The foundry.toml
configuration file has the ffi
option set to true
, which allows for arbitrary code execution during the forge test
or forge coverage
commands. This can be exploited by a malicious developer to execute harmful code on the machines of other users running these commands, potentially leading to unauthorized actions or compromising the system's security.
This is a critical vulnerability in this project because there is a malicious test:
Likelyhood: High
Executes at every forge test
or forge coverage
Impact: High
System compromise, data leaks, etc
To fix this vulnerability, the ffi
option should be set to false
in the foundry.toml
configuration file.
By disabling the execution of arbitrary code, the risk of unauthorized actions and compromising the system's security can be mitigated.
Moreover, FFI is not useful in any other tests.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.