Beginner FriendlyFoundryBridge
100 EXP
View results
Submission Details
Severity: high
Invalid

Replay attack vulnerability sendToL1

Summary

The sendToL1 function, responsible for handling the sending of transactions from Layer 2 to Layer 1, lacks the inclusion of the chain ID in the signature verification process. This omission could expose the system to potential replay attacks, enabling malicious actors to replay transactions from Layer 1 to Layer 2 or vice versa.

Vulnerability Details

The vulnerability lies in the absence of the chain ID parameter in the signature verification process. As per EIP-155, including the chain ID in the verification is critical to prevent replay attacks across different chains. The code lacks this essential security measure, potentially enabling malicious actors to replay transactions across layers, causing unintended execution of transactions on different networks.

Impact

The absence of the chain ID in the signature verification process creates a high-risk scenario for potential replay attacks. This could compromise the security and integrity of the system, allowing unauthorized execution of transactions across different layers.

Tools Used

Manual inspection

Recommendations

incorporate chainID as a parameter

Updates

Lead Judging Commences

0xnevi Lead Judge
over 1 year ago
0xnevi Lead Judge over 1 year ago
Submission Judgement Published
Invalidated
Reason: Other

Support

FAQs

Can't find an answer? Chat with us on Discord, Twitter or Linkedin.