Blockchain bridge security - Part 4
This is the 4th article of the Bridge security series. see the Part 1, Part 2, part 3. This article explains: 1. Chain id spoofing 2. Hash collision 3. Lack of signature expiry check 1. Chain id spoofing The contract used in this example is BridgeSpoofChainId.sol. This contract has