NFTBridge
60,000 USDC
View results
Submission Details
Severity: medium
Invalid

Potential overflow

Summary

The potential for integer overflow in requestSerializedLength during the calculation of serialized request length poses a risk of incorrect data handling. While not immediately exploitable, it can contribute to unexpected behavior or create opportunities for further vulnerabilities.

Vulnerability Details

Impact

An overflow in the calculation of requestSerializedLength could lead to incorrect serialization lengths. This could result in improper handling of data, causing potential contract misbehavior, such as faulty logic execution, data corruption, or incorrect message processing. While it may not be exploitable on its own, it could create opportunities for other vulnerabilities to be exploited or lead to unexpected contract states.

Tools Used

Recommendations

Safe Arithmetic: Use Solidity's SafeMath or native overflow checks (enabled by default in Solidity 0.8.0 and later) to prevent integer overflow during the length calculation of the serialized request.

Input Validation: Validate inputs that affect the length calculation to ensure they are within reasonable bounds, reducing the risk of overflow during the computation of requestSerializedLength.

Updates

Lead Judging Commences

n0kto Lead Judge 9 months ago
Submission Judgement Published
Invalidated
Reason: Incorrect statement

Support

FAQs

Can't find an answer? Chat with us on Discord, Twitter or Linkedin.