Beginner FriendlyFoundryBridge
100 EXP
View results
Submission Details
Severity: high
Invalid

sendToL1 reentrancy risk

Summary

The 'sendToL1' function within the L1BossBridge contract allows for the withdrawal of Ether from L2 to L1 using signature verification and designated parameters. The submission primarily focuses on assessing the potential reentrancy risks associated with the function's design and execution.

Vulnerability Details

The function performs the following steps:

Verifies the signature by recovering the signer's address using ECDSA.
Checks if the signer is authorized.
Decodes the input data containing the target address, value, and data for the call.
Calls the target address with the specified value and data.

The critical section for potential reentrancy is after the signer verification, during the external call to the 'target'. Although the function itself includes a 'nonReentrant' modifier and a 'whenNotPaused' check, the external call to 'target' could be vulnerable to reentrancy if the target contract interacts with the current contract or triggers calls back to it. This interaction might lead to unexpected behavior if not handled carefully.

Impact

The impact of a reentrancy attack could result in unauthorized access to the contract's state or funds, potentially leading to loss or manipulation of Ether and contract state.

Tools Used

Manual inspection

Recommendations

Review the code for possible loopholes and ensure extra security measures are in place.

Updates

Lead Judging Commences

0xnevi Lead Judge
over 1 year ago
0xnevi Lead Judge over 1 year ago
Submission Judgement Published
Invalidated
Reason: Too generic

Support

FAQs

Can't find an answer? Chat with us on Discord, Twitter or Linkedin.