The likeUser function is vulnerable to front-running attacks. When a user submits a like transaction, it's visible in the mempool. An attacker can see this and front-run by quickly liking the same target user with a higher gas price. If the target had already liked the original user, the attacker triggers the match instead, stealing the match and potentially the rewards.
Impact:
Attackers can steal matches from legitimate users by front-running their transactions. This is especially problematic because matches trigger the deployment of MultiSig wallets and fund transfers. Users may lose their intended matches to bots or malicious actors monitoring the mempool.
The contest is live. Earn rewards by submitting a finding.
Submissions are being reviewed by our AI judge. Results will be available in a few minutes.
View all submissionsThe contest is complete and the rewards are being distributed.