https://github.com/Cyfrin/2024-07-the-predicter/blob/main/src/ThePredicter.sol#L62-L70
If the cancelRegistration
function is exploited, an attacker might repeatedly withdraw funds. using this
This is vulnerable to reentrancy attacks because the state change occurs after the fund transfer.
Using call
for transferring Ether is generally safe if you ensure the transaction reverts properly. However, it is prone to reentrancy attacks.
If the cancelRegistration
function is exploited, an attacker might repeatedly withdraw funds.
Manual
Reentrancy guard modifiers should be placed on the cancelRegistration and all other important protocol functions to prevent devastating attacks.
Reentrancy of ThePredicter::cancelRegistration allows a maliciour user to drain all funds.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.