Beginner FriendlyFoundryNFT
100 EXP
View results
Submission Details
Severity: high
Valid

Reentrancy Events

Summary

Detects reentrancies that allow manipulation of the order or value of events.

Vulnerability Details

Location:

Reentrancy in PuppyRaffle.refund(uint256) (src/PuppyRaffle.sol#96-105):
External calls:

  • address(msg.sender).sendValue(entranceFee) (src/PuppyRaffle.sol#101)
    Event emitted after the call(s):

  • RaffleRefunded(playerAddress) (src/PuppyRaffle.sol#104)

Impact

Attackers can manipulate the code

Tools Used

Audit Wizard (Slither)

Recommendations

Apply the check-effects-interactions pattern.

Updates

Lead Judging Commences

Hamiltonite Lead Judge about 2 years ago
Submission Judgement Published
Validated
Assigned finding tags:

reentrancy-in-refund

reentrancy in refund() function

Support

FAQs

Can't find an answer? Chat with us on Discord, Twitter or Linkedin.

Give us feedback!