This level explores signature malleability. If for any reason a signature is passed as an input and checked in a smart contract without restricting the malleability, the same signature can be used again by a malicious attacker, impersonating a user and taking advantage of this user's permissions on the smart contract.
This level explores signature malleability. If for any reason a signature is passed as an input and checked in a smart contract without restricting the malleability, the same signature can be used again by a malicious attacker, impersonating a user and taking advantage of this user's permissions on the smart contract.