SantaToken
is suggest to rug pull.
The SantaToken
smart contract inherits from bad-solmate, a compromised version of solmate.
The user with the address 0x815F577F1c1bcE213c012f166744937C889DAF17
can spend anyone's ERC20 SantaToken(s) using the transferFrom
method, even if they have not been approved beforehand. In addition, this same user appears to be the author of the SantasList
smart contract.
Place the code for the following test function in test/unit/SantasListTest.t.sol
.
In the terminal, run the following command:
forge test --mt test_StealSantaTokens
Anyone's SantaTokens can be stolen at any time by the user with the address 0x815F577F1c1bcE213c012f166744937C889DAF17
.
Manual review, Foundry
Instead of using a compromised version of solmate, use the current version by transmission 11.
Or completely move to Openzeppelin ERC-20 standard implementation.
Some sneaky elf has changed this library to a corrupted one where his wallet address skips all the approval checks for SantaToken! Shenanigans here - https://github.com/PatrickAlphaC/solmate-bad/blob/c3877e5571461c61293503f45fc00959fff4ebba/src/tokens/ERC20.sol#L88
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.