The batch function utilizes delegatecall to execute multiple encoded functions within the contract. If any of these encoded functions involve external calls, they may be susceptible to reentrancy attacks, allowing an attacker to manipulate the contract's state in unintended ways.
Delegatecall Usage: The batch function employs delegatecall, which executes functions in the context of the calling contract. This means that the state of the calling contract can be modified, making it sensitive to security risks. An attacker could repeatedly call the batch function before the previous execution completes. This can lead to multiple entries in the function's execution stack, potentially manipulating the contract's state in undesirable ways.
Attackers could exploit reentrancy to alter the contract's state, leading to unauthorized transfers or changes.
Manual Review
Added CEI pattern and add the following event
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.