MoneyShelf::depositUSDC uses arbitrary from in transferFrom allowing funds to transfer to an unauthorized user. Additionally the return value of transferFrom call is not checked.
Detect when msg.sender is not used as from in transferFrom.
The attacker calls the MoneyShelf::depositUSDC while specifying the sender's address as from in transferFrom, allowing the attacker to steal the user's tokens. The attacker could also set the return value of transferFrom.
Slither
Use msg.sender as from in transferFrom. Additionally, use SafeERC20, or ensure that the transferFrom return value is checked.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.