The depositTokensToL2()
function could potentially be vulnerable to reentrancy attacks.
The depositTokensToL2()
function could potentially be vulnerable to reentrancy attacks. However, the ReentrancyGuard
modifier is not used here. It's worth noting that the safeTransferFrom()
function from the OpenZeppelin library is used, which mitigates reentrancy risks. For this reason, the vulnerability is marked as low. However, it's still a good practice to use the nonReentrant
modifier for functions that change the state of the contract.
Manual review.
Add the
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.