You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I am still meditating on this issue but I have a bit uneasy feeling in the stomach about the JackpotManager. There is a possibility of locked ether vulnerability in the contract model.
As a best practice, from smart contract security perspective, in late 2018, if a contract allows users to deposit ether by calling the deposit function and it should contain a function that would allow users to withdraw the deposited ether.
The text was updated successfully, but these errors were encountered:
Are you sure you meant JackpotManager? Perhaps there is a misunderstanding. Tokens going into the jackpot will always eventually get rewarded on forced errors events.
Thx for the comments. I didn't get a chance to study the complete code yet. Will do in next few days/weeks.
"Stuck Ether Vulnerability" is a bad name for the stuck ether/token vulnerability. We should change to a better name.
Let's say the contract gets frozen from a new security vulnerability that will be discovered in few months. Now your contract is frozen and the amount in the contract is stuck.
This design pattern needs to change and any contract that allows users to deposit money should have a function to withdraw or destroy the deposited amount and the rest of the flow and business logic needs to accommodate the additional withdraw/destroy function.
I am still meditating on this issue but I have a bit uneasy feeling in the stomach about the
JackpotManager
. There is a possibility of locked ether vulnerability in the contract model.As a best practice, from smart contract security perspective, in late 2018, if a contract allows users to deposit ether by calling the deposit function and it should contain a function that would allow users to withdraw the deposited ether.
The text was updated successfully, but these errors were encountered: