#38225 [SC-Insight] user funds will get stuck if `removeDestination` executes before notarization an
Description
Brief/Intro
Vulnerability Details
function authNotary(
bytes calldata payload,
bytes calldata proof
) external nonReentrant {
...SKIP...
// Ensure that fromContract matches the bridgeContract
// This make sure that call is not comming from unsupported bridge contract
DestinationConfig memory destConf = getDestination(
bytes32(action.fromChain)
);
if (destConf.bridgeContract != action.fromContract) {
@> revert UnknownOriginContract(
bytes32(action.fromChain),
action.fromContract
);
}
...SKIP...
}Example Scenario
Impact Details
References
Proof of Concept
Proof of Concept
Previous#38231 [SC-Low] Due to incorrect design in `Consortium::setNextValidatorSet` the validator set couldNext38286 [SC-Low] bitcoinutils getdustlimitforoutput calculate wrongly the dust limit for a given bitco
Last updated
Was this helpful?