Core Contracts

Regnum Aurum Acquisition Corp
HardhatReal World AssetsNFT
77,280 USDC
View results
Submission Details
Severity: low
Valid

malicious user can vote on behalf of other voter

Summary

in veRAACToken.sol in recordVote function Attacker can run front run attack and able to vote using other user address.

Vulnerability Details

in veRAACToken.sol in recordVote function Attacker can run front run attack and able to vote using other user address.

function recordVote(
address voter,
uint256 proposal Id
) external {
if (_hasVotedOnProposal[voter][proposalId]) revert AlreadyVoted();
_hasVotedOnProposal[voter][proposalId] = true;
uint256 power = getVotingPower(voter);
emit VoteCast(voter, proposalId, power);
}

Impact

User will lost their vote with wrong place with out voiting them.

Tools Used

manual review

Recommendations

in veRAACToken.sol in recordVote function should be voter == msg.sender.

Updates

Lead Judging Commences

inallhonesty Lead Judge 3 months ago
Submission Judgement Published
Validated
Assigned finding tags:

veRAACToken::recordVote lacks access control, allowing anyone to emit fake events

inallhonesty Lead Judge 3 months ago
Submission Judgement Published
Validated
Assigned finding tags:

veRAACToken::recordVote lacks access control, allowing anyone to emit fake events

Support

FAQs

Can't find an answer? Chat with us on Discord, Twitter or Linkedin.