In L1BossBridge.sol: depositTokensToL2() there is a check as follows:
which can be manipulated by transferring a large amount of token to the vault to make it always revert.
As stated above using balanceOf(address(vault)) can be very dangerous as the attacker can make the deposit always revert and corrupt the whole protocol functionality,
Adding to this the fact that there is no restrictions on minting new BBT tokens (this is another finding I've submitted) the exploit of this vulnerability becomes feasible.
This will disables the functionality of the protocol.
manual review
just check that the deposit is not greater than DEPOSIT_LIMIT
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.