Closed code423n4 closed 1 year ago
gzeon-c4 marked the issue as duplicate of #460
livingrockrises marked the issue as sponsor confirmed
should be high risk as per other proofs
gzeon-c4 marked the issue as satisfactory
gzeon-c4 changed the severity to 3 (High Risk)
Lines of code
https://github.com/code-423n4/2023-01-biconomy/blob/main/scw-contracts/contracts/smart-contract-wallet/SmartAccountFactory.sol#L26-L39
Vulnerability details
_entryPoint
and_handler
are not included in the salt, so a front-running attack could be possible for the same_owner
and_index
(same counterfactual address) with malicious_entryPoint
and_handler
(DoS/freeze funds) only entryPoint can be updated, not handler. Add to salt and below forgetAddressForCounterfactual
.