The claimCut
function transfers tokens before updating the contract's state, exposing it to re-entrancy attacks.
If a malicious contract calls claimCut
, it can re-enter the function before the state is updated, leading to multiple claims of rewards.
This allows a malicious actor to drain the contract's funds, leading to severe financial loss.
Manual review
This vulnerability occurs because of the token transfer:
Implement the Checks-Effects-Interactions pattern by updating the state before transferring tokens.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.