Reentrancy attack in StarklaneEscrow::_withdrawFromEscrow function because State variables written after the call(s)
Reentrancy vulnerability, State variables written after the call(s)
Reentrancy attack that can lead to draining of assets/funds from the protocol
manual review
Implement the CEI pattern or
Reentrancy Guards
Example: The function can be written
Impact: - NFT already bridged won’t be bridgeable anymore without being stuck. Likelyhood: Low. - Attackers will corrupt their own tokens, deploying a risky contract interacting with an upgradable proxy. They have to buy and sell them without real benefits, except being mean. Some really specific and rare scenario can also trigger that bug.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.