Beginner FriendlyFoundryNFT
100 EXP
View results
Submission Details
Severity: low
Invalid

The Vault::initVault function can be exploited by front-running attacks

Summary

  • The Vault::initVault function can be exploited by front-running attacks

Vulnerability Details

  • The Vault::initVault function can be exploited by front-running attack. when transactions are executed in a specific order to exploit price changes or gain an unfair advantage.

/// @notice Init vault with the loveToken.
/// @notice Vault will approve its corresponding management contract to handle tokens.
/// @notice vaultInitialize protect against multiple initialization.
function initVault(ILoveToken loveToken, address managerContract) public {
if (vaultInitialize) revert Vault__AlreadyInitialized();
loveToken.initVault(managerContract);
vaultInitialize = true;
}

Impact

  • front-running attacks

Tools Used

  • Manual Review

Recommendations

  • we can use modifiers

Updates

Lead Judging Commences

0xnevi Lead Judge over 1 year ago
Submission Judgement Published
Invalidated
Reason: Other

Support

FAQs

Can't find an answer? Chat with us on Discord, Twitter or Linkedin.