Beginner FriendlySolidity
100 EXP
View results
Submission Details
Severity: high
Invalid

Reentrancy Attacks

Summary

The contract allows external calls via call{} without sufficiently ensuring that the contract’s state is updated before external interaction. Despite reentrancy guards, external contracts could exploit this and cause a reentrancy vulnerability.

Vulnerability Details

Issue: External calls are made before updating the contract state, leaving the contract vulnerable to reentrancy attacks.

Impact

Attackers could exploit the reentrancy vulnerability to modify the contract state after a withdrawal, leading to fund loss or unauthorized access. This compromises the security of the funds stored in the contract.

Tools Used

Reentrancy Guards: Analyzed use of reentrancy guards to mitigate risks.

Recommendations

Always update the contract state before making any external calls to ensure that the contract’s state cannot be modified during an external interaction.

Use the transfer() method for fund transfers, which is safer and limits gas usage.

Updates

Lead Judging Commences

0xtimefliez Lead Judge 9 months ago
Submission Judgement Published
Invalidated
Reason: Incorrect statement

Support

FAQs

Can't find an answer? Chat with us on Discord, Twitter or Linkedin.

Give us feedback!