Medium Severity Smart Contract Vulnerability from the SparkN Audit Contest Simply Explained

Поделиться
HTML-код
  • Опубликовано: 27 авг 2024
  • Discover a Medium Severity Smart Contract Vulnerability in the SparkN Audit Contest!
    In this video, we break down a Medium severity vulnerability in the ProxyFactory contract that could lead to token loss and incorrect addresses.
    We will explore the ProxyFactory contract, which acts as a gateway to SPARKN's contracts, especially in contests. We'll discuss key functions like setContest, deployProxyAndDistribute, and more.
    We uncover a vulnerability in the getProxyAddress() function, showing you how incorrect addresses can be generated without verification. Discover how this puts tokens at risk and why it's a high-severity issue.
    Feeling overwhelmed by smart contract security? Enroll in our Smart Contract Hacking Course. From beginner to intermediate-level smart contract auditing, we offer hands-on experience, certification, and access to an exclusive Discord community:
    johnnytime.xyz...
    We will also explore the potential risks and impact of this vulnerability, including how it can occur during the contest setup process. We discuss the importance of mitigating this issue and ensuring secure token transfers.
    Watch the full livestream:
    • Codehawks Sparkn Audit...

Комментарии • 2

  • @PatrickAlphaC
    @PatrickAlphaC 10 месяцев назад +1

    Badass

  • @medhasni6432
    @medhasni6432 10 месяцев назад

    Hey Johnny, for the recent contests 4 ve published the results and wasnt tag on any of em even tho i worked good on them, could it be the judges or the judge criteria changed on code4rena or it s just me havent developped ?