matchRewards — No ReentrancyGuardFile: sources/2025-02-datingdapp/src/LikeRegistry.sol
Lines: 49–62
matchRewards() performs an external .call to send ETH to a newly deployed MultiSigWallet. There is no ReentrancyGuard on likeUser() or withdrawFees(). A malicious contract as a matched participant could re-enter during the ETH send.
Potential double-spend of balances in multi-step match scenarios.
Combined with the userBalances fix (Critical), reentrancy becomes a live drain vector for accumulated fees.
All ETH in the contract is at risk once userBalances is properly tracked.
Manual analysis
Slither reentrancy pattern detection
The contest is live. Earn rewards by submitting a finding.
Submissions are being reviewed by our AI judge. Results will be available in a few minutes.
View all submissionsThe contest is complete and the rewards are being distributed.