Open code423n4 opened 2 years ago
Dup #3
AxelarDepositServiceProxy cannot sweep out, so valid L
Simply not true, both approve and safeApprove are subject to front-run of allowance changes, while the code will not be front-runnable if the gateway will move the tokens in the same tx in which the approval is done. For that reason I disagree.
1 L
[L-01] Unused receive() function will lock Ether in contract
Impact
If the intention is for the Ether to be used, the function should call another function, otherwise it should revert
https://github.com/code-423n4/2022-07-axelar/tree/main/contracts/deposit-service/DepositReceiver.sol#L29 https://github.com/code-423n4/2022-07-axelar/tree/main/contracts/deposit-service/AxelarDepositServiceProxy.sol#L13
[L-02] approve is subject to a known front-running attack. Consider using safeApprove instead:
approve
is subject to a known front-running attack. Consider usingsafeApprove
instead:Update to _token.safeApprove(spender, type(uint256).max) in the function.