The escrow_deposit_tokens()
function lacks a check for the length of token_ids
.
In the _depositIntoEscrow()
function, the protocol first checks that ids.length
is greater than 0.
However, in the escrow_deposit_tokens()
function in the bridge.cairo
contract, there is no check for the length of token_ids
.
The recommended fix is to add a check for the length of token_ids
.
No real impact. Attacker will have to pay the deployment of the new contract even with 0 token, and it won’t have any interest do to that since he won’t take the control of the contract.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.