Normal behavior: The faucet should send Sepolia ETH to first-time claimers safely without allowing the recipient to consume arbitrary gas or affect contract invariants.
Specific issue: the contract performs an unchecked external call to the claimant with no gas limit (faucetClaimer.call{ value: sepEthAmountToDrip }("")), allowing a malicious fallback/receive to consume large gas or revert, wasting gas or causing the claim to fail.
Likelihood:
When a claimant is a contract with a malicious fallback, the fallback runs and can consume large gas during the call.
Automated bots can target the faucet by acting as contract claimants to force extra gas usage or failed transfers.
Impact:
Loss of gas for the transaction sender and possible repeated failed attempts.
Denial-of-service for legitimate claimers (claims revert or are blocked) and potential griefing of faucet funds/availability.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.