File: SantasList.sol
The Invariant Broken:
Users should only be able to collect presents if they have been explicitly checked by Santa. Unchecked users should have status NOT_CHECKED_TWICE, but the enum design makes them default to NICE.
Solidity mappings default to 0, which maps to Status.NICE instead of Status.NOT_CHECKED_TWICE.
Attack Path:
Alice is never checked by Santa (never appears on either list)
Alice's status: s_theListCheckedOnce[alice] = 0 = Status.NICE (default)
Alice's status: s_theListCheckedTwice[alice] = 0 = Status.NICE (default)
Christmas arrives
Alice calls collectPresent()
Check at line 154 passes: Status.NICE == Status.NICE && Status.NICE == Status.NICE ✅
Alice collects NFT without ever being checked by Santa
Additionally - Santa Can Skip checkList:
If Santa calls checkTwice(bob, Status.NICE) without first calling checkList(), the check passes because unchecked bob defaults to NICE.
Economic Impact:
Attack Cost: $0.30 (gas only)
Attack Gain: 1 NFT per unchecked address
Protocol Damage: Unauthorized NFT minting, bypasses Santa's authority
Business logic bypass, requires specific timing (Christmas) but no other barriers
## Description `collectPresent` function is supposed to be called by users that are considered `NICE` or `EXTRA_NICE` by Santa. This means Santa is supposed to call `checkList` function to assigned a user to a status, and then call `checkTwice` function to execute a double check of the status. Currently, the enum `Status` assigns its default value (0) to `NICE`. This means that both mappings `s_theListCheckedOnce` and `s_theListCheckedTwice` consider every existent address as `NICE`. In other words, all users are by default double checked as `NICE`, and therefore eligible to call `collectPresent` function. ## Vulnerability Details The vulnerability arises due to the order of elements in the enum. If the first value is `NICE`, this means the enum value for each key in both mappings will be `NICE`, as it corresponds to `0` value. ## Impact The impact of this vulnerability is HIGH as it results in a flawed mechanism of the present distribution. Any unchecked address is currently able to call `collectPresent` function and mint an NFT. This is because this contract considers by default every address with a `NICE` status (or 0 value). ## Proof of Concept The following Foundry test will show that any user is able to call `collectPresent` function after `CHRISTMAS_2023_BLOCK_TIME` : ``` function testCollectPresentIsFlawed() external { // prank an attacker's address vm.startPrank(makeAddr("attacker")); // set block.timestamp to CHRISTMAS_2023_BLOCK_TIME vm.warp(1_703_480_381); // collect present without any check from Santa santasList.collectPresent(); vm.stopPrank(); } ``` ## Recommendations I suggest to modify `Status` enum, and use `UNKNOWN` status as the first one. This way, all users will default to `UNKNOWN` status, preventing the successful call to `collectPresent` before any check form Santa: ``` enum Status { UNKNOWN, NICE, EXTRA_NICE, NAUGHTY } ``` After modifying the enum, you can run the following test and see that `collectPresent` call will revert if Santa didn't check the address and assigned its status to `NICE` or `EXTRA_NICE` : ``` function testCollectPresentIsFlawed() external { // prank an attacker's address vm.startPrank(makeAddr("attacker")); // set block.timestamp to CHRISTMAS_2023_BLOCK_TIME vm.warp(1_703_480_381); // collect present without any check from Santa vm.expectRevert(SantasList.SantasList__NotNice.selector); santasList.collectPresent(); vm.stopPrank(); } ```
The contest is live. Earn rewards by submitting a finding.
Submissions are being reviewed by our AI judge. Results will be available in a few minutes.
View all submissionsThe contest is complete and the rewards are being distributed.