_Follow along with the video lesson:_ --- ### Quick Aside After the following lesson, you might be asking yourself: **_Why isn't this the same as the `arbitrary from` finding?_** The answer is that the `root causes` of these findings are _slightly_ different. - **Arbitrary From:** approved tokens can be stolen by sending from any address - **Infinite Mint:** vault possesses maximum approvals by default and at all times While `infinite mint` uses `arbitrary from` as a mechanism for it's exploitation, the true root is that the vault has approved the bridge 100% of the time. There could be argument for these to be the same finding, but I think they're unique enough to warrant separation. We've only got 2 functions left to go through, let's keep going!
Patrick discusses how to identify if similar findings are recognized as unique bugs and how to determine distinct vulnerabilities by considering the root cause.
Previous lesson
Previous
Next lesson
Next
Give us feedback
Solidity Developer
Smart Contract SecurityDuration: 25min
Duration: 1h 18min
Duration: 35min
Duration: 2h 28min
Duration: 5h 03min
Duration: 5h 22min
Duration: 4h 33min
Duration: 2h 01min
Duration: 1h 40min