The initVault function in the Vault contract is declared as public, making it susceptible to front-running attacks. Additionally, there is a risk of deploying the wrong managerContract by any malicious actor. The LoveToken contract, when calling initVault(address managerContract), approves a substantial amount to the specified managerContract, posing a potential security vulnerability.
The initVault function in the Vault contract is publicly accessible, which allows malicious actors to front-run the initialization, potentially causing unexpected behavior or exploiting the system.
There is a risk that a malicious actor deploys a different contract as the managerContract in the LoveToken contract, leading to unintended consequences during initialization.
If this happen then the LoveToken contract approves a significant amount of tokens to the managerContract without proper checks, creating a potential avenue for large-scale losses if the managerContract is compromised.
Front-running: Malicious actors may exploit the public nature of initVault to manipulate the initialization process, leading to undesirable outcomes.
Incorrect managerContract: Deploying the wrong managerContract can result in unexpected behaviors, potentially compromising the security of the system.
Excessive Token Approval: Approving a large token amount without adequate checks may lead to substantial losses if the managerContract is compromised.
Manual code review and analysis.
When deploying the contracts make sure to deploy and initialize in same transaction to avoid the front-running.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.