NFTBridge
60,000 USDC
View results
Submission Details
Severity: low
Invalid

Lack of Input Validation in Bridge contract

Hello Arkproject,

Functions like depositTokens and withdrawTokens rely on input parameters such as ids, ownerL2, and collectionL1. If these inputs are not properly validated, they could lead to unexpected behavior or exploitation. For instance, an invalid or malicious collectionL1 address could cause the contract to interact with unintended or malicious contracts.

Mitigation: Implement thorough input validation to ensure that addresses, token IDs, and other parameters are within expected ranges and conform to expected formats.

Updates

Lead Judging Commences

n0kto Lead Judge 12 months ago
Submission Judgement Published
Invalidated
Reason: Too generic
Assigned finding tags:

Informational / Gas

Please, do not suppose impacts, think about the real impact of the bug and check the CodeHawks documentation to confirm: https://docs.codehawks.com/hawks-auditors/how-to-determine-a-finding-validity A PoC always helps to understand the real impact possible.

Support

FAQs

Can't find an answer? Chat with us on Discord, Twitter or Linkedin.