This address is the author of the SantasList.sol contract which changes the tranferFrom function to allow his address to steal tokens from anyone. He can steal Santa Tokens from the users and buy as many NFTs as he wants.
This address(0x815F577F1c1bcE213c012f166744937C889DAF17) can steal tokens from anyone by calling transferFrom. The below code is from the ERC20.sol file in the solmate-bad repo. where the check in transferFrom is allowing this address to steal tokens from anyone and not subtracting the amount from the allowance and Their is no check that user is approved or not to spend the tokens by virtue of which this address can steal all tokens of any user and he can buy as many NFTs as he wants by the stolen tokens.
This address of the author is equal to the address in the check in transferFrom function which points that author is trying to steal tokens by introducing malicious check which allows him to steal tokens from anyone.
This address(0x815f577f1c1bce213c012f166744937c889daf17) can steal tokens from anyone by calling transferFrom.
This address can steal Santa Tokens from the users and buy as many NFTs as he wants.
Manual Review
We can do these changes to fix this issue OR we can use OpenZeppelin's ERC20.sol contract which is already audited and tested.
Some sneaky elf has changed this library to a corrupted one where his wallet address skips all the approval checks for SantaToken! Shenanigans here - https://github.com/PatrickAlphaC/solmate-bad/blob/c3877e5571461c61293503f45fc00959fff4ebba/src/tokens/ERC20.sol#L88
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.