_Follow along with the video lesson:_ --- ### Quick Aside After the following lesson, you might be asking yourself: **_Why isn't this the same as the `arbitrary from` finding?_** The answer is that the `root causes` of these findings are _slightly_ different. - **Arbitrary From:** approved tokens can be stolen by sending from any address - **Infinite Mint:** vault possesses maximum approvals by default and at all times While `infinite mint` uses `arbitrary from` as a mechanism for it's exploitation, the true root is that the vault has approved the bridge 100% of the time. There could be argument for these to be the same finding, but I think they're unique enough to warrant separation. We've only got 2 functions left to go through, let's keep going!
Patrick discusses how to identify if similar findings are recognized as unique bugs and how to determine distinct vulnerabilities by considering the root cause.
Previous lesson
Previous
Next lesson
Next
Give us feedback
Solidity Developer
Smart Contract SecurityDuration: 25min
Duration: 1h 18min
Duration: 35min
Duration: 2h 28min
Duration: 5h 03min
Duration: 5h 22min
Duration: 4h 33min
Duration: 2h 01min
Duration: 1h 40min
Testimonials
Read what our students have to say about this course.
Chainlink
Chainlink
Gustavo Gonzalez
Solutions Engineer at OpenZeppelin
Francesco Andreoli
Lead Devrel at Metamask
Albert Hu
DeForm Founding Engineer
Radek
Senior Developer Advocate at Ceramic
Boidushya
WalletConnect
Idris
Developer Relations Engineer at Axelar