The `totalFees` variable uses `uint64` which has a maximum value of ~18.4 ETH. After approximately 10 raffle rounds with normal participation, accumulated fees exceed this limit causing integer overflow. The overflowed value becomes incorrect, permanently preventing fee withdrawal as the contract's balance check fails.
The protocol uses uint64 to track accumulated fees, which overflows after moderate usage:
Likelihood:
Occurs after ~10 normal raffle rounds (90 players, 1 ETH fee)
Higher entrance fees or more players accelerate overflow
Inevitable with continued protocol usage
Impact:
Permanent loss of all accumulated protocol fees
Owner cannot recover funds (no alternative withdrawal mechanism)
Protocol becomes economically unviable for owner after overflow
Only affects owner fees, not player deposits
// Run: forge test --mt testTotalFeesOverflow -vv // Result: // Round 1 - totalFees: 18 ETH // Round 2 - totalFees: 17.55 ETH (wrapped around from 36 ETH) // Expected fees: 36 ETH // Actual fees: 17.55 ETH // Owner CANNOT withdraw fees - funds are locked!
uint256 max value: ~115 octillion ETH (effectively unlimited)
Eliminates overflow risk entirely
No performance or gas penalty
Simple one-line change
## Description ## Vulnerability Details The type conversion from uint256 to uint64 in the expression 'totalFees = totalFees + uint64(fee)' may potentially cause overflow problems if the 'fee' exceeds the maximum value that a uint64 can accommodate (2^64 - 1). ```javascript totalFees = totalFees + uint64(fee); ``` ## POC <details> <summary>Code</summary> ```javascript function testOverflow() public { uint256 initialBalance = address(puppyRaffle).balance; // This value is greater than the maximum value a uint64 can hold uint256 fee = 2**64; // Send ether to the contract (bool success, ) = address(puppyRaffle).call{value: fee}(""); assertTrue(success); uint256 finalBalance = address(puppyRaffle).balance; // Check if the contract's balance increased by the expected amount assertEq(finalBalance, initialBalance + fee); } ``` </details> In this test, assertTrue(success) checks if the ether was successfully sent to the contract, and assertEq(finalBalance, initialBalance + fee) checks if the contract's balance increased by the expected amount. If the balance didn't increase as expected, it could indicate an overflow. ## Impact This could consequently lead to inaccuracies in the computation of 'totalFees'. ## Recommendations To resolve this issue, you should change the data type of `totalFees` from `uint64` to `uint256`. This will prevent any potential overflow issues, as `uint256` can accommodate much larger numbers than `uint64`. Here's how you can do it: Change the declaration of `totalFees` from: ```javascript uint64 public totalFees = 0; ``` to: ```jasvascript uint256 public totalFees = 0; ``` And update the line where `totalFees` is updated from: ```diff - totalFees = totalFees + uint64(fee); + totalFees = totalFees + fee; ``` This way, you ensure that the data types are consistent and can handle the range of values that your contract may encounter.
The contest is live. Earn rewards by submitting a finding.
Submissions are being reviewed by our AI judge. Results will be available in a few minutes.
View all submissionsThe contest is complete and the rewards are being distributed.