Hello ArkProjects,
The loops in functions like depositTokens
, withdrawTokens
, and _cancelRequest
that iterate over potentially large arrays (e.g., ids
, request
) could consume significant gas. An attacker could exploit this by sending a transaction with a large array, leading to a potential DoS attack.
Mitigation: Implement gas usage limits, or break down large transactions into smaller, manageable chunks to prevent gas exhaustion.
Please, do not suppose impacts, think about the real impact of the bug and check the CodeHawks documentation to confirm: https://docs.codehawks.com/hawks-auditors/how-to-determine-a-finding-validity A PoC always helps to understand the real impact possible.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.