-
Notifications
You must be signed in to change notification settings - Fork 230
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Smart contract to verify an address and for accept an invitation #124
Smart contract to verify an address and for accept an invitation #124
Conversation
This comment was marked as off-topic.
This comment was marked as off-topic.
packages/zevm-app-contracts/contracts/zeta-points/InvitationManager.sol
Outdated
Show resolved
Hide resolved
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I see a potential vulnerability (low) that goes like this:
- I create an invite signature.
- Someone accepts my invite.
- An attacker gets my invite signature since it's public.
- The attacker creates thousands of accounts and gets all of them to be invited by me.
- My
inviteeList
gets extremely long and I get no benefits since they're capped to N invites a week.
I think it's not too bad since we don't iterate over an inviteeList
on any function, but I think a very long list may cause view
issues.
On top of that, we have getInviteeAtIndex
, shouldn't we at least make index
part of the InvitationAccepted
event? So there's more information available to query that function.
that's why we have |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
Summary