Simplified vault for minting shares proportional to the current balance of the contract, it allows to redeem back for funds afterwards.
pub enum ExecuteMsg {
/// Mint shares
Mint {},
/// Burn shares
Burn { shares: Uint128 },
}
Please check the challenge's integration_tests for expected usage examples. You can use these tests as a base to create your exploit Proof of Concept.
🏠 Base scenario:
- The contract is newly instantiated with zero funds.
⭐ Goal for the challenge:
- Demonstrate how an unprivileged user can withdraw more funds than deposited.
This challenge has been assigned a total of 150 points:
- 40 points will be awarded for a proper description of the finding that allows you to achieve the Goal above.
- 35 points will be awarded for a proper recommendation that fixes the issue.
- If the report is deemed valid, the remaining 75 additional points will be awarded for a working Proof of Concept exploit of the vulnerability.
❗ The usage of cw-multi-test
is mandatory for the PoC, please take the approach of the provided integration tests as a suggestion.
❗ Remember that insider threats and centralization concerns are out of the scope of the CTF.
If you are unsure about the contract's logic or expected behavior, drop your question on the official Telegram channel and one of our team members will reply to you as soon as possible.
Please remember that only questions about the functionality from the point of view of a standard user will be answered. Potential solutions, vulnerabilities, threat analysis or any other "attacker-minded" questions should never be discussed publicly in the channel and will not be answered.