Summary: Contract can be tricked into approving malicious tokens.
Details: The contract blindly approves token transfers without validating token addresses, allowing attackers to trick it into approving malicious tokens.
Impact: Could lead to theft of legitimate tokens through malicious approval exploits.
Recommendation: Whitelist allowed token contracts:
createGameWithToken and joinGameWithToken functions will revert because they attempt transferFrom without requiring the user to first approve
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.