Sayfer Identifies New Frontrunning Vulnerability in the Connext Bridge

Israeli cybersecurity firm Sayfer has identified a new vulnerability in the Connext bridge that exposes relayer remuneration funds to frontrunning. It is believed that more than $70,000 worth of fees have been frontrunned to date.

The connext bridge requires a class of actors called ‘relayers’. Relayers are responsible for submitting users’ transactions on the receiving chain without requiring the user to spend gas out of their own pocket. For their work, relayers are allocated a certain fee. Sayfer has discovered that because the fee is sent to the msg.sender (i.e. the account or contract that sent the transaction), without authenticating the identity of the relayer, this fee can be snatched by frontrunners.

Frontrunning is performed by bots (also known as MEV bots) that scour Ethereum’s mempool for vulnerable impending transactions. They then copy the transaction, and place an identical order but with higher gas fees. That way, the copied transaction is executed before the original, and the bot pockets the profit. The proliferation of MEV bots is considered a major threat to the integrity and reliability of the Ethereum blockchain.

Sayfer has reported their research to Connext, but they claim that this is not a vulnerability, and refuse to correct it.

https://twitter.com/SayferSecurity/status/1572843128406646785

Media Contact
Company Name: Sayfer
Contact Person: Media Relations
Email: Send Email
Country: Israel
Website: https://sayfer.io/blog/connexts-bridge-possible-hack-more-than-70k-frontrunned/