User can withdraw amount more than amount actual deposited
The protocol lacks a validation mechanism for the deposited amount by the user. Consequently, if a user can trick the signer (or malicious signer) into signing a withdrawal message with arbitrary amount, they can exploit this vulnerability to withdraw an amount exceeding their actual deposit.
Testing code for POC:
User can drain vault of bridge
Foundry & manual testing
Implement mapping to keep track amount deposited by user, ex: mapping (address => uint256) amountDeposited . Then restrict amount withdraw <= deposited
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.