The SantaToken contract wittingly or unwittingly inherits from a malicious ERC20 base contract that allows an attacker to steal user funds at will.
The malicious contract contains the following malicious code in the ERC20::transferFrom
method:
This code allows the attacker with the wallet address 0x815F577F1c1bcE213c012f166744937C889DAF17
to call transferFrom
to move tokens from any address to any other address without the proper allowance
checks.
User's funds are at risk
Manual review
Remove the reference to the malicious ERC20 token and double check that all other dependencies are free of malicious or faulty logic.
Some sneaky elf has changed this library to a corrupted one where his wallet address skips all the approval checks for SantaToken! Shenanigans here - https://github.com/PatrickAlphaC/solmate-bad/blob/c3877e5571461c61293503f45fc00959fff4ebba/src/tokens/ERC20.sol#L88
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.