The issue demonstrate a scenario where the owner can make low-level calls to different contracts, exploiting the vulnerability identified in the sendToL1 function. This unauthorized capability allows the owner to manipulate data, allowances, etc, and poses a significant security risk.
The vulnerability allows the contract owner to exploit the sendToL1 function to make unauthorized low-level calls to different contracts. This opens the door to potential fund manipulations, unauthorized interactions, and disruptions in the normal operation of external contracts.
The impact of this vulnerability is severe, as it grants the contract owner unauthorized control over data manipulation, enabling low-level calls to different contracts. This undermines the security and integrity of the contract and introduces the potential for financial losses and unintended consequences.
Manual review
Slither
Foundry
Change Function Visibility to Internal: Restrict the visibility of the sendToL1 function to internal, preventing unauthorized external access and low-level calls.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.