DeFiFoundrySolidity
16,653 OP
View results
Submission Details
Severity: high
Invalid

Lack of Reentrancy Protection

Description: No explicit reentrancy guards in critical transfer and state-changing functions.

In ITransmuter:

  • deposit(), claim(), withdraw() potentially vulnerable

  • No use of checks-effects-interactions pattern

  • No reentrancy guard modifier

Impact:

  • Potential drain of contract funds

  • State manipulation

  • Economic loss

Proof of Concept:

contract ReentrancyAttack {
ITransmuter transmuter;
function attack() external {
transmuter.claim(attackAmount, address(this));
}
// Malicious fallback function
receive() external payable {
transmuter.claim(attackAmount, address(this));
}
}

Recommended Mitigation:

  • Implement ReentrancyGuard from OpenZeppelin

  • Use checks-effects-interactions pattern

  • Add explicit reentrancy checks

Updates

Appeal created

inallhonesty Lead Judge 6 months ago
Submission Judgement Published
Invalidated
Reason: Lack of quality
inallhonesty Lead Judge 6 months ago
Submission Judgement Published
Invalidated
Reason: Lack of quality

Support

FAQs

Can't find an answer? Chat with us on Discord, Twitter or Linkedin.