Skip to content

Latest commit

 

History

History
41 lines (27 loc) · 1.92 KB

README.md

File metadata and controls

41 lines (27 loc) · 1.92 KB

Awesomwasm 2023 CTF

Challenge 04: Gram

Simplified vault for minting shares proportional to the current balance of the contract, it allows to redeem back for funds afterwards.

Execute entry points:

pub enum ExecuteMsg {
    /// Mint shares
    Mint {},
    /// Burn shares
    Burn { shares: Uint128 },
}

Please check the challenge's integration_tests for expected usage examples. You can use these tests as a base to create your exploit Proof of Concept.

🏠 Base scenario:

  • The contract is newly instantiated with zero funds.

⭐ Goal for the challenge:

  • Demonstrate how an unprivileged user can withdraw more funds than deposited.

Scoring

This challenge has been assigned a total of 150 points:

  • 40 points will be awarded for a proper description of the finding that allows you to achieve the Goal above.
  • 35 points will be awarded for a proper recommendation that fixes the issue.
  • If the report is deemed valid, the remaining 75 additional points will be awarded for a working Proof of Concept exploit of the vulnerability.

❗ The usage of cw-multi-test is mandatory for the PoC, please take the approach of the provided integration tests as a suggestion.

❗ Remember that insider threats and centralization concerns are out of the scope of the CTF.

Any questions?

If you are unsure about the contract's logic or expected behavior, drop your question on the official Telegram channel and one of our team members will reply to you as soon as possible.

Please remember that only questions about the functionality from the point of view of a standard user will be answered. Potential solutions, vulnerabilities, threat analysis or any other "attacker-minded" questions should never be discussed publicly in the channel and will not be answered.