The issue demonstrate a scenario where an unauthorized user attempts to deposit tokens on behalf of another user, exploiting the vulnerability identified in the depositTokensToL2
function. This could lead to unintended token transfers and poses a significant security risk.
The vulnerability allows an attacker to bypass authorization checks by manipulating the from parameter in the depositTokensToL2
function. The attacker attempts to deposit tokens on behalf of user without proper authorization, highlighting the potential for unauthorized token transfers.
The impact of this vulnerability is severe, as it allows unauthorized users to deposit tokens on behalf of others, potentially leading to financial losses, disruptions in token flow, and unauthorized access to the deposit functionality. This undermines the security and integrity of the token deposit process.
Manual review
Slither
Foundry
Implement Robust Authorization Checks: Enhance the depositTokensToL2
function to include robust authorization checks, ensuring that only the legitimate token owners can initiate deposits. Utilize msg.sender
instead of from
to accurately identify the caller.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.