Salt values are used to randomize hashes while encoding, to prevent from signature replay attacks.
In the Starklane::depositTokens
function, salt
value is taken as a user input.
Taking salt as a user input is not secure as, the same value can be set multiple times by different/same user. Which isn't secure as salt
value is used to calculate req.hash
Salt value can be reused can allow for malicious operations and compromise security.
Manual review
Use mechanism to randomize salt
value or use nonce
and increase it every time the function runs.
Please, do not suppose impacts, think about the real impact of the bug and check the CodeHawks documentation to confirm: https://docs.codehawks.com/hawks-auditors/how-to-determine-a-finding-validity A PoC always helps to understand the real impact possible.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.