Mistakes made on one chain can be re-applied to the correct layer 2 chain.
There is no chain.id
in the signed data.
If a user does a sendToL1()
using the wrong network, an attacker can replay the action on the correct chain and steal the tokens from users.
Manual review.
Include the chain.id
in what's hashed.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.