VotingBoothTest.t.sol
has a malicious test embedded that runs an external file on localMachine.
function testPwned() public {
string[] memory cmds = new string[](2);
cmds[0] = "touch";
cmds[1] = string.concat("youve-been-pwned-remember-to-turn-off-ffi!");
cheatCodes.ffi(cmds);
}
This test runs a command in the background that pwns your system. The Vulnerability, if written differently, could potentially strip data from your system, load up an exploit or even send data back to another machine using various commands such as curl or bash.
Leaves your system vulnerable for potential exploits
forge
Disable ffi in the ``foundry.toml``` file
ffi = false
and/or disable / remove line from VotingBoothTest.t.sol
function testPwned() public {
string[] memory cmds = new string[](2);
cmds[0] = "touch";
cmds[1] = string.concat("youve-been-pwned-remember-to-turn-off-ffi!");
cheatCodes.ffi(cmds);
}
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.