-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
✨Linkdrop x Gnosis Safe Smart Contract Bug-bounty✨ #5
Comments
Issue Status: 1. Open 2. Started 3. Submitted 4. Done This issue now has a funding of 500.0 DAI (500.0 USD @ $1.0/DAI) attached to it as part of the LinkdropHQ fund.
|
Costly loop
Ethereum is a very resource-constrained environment. Prices per computational step are orders of magnitude higher than with centralized providers. Moreover, Ethereum miners impose a limit on the total number of gas consumed in a block. If array.length is large enough, the function exceeds the block gas limit, and transactions calling it will never be confirmed |
Issue Status: 1. Open 2. Started 3. Submitted 4. Done Work has been started. These users each claimed they can complete the work by 2 years, 6 months ago. 1) igor-dulger has started work. Load code and look for vulnerabilities 1.Start by analyzing the contract with my own developed tools at first. I'm doing mostly just manual review on the contract. Submitted a bug directly to the team and am now formally submitting it here. Learn more on the Gitcoin Issue Details page. |
Do you have business logic description ? Formal verification won't give a lot of use, you can use some tool for this. For me to check if everything ok I need to understand what your app does. |
@igor-dulger Sure, please refer to our technical description |
There's a replay attack that enables malicious users to send transactions from the same signers multiple times. This vulnerability arises if the same signers have multiple linkdrop modules. Because This issue has been fixed after initial reports to the team with address(this) being added in the |
Issue Status: 1. Open 2. Started 3. Submitted 4. Done Work for 500.0 DAI (500.0 USD @ $1.0/DAI) has been submitted by: @Kisgus please take a look at the submitted work:
|
Issue Status: 1. Open 2. Started 3. Submitted 4. Done The funding of 500.0 DAI (500.0 USD @ $1.0/DAI) attached to this issue has been approved & issued to @RobertMCForster.
|
LinkdropCommon.claimedTo (LinkdropCommon.sol#11) is never initialized. It is used in: Reference: https://github.com/crytic/slither/wiki/Detector-Documentation#uninitialized-state-variables |
Scope
Below smart contracts are within the scope of the bug bounty:
Contracts within scope
LinkdropModule.sol (and all contracts it is inherited from)
https://github.com/LinkdropProtocol/linkdrop-safe-module/blob/dev/contracts/module/LinkdropModule.sol
Contracts not within scope
https://github.com/LinkdropProtocol/linkdrop-safe-module/tree/dev/contracts/imports
https://github.com/LinkdropProtocol/linkdrop-safe-module/tree/dev/contracts/mocks
Payout
Minor discovered bugs, making linkdrop behave in an unexpected harmful way, without putting any funds at risk, will be rewarded with 100 DAI.
Critical vulnerability bugs allowing 3rd parties to steal or lock up funds will be rewarded with 500 DAI.
First come first served, only the first to identify a specific minor or critical bug will be entitled to receive the payout.
Responsible Disclosure
Make sure that you do not share your submission public until we have confirmed it to you, or else you will be disqualified. Issues will be credited on a first come — first serve basis. Issues already known to us or issues already submitted by another user will not be eligible for rewards.
Issues can be submitted anonymously.
Submit an empty "submission" via Gitcoin and send your "submission" to [email protected]
The text was updated successfully, but these errors were encountered: