Beginner FriendlyFoundryNFT
100 EXP
View results
Submission Details
Severity: high
Invalid

Dussehra::killRavana()` sends eth to arbitrary user making it vulnerable to a reeentrancy attack.

Summary

Unprotected call to a function sending Ether to an arbitrary address.

Vulnerability Details

- (bool success, ) = organiser.call{value: totalAmountGivenToRam}("");

Impact

User calls killRavana() resulting in reentrancy exposure when the user withdraws the contract's balance.

Tools Used

Slither

Recommendations

Ensure that an arbitrary user cannot withdraw unauthorized funds.
Consider using the Checks-Effects-Interactions pattern or reentrancy guards.

Updates

Lead Judging Commences

bube Lead Judge over 1 year ago
Submission Judgement Published
Invalidated
Reason: Incorrect statement

Support

FAQs

Can't find an answer? Chat with us on Discord, Twitter or Linkedin.