Open hats-bug-reporter[bot] opened 4 months ago
Non-issue, it is intentional not to support approvedHashes
, because it is something that is managed directly from a safe storage, and that's why we do not plan to support it in our module.
if any user, use this functionality with our execTransactionOnBehalf
the signature not will be concatenated, and probably fail!!, and that's why we will left well docummented that in our protocol.
Github username: -- Twitter username: SBSecurity_ Submission hash (on-chain): 0x9ab6a6d445d708b08312713874fce44f68c7caec5f5f8e24c4652de0fbc03902 Severity: medium
Description: Description\
processAndSortSignatures()
is missing case when v = 1, and use the wrong signer.When v = 1 it should return the signer from
r
param like it is done is the SAFE contractAttack Scenario\ Describe how the vulnerability can be exploited.
Attachments