The intended behavior of the claim() function is to ensure that each treasureHash can only be claimed once by checking the claimed mapping before allowing a reward payout.
However, the contract incorrectly checks the mapping using _treasureHash instead of the user-supplied treasureHash. Since _treasureHash is never initialized and defaults to bytes32(0), the duplicate-claim protection is broken, allowing the same treasure to be claimed multiple times.
// Root cause in the codebase with marks to highlight the relevant section
bytes32 private immutable _treasureHash; // never initialized
function claim(bytes calldata proof, bytes32 treasureHash, address payable recipient) external nonReentrant {
// Incorrect key used for validation
if (claimed[_treasureHash]) revert AlreadyClaimed(treasureHash);
}
In `claim()`, the guard uses `claimed[_treasureHash]`, where `_treasureHash` is an immutable state variable that is never initialized to the caller-supplied treasure identifier, while the contract later marks `claimed[treasureHash] = true` using the function argument instead. As a result, the duplicate-claim check and the state update are performed against different keys, which means a previously claimed treasure is not actually blocked from being claimed again with the same valid proof and `treasureHash`. This breaks a core invariant of the protocol described in the README, namely, that each treasure can only be redeemed once, and allows one valid treasure/proof pair to be reused to drain rewards repeatedly until either the `MAX_TREASURES` cap or the contract balance is exhausted.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.