EVM's ecrecover is susceptible to signature malleability which allows replay attacks, but that is mitigated on this function, `hashMetaTransaction` by ensuring that each transaction has a unique hash based on its specific contents and verifies that the meta-transaction matches the original signed data. However, if any of the application logic changes, it might make signature malleability a risk for replay attacks.
See reference: https://swcregistry.io/docs/SWC-117
Unauthorized Transaction Replays and Cross-Chain Exploits
Manual Analysis
Consider using OpenZeppelin’s ECDSA library: https://github.com/OpenZeppelin/openzeppelin-contracts/blob/master/contracts/utils/cryptography/ECDSA.sol
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.