Could you exploit this contract to empty its funds?
Network : rinkeby
Contract address : 0x00dab768d4446702D2bDd230D80C5B90e8f07CbD
Hints :
-
The attack is common known vulnerability. Don't look too far here for inspiration. Your attack should use another smart-contract to exploit the current contract.
-
Pay attention to the code of the deployed contract BalelecTrustFund.sol. What you see is not always what you get.
-
Be curious of past transactions, both deploy and internal.
-
No private key with test-ether will be provided, please use the rinkeby faucet for test transactions, contract deployments etc..
-
Once you understand what the contract does and how it works, send a quick report on slack @solerus