Beginner FriendlyFoundryBridge
100 EXP
View results
Submission Details
Severity: high
Invalid

withdrawTokensToL1 function open to reentrancy attacks

Summary

The withdrawTokensToL1 function lacks reentrancy checks making the function vulnerable to reentrancy attacks

Vulnerability Details

since the function sendToL1 in the contract contains a call function, this is an external call and could introduce cross function reentrancy attacks

Impact

attacker could call the sendToL1 function and then call to the withdrawTokensToL1 function and exploit a reentrancy attack

Tools Used

manual analysis

Recommendations

consider adding reentrancy guards to all the functions that involve a change in state so that all the functions are safe from reentrancy risks, this means adding a reentrancy guard in the withdrawTokensToL1 function

Updates

Lead Judging Commences

0xnevi Lead Judge
about 2 years ago
0xnevi Lead Judge about 2 years ago
Submission Judgement Published
Invalidated
Reason: Other

Support

FAQs

Can't find an answer? Chat with us on Discord, Twitter or Linkedin.