Beginner FriendlyFoundryBridge
100 EXP
View results
Submission Details
Severity: high
Valid

Signature replay attack

Summary

The code contains a vulnerability related to a signature replay attack in the sendToL1 function. The vulnerability allows an attacker to replay valid signatures and execute unauthorized transactions

Vulnerability Details

The vulnerability arise because there is nothing to prevent the same signature of being used multiple times. Indeed, the owner could have signed a transaction. However, the associated transaction would be publicly readable on the blockchain. This way, an attacker could copy the signature, submit multiple identical transactions and end up draining contract funds.

Impact

The impact of this vulnerability is severe. An attacker can repeatedly execute transactions on behalf of an authorized signer, leading to financial losses and potential disruption of the intended functionality of the system

Tools Used

Manual

Recommendations

Implement a mechanism to verify the uniqueness of nonces associated with each transaction. This prevents the replay of valid signatures by ensuring that each transaction is processed only once

Updates

Lead Judging Commences

0xnevi Lead Judge almost 2 years ago
Submission Judgement Published
Validated
Assigned finding tags:

withdrawTokensToL1()/sendToL1(): signature replay

Support

FAQs

Can't find an answer? Chat with us on Discord, Twitter or Linkedin.