8000 Possible attack to steal `vout` · Issue #160 · clearmatics/zeth · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content
Possible attack to steal vout #160
Closed
@dtebbs

Description

@dtebbs

The attack below seems to be a vulnerability:

User U broadcasts a transaction to which calls \mix to withdrawn funds from the mixer. A malicious Ethereum node A notices the transaction in the mempool, resigns and rebroadcasts it from his own Ethereum address (with a higher gas price).
If the resigned tx is executed first, A will receive the \mix output \vout.

If the above is a genuine vulnerability, the \mix parameters must be tied to the sender (via $\hsig$?) and the contract code must check this against eth.sender.

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions

      0