Пост
Поделитесь своими знаниями.
May 30, 2024
Обсуждение
Reentrancy Vulnerability
Hello everyone , I've noticed that the offer function uses the .call{value: amount}("") method to send Ether to the recipient's address.
Could anyone provide insight into whether this function is indeed vulnerable to reentrancy and suggest any best practices or modifications to mitigate such risks?
function _offer(address to, uint256 amount) internal {
balance -= amount;
(bool success, ) = to.call{value: amount}("");
if (!success) {
revert TransferFailed(address(0), address(this), to, amount);
}
}
- Foundry
- Security
- Solidity
- Blockchain
- Smart Contract
0
0
Поделиться
Комментарии
Знаете ответ?
Пожалуйста, войдите в систему и поделитесь им.
Cyfrin Updraft is an education platform specializing on teaching the next generation of smart contract developers
195Посты196Ответы