A potential vulnerability has been identified that allows an attacker to drain all funds by reusing the operator's signature in the withdrawTokensToL1 function.
The vulnerability lies in the withdrawTokensToL1 function, where a message is sent along with a signature for signer verification. However, the absence of a nonce in the message allows a malicious user to reuse the signature, leading to unauthorized fund withdrawals from the vault.
Successful exploitation of this vulnerability could result in unauthorized fund drainage.
Foundry
Implement a nonce mechanism to validate if the signature has already been used. This additional layer of security will prevent replay attacks and ensure the integrity of fund withdrawals.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.