MoneyShelf::depositUSDC
uses arbitrary from
in transferFrom
allowing funds to transfer to an unauthorized user. Additionally the return value of transferFrom
call is not checked.
Detect when msg.sender
is not used as from
in transferFrom
.
The attacker calls the MoneyShelf::depositUSDC
while specifying the sender's address as from
in transferFrom
, allowing the attacker to steal the user's tokens. The attacker could also set the return value of transferFrom
.
Slither
Use msg.sender
as from
in transferFrom
. Additionally, use SafeERC20
, or ensure that the transferFrom
return value is checked.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.