Skip to content

Latest commit

 

History

History
22 lines (20 loc) · 821 Bytes

Reentrancy vulnerability in `MetaSwap.swap()`.md

File metadata and controls

22 lines (20 loc) · 821 Bytes

If an attacker is able to reenter swap(), they can execute their own trade using the same tokens and get all the tokens for themselves.

Recommendation:

Use a simple reentrancy guard, such as OpenZeppelin’s ReentrancyGuard to prevent reentrancy in MetaSwap.swap()


Slide Screenshot

018.jpg


Slide Text

  • ConsenSys Audit MetaSwap Finding 4.1
  • Reentrancy
  • Major Severity
  • Swap Reentrancy
  • Use Reentrancy Guard

References


Tags