The _escrow
mapping is used to track tokens that are in escrow, but if an attacker finds a way to manipulate this mapping (e.g., by causing unintended changes or using functions that interact with it incorrectly), it could result in unauthorized transfers or the contract losing track of ownership.
Mitigation: Carefully review all interactions with the _escrow
mapping and ensure that only intended functions can modify its state. Consider implementing additional checks to confirm that the mapping accurately reflects the current state of token ownership.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.