potential vulnerability in the system where an attacker could drain all funds by calling (bool success, ) = winner.call{ value: prizePool }(""), especially when contracts have accumulated sufficient fees

Recommendations

use nonReentrant modifier from onlyOwner openZeppelin

Updates

Lead Judging Commences

Hamiltonite Lead Judge almost 2 years ago
Submission Judgement Published
Invalidated
Reason: Other

Support

FAQs

Can't find an answer? Chat with us on Discord, Twitter or Linkedin.