snek_raffle.vy::fulfillRandomWords
function uses not safe send
may be the cause of a DDoS attack
An attacker can participate from non-payable contract many times (given the absence of checking whether the address is included in the raffle) as a result revert send(recent_winner, self.balance)
in snek_raffle.vy::fulfillRandomWords
Denial of service attack due to reverts of the send command in snek_raffle.vy::fulfillRandomWords
Manual check
We can use safeSend
instead of send
update snek_raffle.vy::fulfillRandomWords
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.