You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Describe the bug
The GenFWStorage contract relies on a backend to set the hashes used for forced withdrawals. This creates a single point of failure.
Configuration
Severity: LOW
Impact
Backend Compromise: If the backend is compromised, an attacker can manipulate the hashes to exploit the withdrawal functions.
Unauthorized Withdrawals: Malicious actors can use fraudulent hashes to withdraw funds from the bridge contract.
Recommendation
The closer needs to exercise caution when using the forceRegistry function to ensure only legitimate and secure storage contracts are registered. Here are some key points to consider:
Validation of Contracts: Ensure that the storage contracts being registered are verified and secure.
Multi-Signature Approval: Implement a multi-signature mechanism for registering new storage contracts to prevent unilateral decisions.
Transparency: Maintain transparency by documenting and publishing changes made through forceRegistry.
By taking these precautions, the closer can significantly reduce the risk of security breaches and unauthorized withdrawals.
**Exploit Scenario **
Demo
The text was updated successfully, but these errors were encountered:
Thank you for your confirmation. In this part, the hash value for the address will be transparently disclosed when the protocol starts. Also, applying multi-signature in #19 will increase security.
Describe the bug
The GenFWStorage contract relies on a backend to set the hashes used for forced withdrawals. This creates a single point of failure.
Configuration
Impact
Backend Compromise: If the backend is compromised, an attacker can manipulate the hashes to exploit the withdrawal functions.
Unauthorized Withdrawals: Malicious actors can use fraudulent hashes to withdraw funds from the bridge contract.
Recommendation
The closer needs to exercise caution when using the forceRegistry function to ensure only legitimate and secure storage contracts are registered. Here are some key points to consider:
By taking these precautions, the closer can significantly reduce the risk of security breaches and unauthorized withdrawals.
**Exploit Scenario **
Demo
The text was updated successfully, but these errors were encountered: