Blockchain bridge security - Part 3
This is 3rd article of the Bridge security series. Check out Part 1 and Part 2 This article explains Arbitrary call execution with the help of two implementation specific examples: 1. Attacker steals ether. 2. Attacker tricks minting logic. Arbitrary call execution This vulnerability is possible because the bridge contract