The sendToL1 function is susceptible to replay attacks due to the absence of nonce verification in the transaction processing logic. A replay attack occurs when an attacker resubmits a previously signed transaction to the contract, leading to unintended and potentially malicious consequences.
The vulnerability stems from the lack of nonce validation, allowing an attacker to replay a signed message with the same parameters, leading to the re-execution of the transaction. The absence of a unique identifier for each transaction opens the door for unauthorized re-execution of valid transactions.
The replay attack vulnerability poses a significant threat to the integrity and security of the sendToL1 function. An attacker could repeatedly execute valid transactions, causing unintended side effects such as multiple transfers of assets or unauthorized interactions with other contracts.
Manual
Introduce a nonce mechanism to ensure that each transaction is unique. Check the nonce of incoming transactions against the sender's current nonce to prevent replay attacks.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.