Post
Share your knowledge.
May 30, 2024
Discussion
Reentrancy Vulnerability
Hello everyone , I've noticed that the offer function uses the .call{value: amount}("") method to send Ether to the recipient's address.
Could anyone provide insight into whether this function is indeed vulnerable to reentrancy and suggest any best practices or modifications to mitigate such risks?
function _offer(address to, uint256 amount) internal {
balance -= amount;
(bool success, ) = to.call{value: amount}("");
if (!success) {
revert TransferFailed(address(0), address(this), to, amount);
}
}
- Foundry
- Security
- Solidity
- Blockchain
- Smart Contract
0
0
Share
Comments
Do you know the answer?
Please log in and share it.
Cyfrin Updraft is an education platform specializing on teaching the next generation of smart contract developers
194Posts188Answers
Trending posts