The project enables Foreign Function Interface (FFI) in `foundry.toml` and executes shell commands via `vm.ffi()` in the test suite. This allows arbitrary code execution on any developer's machine who runs `forge test`, potentially leading to complete system compromise, private key theft, and malware installation.
**Expected behavior:**Test suites should not execute arbitrary system commands that could compromise developer security
Actual behavior: The test file `FestivalPass.t.sol` uses `vm.ffi()` to execute bash commands, and `ffi = true` is enabled in `foundry.toml`
Likelihood:
- Executes automatically when any developer runs `forge test` - no user interaction required
- Affects every developer, CI/CD pipeline, and automated testing system
- No visible warning to developers that code execution will occur
- Easy to exploit - simply modify the bash commands in inputs array
Impact:
**Complete system compromise**: Attacker can execute any command on the developer's machine
**Private key theft**: Can read environment variables like `PRIVATE_KEY`, `MNEMONIC`, etc.
**Data exfiltration**: Can send files, git history, or credentials to remote servers
**Malware installation**: Can download and execute malicious binaries
**Supply chain attack**: Compromised developer machines can inject malicious code into production
**CI/CD compromise**: If tests run in CI, can compromise deployment pipelines
Remove FFI from test suite
Disable FFI in foundry.toml
The contest is live. Earn rewards by submitting a finding.
Submissions are being reviewed by our AI judge. Results will be available in a few minutes.
View all submissionsThe contest is complete and the rewards are being distributed.