SantaToken has all the makings of a rug pull.
The project depends on a compromised version of solmate to develop it's ERC20 token ( SantaToken ). This compromised dependency makes it such that, there exists a user who can steal the SantaTokens of anybody without requiring any prior approvals.
The user is 0x815F577F1c1bcE213c012f166744937C889DAF17
In the terminal run forge test --mt testStealSantaToken
The user with address (0x815F577F1c1bcE213c012f166744937C889DAF17) can steal anybody's SantaToken (ERC20 token) without requiring any prior approvals. Combined with the fact that, the SantasList smart contract author is this very same suspicious address, this is akin to a rug pull in the making.
Manual review
This vulnerability exists because we are using a vulnerable version of solmate which was compromised by the package authors at this point in time
My suggestion is to move away from using this vulnerable solmate version (solmate-bad) to the actual solmate version developed by transmission 11
in the makefile line 13
Some sneaky elf has changed this library to a corrupted one where his wallet address skips all the approval checks for SantaToken! Shenanigans here - https://github.com/PatrickAlphaC/solmate-bad/blob/c3877e5571461c61293503f45fc00959fff4ebba/src/tokens/ERC20.sol#L88
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.