The GmxProxy contract accepts ETH via a receive() function and transfers funds using safeTransfer(). If a malicious contract is used as the recipient, it could exploit a reentrancy attack by recursively calling the function before the state is updated, potentially draining the contract.
• The contract allows ETH deposits via:
• It performs transfers using safeTransfer():
• A malicious fallback function could repeatedly call safeTransfer() before the contract updates its state, allowing an attacker to drain all ETH.
• Complete loss of contract funds due to reentrancy exploitation.
• Users may lose their deposited assets if an attacker targets their transactions.
• Manual Code Review
• Slither Static Analysis
• Implement ReentrancyGuard from OpenZeppelin:
• Ensure state changes happen before external calls.
• Use the Checks-Effects-Interactions pattern to prevent reentrant calls.
Please read the CodeHawks documentation to know which submissions are valid. If you disagree, provide a coded PoC and explain the real likelihood and the detailed impact on the mainnet without any supposition (if, it could, etc) to prove your point.
There is no real proof, concrete root cause, specific impact, or enough details in those submissions. Examples include: "It could happen" without specifying when, "If this impossible case happens," "Unexpected behavior," etc. Make a Proof of Concept (PoC) using external functions and realistic parameters. Do not test only the internal function where you think you found something.
Please read the CodeHawks documentation to know which submissions are valid. If you disagree, provide a coded PoC and explain the real likelihood and the detailed impact on the mainnet without any supposition (if, it could, etc) to prove your point.
There is no real proof, concrete root cause, specific impact, or enough details in those submissions. Examples include: "It could happen" without specifying when, "If this impossible case happens," "Unexpected behavior," etc. Make a Proof of Concept (PoC) using external functions and realistic parameters. Do not test only the internal function where you think you found something.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.