-
Notifications
You must be signed in to change notification settings - Fork 14
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Dangerous stake method usage #49
Comments
We put
I don't think this is true, only the SpankBank would be approved, and the only way to get the SpankBank to trigger a |
@ameensol I will be able to call |
I will be able to set any arguments I want for YOUR stake:
|
@ameensol let's reopen the issue :) |
Someone could use this scheme to intervene your users to work with spankbank. |
I'd recommend looking at ERC1003 for solution fully compatible with ERC20 two-transaction mode: ethereum/EIPs#1003 |
Looks like stacked BOOTY can be stolen in case of setting hackers |
This is a good catch.
You would indeed be able to do this.
This could be solved by checking inside the |
Also hacker can vote for closing for some of the participants. Trying to enumerate all possible attack vectors. |
Hey, we fixed this as part of a more critical bugfix. https://medium.com/spankchain/spankbank-hotfix-5bca5bfd288d Send me an ETH address and I'll send you $1,000 worth of ETH as a reward. Thanks! |
Hi,
approveAndCall
method is not in ERC20 and potentially some unofficial clients (web/mobile/desktop) may try to make 2 transactions as well asstake
method is public:approve
bank some amount of tokensstake
public method, which willtransferFrom
previously approved tokensAnd anyone will be able to spend anyone tokens right between this transaction. If you're sure everybody will everytime use
approveAndCall
so why do you needstake
method at all? Why do you need it even exist?The text was updated successfully, but these errors were encountered: