Vault::initVault
FunctionDescription:
The initVault
function allows for the initialization of the vault. However, it lacks proper protection against reentrancy attacks. After initializing the vault, the state variable vaultInitialize is set to true, preventing further calls to this function. However, there is no mechanism in place to prevent reentrancy attacks during the execution of loveToken::initVault(managerContract)
.
Impact:
If the loveToken::initVault(managerContract)
call or any other code executed within initVault
triggers external contract calls or state changes that could potentially call back into the initVault
function, it could result in reentrancy vulnerabilities. Reentrancy attacks could allow malicious actors to manipulate the state of the contract in unintended ways, potentially leading to loss of funds or unauthorized access to contract functionalities.
Recommended Mitigation:
To mitigate the risk of reentrancy attacks, ensure to follow CEI
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.