@rootedrescue
Last updated
Last updated
Source: a point in code where an attacker supplied input enters the execution flow. Sink: a point in code where malicious state change can occur. Map the program for all Sources and trace the execution flow to determine which of them provide a path where a Sink can be reached. What safeguards are present and what would be required to bypass them? Respectively, map the program for all Sinks and retrace the steps required to reach them to identify relevant Sources. Is it possible to craft a valid transaction to reach the Sink from the Source?