Conversation
Fix re-entry vulnerability on split payment using call(); The first addr could drain all the funds. https://consensys.net/diligence/blog/2019/09/stop-using-soliditys-transfer-now/
|
Thank you @0xPanku for this contribution, I'm gonna make a review and take action ASAP. |
|
Hi @0xPanku, please correct me if I'm wrong, but from what I see the re-entrancy attack can only be performed by a malicious owner, because the withdraw method has the If that's the case, we absolutely think this fix is valuable, but we prefer including it in our next contract release so we won't confuse people following along from the YouTube videos since they have line-by-line references there. Anyway thank you very much for your time, we really appreciate this kind of contributions. |
|
Hi @liarco, you are absolutely right about your analysis. |
|
You are welcome and by the way, thank you very much for pointing this out. This kind of contributions from the community are what make open-source projects grow the right way! :) |
Fix re-entry vulnerability on split payment using call();
The first addr could drain all the funds.
https://consensys.net/diligence/blog/2019/09/stop-using-soliditys-transfer-now/