Both the deposit
and withdraw
functions involve external calls (transferring tokens). Although the ReentrancyGuard
modifier is used, it's important to ensure state updates are made before external calls to prevent reentrancy.
A malicious actor could exploit the reentrancy vulnerability by calling back into the deposit
or withdraw
function before the state updates are completed, leading to multiple deposits.
Update the state before making external calls (token transfers) to ensure the contract cannot be exploited through reentrancy.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.