NFTBridge
60,000 USDC
View results
Submission Details
Severity: low
Invalid

Gas Consumption and Denial of Service (DoS) in depositTokens, withdrawTokens, and _cancelRequest methods of Bridge contract

Hello ArkProjects,

The loops in functions like depositTokens, withdrawTokens, and _cancelRequest that iterate over potentially large arrays (e.g., ids, request) could consume significant gas. An attacker could exploit this by sending a transaction with a large array, leading to a potential DoS attack.

Mitigation: Implement gas usage limits, or break down large transactions into smaller, manageable chunks to prevent gas exhaustion.

Updates

Lead Judging Commences

n0kto Lead Judge about 1 year ago
Submission Judgement Published
Invalidated
Reason: Non-acceptable severity
Assigned finding tags:

Informational / Gas

Please, do not suppose impacts, think about the real impact of the bug and check the CodeHawks documentation to confirm: https://docs.codehawks.com/hawks-auditors/how-to-determine-a-finding-validity A PoC always helps to understand the real impact possible.

Support

FAQs

Can't find an answer? Chat with us on Discord, Twitter or Linkedin.