The initiateWithdrawal function allows users to create an unlimited number of withdrawal requests, leading to potential storage bloat and increased gas costs.
The initiateWithdrawal function in the vault management system permits users to initiate withdrawal requests without any restrictions on the number of active requests per user. This lack of limitation can result in storage bloat, as each request consumes storage space. Additionally, an attacker could exploit this by creating a large number of withdrawal requests, potentially causing a Denial of Service by exhausting the contract's storage or making subsequent transactions prohibitively expensive.
I'm rating this as LOW because it doesn't have significant impact on the protocol but could lead to storage bloat and increased gas costs, affecting the contract's operational efficiency and financial sustainability.
Manual Review
Implement a limit on the number of active withdrawal requests a user can have at any given time to prevent storage bloat and potential DoS attacks.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.