The project consists of a buggy WMATICv2 token contract containing a function redeem allowing reentrancy attack. Additionally, there is a Bounty.sol contract, which rewards the first person who successfully calls its getBounty function.
There are two trackers of the total supply of WMATICv2 tokens and our goal is to successfully call getBounty, which requires these two trackers to be significantly deviated.
Below is the intended solution that conducts flash loan and reentrancy attacks:
0. Borrow k MATIC such that k > balance() / 10
1. depositMATIC() with k MATIC
2. redeem(k * 1e18) -- reentrancy contract --> getBounty()
3. Return k MATIC
The contracts are exploitable before block number 35690977. We'll fork the chain at block number 35690976 and let ItyFuzz find the exploit.
To conduct an ItyFuzz campaign, run the following command:
ityfuzzevm\-t0x5d6c48f05ad0fde3f64bab50628637d73b1eb0bb,0xbcf6e9d27bf95f3f5eddb93c38656d684317d5b4\-f-cPOLYGON\--onchain-block-number35690976\--onchain-etherscan-api-key<youretherscanapikey># (Optional) specify your Polygon etherscan api key
Optionally, you can also use your RPC instead of the default public RPC by setting environment variable ETH_RPC_URL. For instance, to use your local RPC, run:
After a few seconds to minutes, you should see ItyFuzz exit with the full exploit to take the fund.