Platform: Code4rena
Start Date: 24/03/2023
Pot Size: $49,200 USDC
Total HM: 20
Participants: 246
Period: 6 days
Judge: Picodes
Total Solo HM: 1
Id: 226
League: ETH
Rank: 165/246
Findings: 1
Award: $13.13
🌟 Selected for report: 0
🚀 Solo Findings: 0
🌟 Selected for report: brgltd
Also found by: 0x3b, 0xAgro, 0xGusMcCrae, 0xNorman, 0xRajkumar, 0xSmartContract, 0xTraub, 0xWagmi, 0xWaitress, 0xffchain, 0xhacksmithh, 0xkazim, 0xnev, 3dgeville, ArbitraryExecution, Aymen0909, BRONZEDISC, Bason, Bloqarl, BlueAlder, Brenzee, CodeFoxInc, CodingNameKiki, Cryptor, DadeKuma, DevABDee, Diana, Dug, Englave, Gde, Haipls, HollaDieWaldfee, Ignite, Infect3d, Jerry0x, Josiah, Kaysoft, Koko1912, KrisApostolov, Lavishq, LeoGold, Madalad, PNS, Rappie, RaymondFam, RedTiger, Rickard, Rolezn, Sathish9098, SunSec, T1MOH, UdarTeam, Udsen, Viktor_Cortess, Wander, adriro, ak1, alejandrocovrr, alexzoid, arialblack14, ayden, bin2chen, brevis, btk, c3phas, carlitox477, catellatech, ch0bu, chaduke, ck, climber2002, codeslide, descharre, dingo2077, ernestognw, fatherOfBlocks, favelanky, georgits, helios, hl_, inmarelibero, juancito, ks__xxxxx, lopotras, lukris02, m_Rassska, mahdirostami, maxper, nadin, navinavu, nemveer, p_crypt0, peanuts, pipoca, pixpi, qpzm, rbserver, reassor, roelio, rotcivegaf, scokaf, siddhpurakaran, slvDev, smaul, tnevler, tsvetanovv, turvy_fuzz, vagrant, wen, yac, zzzitron
13.1298 USDC - $13.13
L01. Ether receive without sender restriction
The current contract implementation presents a potential risk for users due to its unrestricted nature, allowing anyone to send Ether to the contracts. It will result in the permanent loss of funds without providing any benefits to the affected users.
To mitigate this risk and enhance the security of the contract implementation, it is recommended to incorporate the receive function along with a msg.sender
check. This approach will allow only designated contracts to send native tokens, effectively protecting users from unintended loss of funds.
L02. Risks Associated with Floating Pragma The use of floating pragma in Solidity contracts has been identified as a potential source of security risks and unintended behavior. Floating pragma refers to the practice of using non-specific or non-fixed version numbers in the pragma statement, which may cause the contract to compile with different compiler versions, each with its own set of features and potential vulnerabilities.
Risks:
Recommended Solution: To minimize the risks associated with a floating pragma, it is advised to specify a fixed compiler version in the pragma statement. By doing so, developers can ensure that their contracts are compiled using a stable and secure version of the Solidity compiler.
#0 - c4-sponsor
2023-04-07T22:16:54Z
elmutt marked the issue as sponsor confirmed
#1 - c4-judge
2023-04-24T19:07:13Z
Picodes marked the issue as grade-b