Closed code423n4 closed 1 year ago
https://github.com/code-423n4/2023-01-drips/blob/main/src/NFTDriver.sol#L79
In NFTDriver.sol, the safeMint() function calls _safeMint() which has a callback to the "to" address argument. Functions with callbacks should have reentrancy guards in place for protection against possible malicious actors..
Manual code review
Add a reentrancy guard modifier on the safeMint() function.
GalloDaSballo marked the issue as unsatisfactory: Invalid
Lacks of an attack, the last call is just for events
Lines of code
https://github.com/code-423n4/2023-01-drips/blob/main/src/NFTDriver.sol#L79
Vulnerability details
Impact
In NFTDriver.sol, the safeMint() function calls _safeMint() which has a callback to the "to" address argument. Functions with callbacks should have reentrancy guards in place for protection against possible malicious actors..
Proof of Concept
https://github.com/code-423n4/2023-01-drips/blob/main/src/NFTDriver.sol#L79
Tools Used
Manual code review
Recommended Mitigation Steps
Add a reentrancy guard modifier on the safeMint() function.