NFTBridge
60,000 USDC
View results
Submission Details
Severity: low
Invalid

Gas Consumption and Denial of Service (DoS) in depositTokens, withdrawTokens, and _cancelRequest methods of Bridge contract

Hello ArkProjects,

The loops in functions like depositTokens, withdrawTokens, and _cancelRequest that iterate over potentially large arrays (e.g., ids, request) could consume significant gas. An attacker could exploit this by sending a transaction with a large array, leading to a potential DoS attack.

Mitigation: Implement gas usage limits, or break down large transactions into smaller, manageable chunks to prevent gas exhaustion.

Updates

Lead Judging Commences

n0kto Lead Judge 12 months ago
Submission Judgement Published
Invalidated
Reason: Non-acceptable severity
Assigned finding tags:

Informational / Gas

Please, do not suppose impacts, think about the real impact of the bug and check the CodeHawks documentation to confirm: https://docs.codehawks.com/hawks-auditors/how-to-determine-a-finding-validity A PoC always helps to understand the real impact possible.

Support

FAQs

Can't find an answer? Chat with us on Discord, Twitter or Linkedin.