You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
As you can see, originalTokenAddress is used as input and is controllable by the user. If there is malicious input later and implement the IERC20 interface standard, it calls safeTransferFrom without checking the originalTokenAddress parameter. Are there any problems?
The text was updated successfully, but these errors were encountered:
Description
When we recently used the fuzz testing tool, we scanned the contract Bridge.sol. We found some issues and wanted to confirm with you.
As you can see, originalTokenAddress is used as input and is controllable by the user. If there is malicious input later and implement the IERC20 interface standard, it calls safeTransferFrom without checking the originalTokenAddress parameter. Are there any problems?
The text was updated successfully, but these errors were encountered: