In L1BossBridge.sol
users can call depositTokensToL2
with the from
parameters as the address of an arbitrary user.
An attacker can exploit this by sending L1 tokens from another user to himself on L2.
The impact is high since an attacker can listen to users approving the L1Token
. He then has a window to call depositTokensToL2
before the said users. It is therefore possible for the attacker to amass a considerable sum on L2.
Since the protocol can be paused, this is not as bad as it could be.
1- Slither static analyzer
2- Forge tests
A simple solution is to remove the from
parameter and use msg.sender
instead.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.