Key | Value |
---|---|
.sol Files | 1 |
Total nSLOC | 51 |
During audit I found 4 vulnerabilities in Smart Contracts:
2 in --MerkleAirdrop.sol(High)
2 in --Deploy.s.sol(Low)
NO ACCESS VULNERABILITY
High
In function claim MerkleAirdrop.sol doesn't implemetn check access function.
It may occurs to double claiming airdrop by user
Found in src/MerkleAirdrop.sol [Line: 30]
VULNERABILITY VERIFYING
High
Found in src/MerkleAirdrop.sol [Line: 45]
Anyone who knows the addresses that are selected for the airdrop can recreate the merkle tree and create a valid proof.
MISSING PRIVATE KEY DEPLOYMENT
Low
STORAGE VALUES and function deployMerkleDropper(
SHOULD BE PRIVATE
aderyn (Rust-based Solidity AST analyzer.)
https://github.com/Cyfrin/aderyn
simple research
In --MerkleAirdrop.sol: add mapping _claimed in function claim(
to prevent No Access Vulnerability
In Line:45 --MerkleAirdrop.sol: replace account
with msg.sender
to prevent Veryfying Vulnerability
In --MerkleAirdrop.sol: add function getMerkleRoot()
onlyOwner check
In Line:16 --Deploy.s.sol: add private key
In --Deploy.s.sol: change values from public to private
All changes you can see in my github --> https://github.com/alhonaut/audit-2024-airdropper
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.