Severity: Medium
The enterRaffle() function at PuppyRaffle.sol:81-95 allows any address to enter, including smart contracts. The selectWinner() function at PuppyRaffle.sol:137 sends the prize pool to the winner via a low-level call:
If the winner is a smart contract that does not implement a receive() or fallback() function, the winner.call{value: prizePool}("") call will fail, causing selectWinner() to revert. Since selectWinner() is the only function that resets the players array, the raffle becomes permanently stuck.
Additionally, _safeMint at line 153 calls onERC721Received on the winner contract. If the contract does not implement IERC721Receiver, this also reverts.
Impact: High — if the winning address is a contract without receive()/fallback(), selectWinner() permanently reverts. All player funds are locked with no recovery.
Likelihood: Medium — requires a smart contract entry to win. An attacker could deliberately enter with such a contract to grief the raffle.
Use a pull-over-push payment pattern. Instead of sending ETH directly in selectWinner(), record the winner and let them claim:
Alternatively, restrict raffle entry to EOAs only by checking msg.sender == tx.origin (note: this has its own tradeoffs and breaks smart wallet compatibility).
## Description If a player submits a smart contract as a player, and if it doesn't implement the `receive()` or `fallback()` function, the call use to send the funds to the winner will fail to execute, compromising the functionality of the protocol. ## Vulnerability Details The vulnerability comes from the way that are programmed smart contracts, if the smart contract doesn't implement a `receive() payable` or `fallback() payable` functions, it is not possible to send ether to the program. ## Impact High - Medium: The protocol won't be able to select a winner but players will be able to withdraw funds with the `refund()` function ## Recommendations Restrict access to the raffle to only EOAs (Externally Owned Accounts), by checking if the passed address in enterRaffle is a smart contract, if it is we revert the transaction. We can easily implement this check into the function because of the Adress library from OppenZeppelin. I'll add this replace `enterRaffle()` with these lines of code: ```solidity function enterRaffle(address[] memory newPlayers) public payable { require(msg.value == entranceFee * newPlayers.length, "PuppyRaffle: Must send enough to enter raffle"); for (uint256 i = 0; i < newPlayers.length; i++) { require(Address.isContract(newPlayers[i]) == false, "The players need to be EOAs"); players.push(newPlayers[i]); } // Check for duplicates for (uint256 i = 0; i < players.length - 1; i++) { for (uint256 j = i + 1; j < players.length; j++) { require(players[i] != players[j], "PuppyRaffle: Duplicate player"); } } emit RaffleEnter(newPlayers); } ```
The contest is live. Earn rewards by submitting a finding.
Submissions are being reviewed by our AI judge. Results will be available in a few minutes.
View all submissionsThe contest is complete and the rewards are being distributed.