Malicious user can front-run the L2TokenReceiver__init()
initializer function
After the front-running, the user can swap unlimited amount of tokens essentially for free, before the redeployment
of the protocol
Significant tokenOut
losses
Manual review
Implement valid access control on the L2TokenReciver
contract to ensure only the relevant deployer can call L2TokenReceiver__init
function.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.