The collectPresent function is susceptible to reentrancy attacks during the execution of the _mintAndIncrement function. This could allow a malicious user to repeatedly call the collectPresent function and mint an unlimited number of NFTs.
The _mintAndIncrement function is called within the collectPresent function without any reentrancy protection. An attacker will call collectPresent function which will then call ``_mintAndIncrementthat is usingsafemint()` but usage of safemint can cause re-entrancy and due to this he can re-enter the function and mint more
The reentrancy vulnerability could result in an unauthorized and excessive minting of NFTs, potentially disrupting the intended functionality of the contract and causing economic losses.
No specific tools were used to identify this issue. Manual code review and analysis were sufficient to identify the potential reentrancy vulnerability.
Implement reentrancy protection mechanisms, such as the use of the reentrancyGuard modifier or the Checks-Effects-Interactions pattern, to prevent malicious reentrant calls.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.