Closed code423n4 closed 1 year ago
141345 marked the issue as duplicate of #17
141345 marked the issue as not a duplicate
141345 marked the issue as primary issue
donosonaumczuk marked the issue as disagree with severity
We were aware of this and we are considering it. We think this should be QA/Low.
Downgrading to Low as there is already a whitelist, and using SafeMint
is in my opinion more an additional safety check that a security vulnerability
Picodes changed the severity to QA (Quality Assurance)
Picodes marked the issue as grade-c
Lines of code
https://github.com/code-423n4/2023-07-lens/blob/cdef6ebc6266c44c7068bc1c4c04e12bf0d67ead/contracts/LensHub.sol#L89-L102
Vulnerability details
Impact
Users possibly lose their NFTs
Proof of Concept
_safeMint()
should be used rather than_mint()
wherever possible. It caught 04 cases and missed the case in LensHub.sol#createProfile()_mint()
and does not implement_safeMint()
ERC721.sol
by Openzeppelin:Tools Used
Manual Review
Recommended Mitigation Steps
_safeMint()
inLensBaseERC721.sol
: References_safeMint
instead of_mint
to check received address support for ERC721 implementation.Assessed type
ERC721