Reentrancy hook on bounty #256
Labels
1 (Low Risk)
Assets are not at risk. State handling, function incorrect as to spec, issues with comments
bug
Warden finding
duplicate
Another warden found this issue
sponsor confirmed
Sponsor agrees this is a problem and intends to fix it (OK to use w/ "disagree with severity")
Handle
goatbug
Vulnerability details
Impact
Anyone can add any bounty and pass in any smart contract instead of an erc20 token.
When calling settleAuction, this triggers a tranfer function to be called from the smart contract that can be used to re-enter the auction or basket code.
Currently this cannot do anything malicious, but after the code is heavily refactored and improved based on the audit, it is possible this reentrancy hook could maliciously be used.
The contract should rather have a whitelist of token addresses that could be used for the bounty to avoid reentrancy.
Proof of Concept
Provide direct links to all referenced code in GitHub. Add screenshots, logs, or any other relevant proof that illustrates the concept.
Tools Used
Recommended Mitigation Steps
The text was updated successfully, but these errors were encountered: