**Contest repo:** https://github.com/code-423n4/2023-07-axelar
**Findings repo:** https://github.com/code-423n4/2023-07-axelar-findings
**Judging by:** [Bernd](https://twitter.com/berndartmueller) (Discord: `berndartmueller#1928`)
**Pre-sorting by:** [sorryNotsorry](https://twitter.com/0xSorryNotSorry) (Discord: `0xsorrynotsorry`)
# High Severity Primary Submissions (17)
## [[H-484] Interchain token transfer can be Dossed Due To Flow Limit](https://github.com/code-423n4/2023-07-axelar-findings/issues/484)
## [[H-466] Honest users could lose funds due to the current implementation of `executeProposal()`](https://github.com/code-423n4/2023-07-axelar-findings/issues/466)
## [[H-461] `onlyProxy` MODIFIER CAN BE BYPASSED BY A MALICIOUS PROXY CONTRACT AND CAN PUSH THE IMPLEMENTATION CONTRACT INTO AN UNDESIRABLE STATE](https://github.com/code-423n4/2023-07-axelar-findings/issues/461)
## [[H-441] Insecure minimum threshold in `_rotateSigners` function](https://github.com/code-423n4/2023-07-axelar-findings/issues/441)
## [[H-424] ```InterchainTokenService#registerCanonicalToken``` GatewayToken check can be bypassed in several ways](https://github.com/code-423n4/2023-07-axelar-findings/issues/424)
## [[H-420] AxelarGateway.sol: external setup funtion allow anyone to set `governance_`, `mintLimiter_` and `operator` ](https://github.com/code-423n4/2023-07-axelar-findings/issues/420)
## [[H-390] Users can abuse multicall feature on InterchainTokenService to steal contract funds](https://github.com/code-423n4/2023-07-axelar-findings/issues/390)
## [[H-372] LACK OF VALIDATION CHECK COULD LEAD TO WRONG TOKEN TRANSFERS THUS BREAKING THE PROTOCOL](https://github.com/code-423n4/2023-07-axelar-findings/issues/372)
## [[H-356] Users can steal funds in the contract to avoid paying gas](https://github.com/code-423n4/2023-07-axelar-findings/issues/356)
## [[H-317] ERC777 and similar token implementations allow stealing of funds when transferring tokens](https://github.com/code-423n4/2023-07-axelar-findings/issues/317)
## [[H-316] Gas fees are refunded to a wrong address when transferring tokens via `InterchainToken.interchainTransferFrom`](https://github.com/code-423n4/2023-07-axelar-findings/issues/316)
## [[H-315] Colluded signers can steal native coins from a signer](https://github.com/code-423n4/2023-07-axelar-findings/issues/315)
## [[H-296] Potential Denial of Service and Front-running Vulnerability in expressReceiveToken and expressReceiveTokenWithData Functions](https://github.com/code-423n4/2023-07-axelar-findings/issues/296)
## [[H-286] Deployer of standardized token is allowed to deploy same standardized token to another chain, with different decimals](https://github.com/code-423n4/2023-07-axelar-findings/issues/286)
## [[H-101] Replay Attacks for validateProof](https://github.com/code-423n4/2023-07-axelar-findings/issues/101)
## [[H-100] ITS: Standardized tokens deployed with deployRemoteCanonicalToken cannot have liquidity, making the bridge unusable for that asset, and locking tokens on sending chain](https://github.com/code-423n4/2023-07-axelar-findings/issues/100)
## [[H-90] TokenManagerLiquidityPool.sol can permanently lock funds into liquidity pools](https://github.com/code-423n4/2023-07-axelar-findings/issues/90)
# Medium Severity Primary Submissions (53)
## [[M-502] Accepted proposal may be recreated at the same address with a malicious proposal if there's a self destruct function in the accepted proposal](https://github.com/code-423n4/2023-07-axelar-findings/issues/502)
## [[M-497] Users who call `expressReceiveTokenWithData` or `expressReceiveToken` can griefed to pay for fees](https://github.com/code-423n4/2023-07-axelar-findings/issues/497)
## [[M-489] Addresses in modifier not set correctly](https://github.com/code-423n4/2023-07-axelar-findings/issues/489)
## [[M-458] Inconsistencies between `expressReceiveTokenWithData` and `_processSendTokenWithDataPayload` can lead to gameable accounting errors for select tokens](https://github.com/code-423n4/2023-07-axelar-findings/issues/458)
## [[M-457] Measuring in native tokens will cause some transactions to fail unexpectedly due to gas price spikes on the destination chain](https://github.com/code-423n4/2023-07-axelar-findings/issues/457)
## [[M-450] InitProxy and Proxy may revert preventing successful init](https://github.com/code-423n4/2023-07-axelar-findings/issues/450)
## [[M-440] expressReceiveToken function on InterchainTokenService cannot be paused, express caller may lose funds when the transaction is settled after token service is paused](https://github.com/code-423n4/2023-07-axelar-findings/issues/440)
## [[M-397] [M] sendProposals reverts due to exceeding gas limit](https://github.com/code-423n4/2023-07-axelar-findings/issues/397)
## [[M-391] USERS COULD LOSE FUNDS DUE TO INSUFFICIENT INPUT VALIDATION CHECKS](https://github.com/code-423n4/2023-07-axelar-findings/issues/391)
## [[M-370] Adversary can prevent the deployemnt in `{TokenManagerDeployer, StandardizedTokenDeployer}` by frontrunning](https://github.com/code-423n4/2023-07-axelar-findings/issues/370)
## [[M-368] InterchainProposalSender.sendProposal/sendProposals should add access control](https://github.com/code-423n4/2023-07-axelar-findings/issues/368)
## [[M-348] `RemoteAddressValidator::validateSender` uses default address for `interchainTokenServiceAddress`](https://github.com/code-423n4/2023-07-axelar-findings/issues/348)
## [[M-346] users can create `TokenManager` with any `LiquidityPool`](https://github.com/code-423n4/2023-07-axelar-findings/issues/346)
## [[M-342] `AxelarServiceGovernance` can only be called cross chain](https://github.com/code-423n4/2023-07-axelar-findings/issues/342)
## [[M-341] signers signature has no deadline and they cannot withdraw their vote](https://github.com/code-423n4/2023-07-axelar-findings/issues/341)
## [[M-339] interchain token transfers to destination addresses that support flash loans can have their transfer stolen](https://github.com/code-423n4/2023-07-axelar-findings/issues/339)
## [[M-338] `flowLimit` can be exceeded](https://github.com/code-423n4/2023-07-axelar-findings/issues/338)
## [[M-334] `MultisigBase` can get excess `eth`](https://github.com/code-423n4/2023-07-axelar-findings/issues/334)
## [[M-332] `TokenManager`'s flow limit logic is broken for `ERC777` tokens](https://github.com/code-423n4/2023-07-axelar-findings/issues/332)
## [[M-328] The impossibility of scheduling several identical operations within the timelock period of the first such operation](https://github.com/code-423n4/2023-07-axelar-findings/issues/328)
## [[M-323] `RemoteAddressValidator` can incorrectly convert addresses to lower case](https://github.com/code-423n4/2023-07-axelar-findings/issues/323)
## [[M-322] `InterchainTokenService.getImplementation` can cause deployment of a non-functioning `TokenManagerProxy`](https://github.com/code-423n4/2023-07-axelar-findings/issues/322)
## [[M-319] Proposal requiring native coin transfers cannot be executed](https://github.com/code-423n4/2023-07-axelar-findings/issues/319)
## [[M-318] `AxelarServiceGovernance` doesn't implement a function to manage proposals](https://github.com/code-423n4/2023-07-axelar-findings/issues/318)
## [[M-313] Proxy contracts have an empty `receive` function that will make it impossible to call `receive` on implementation contract](https://github.com/code-423n4/2023-07-axelar-findings/issues/313)
## [[M-308] Deploying Canonical Bridge will fail for some tokens .](https://github.com/code-423n4/2023-07-axelar-findings/issues/308)
## [[M-302] TokenManager::setup does not check the caller](https://github.com/code-423n4/2023-07-axelar-findings/issues/302)
## [[M-300] InterchainTokenService doesnât support executeWithToken, but the call succeeds silently](https://github.com/code-423n4/2023-07-axelar-findings/issues/300)
## [[M-293] Users' funds are permanently locked when sent to a destinationAddress that reverts.](https://github.com/code-423n4/2023-07-axelar-findings/issues/293)
## [[M-292] Users funds are indefinitely locked when sent to a chain that does not have enough tokens.](https://github.com/code-423n4/2023-07-axelar-findings/issues/292)
## [[M-291] Users funds are temporarily locked when sent to a chain whose InterchainTokenService is paused](https://github.com/code-423n4/2023-07-axelar-findings/issues/291)
## [[M-278] `AxelarServiceGovernance.sol`: missing timelock check before proposal execution](https://github.com/code-423n4/2023-07-axelar-findings/issues/278)
## [[M-261] `InterchainTokenService` may send invalid payload with non-existent `TokenManagers` contracts](https://github.com/code-423n4/2023-07-axelar-findings/issues/261)
## [[M-254] User might send tokens to unsupported chains because of faulty implementations in RemoteAddressValidator](https://github.com/code-423n4/2023-07-axelar-findings/issues/254)
## [[M-245] MultisigBase.sol | The lack of a unique identifier for the operation creates a risk of execution several times](https://github.com/code-423n4/2023-07-axelar-findings/issues/245)
## [[M-239] Axelar Governance is unable to call setFlowLimits in InterchainTokenService.sol](https://github.com/code-423n4/2023-07-axelar-findings/issues/239)
## [[M-215] creating of same proposal hash when creating new proposal in `_processCommand` function is possible](https://github.com/code-423n4/2023-07-axelar-findings/issues/215)
## [[M-210] Token mint amounts abnormally if L2 sequencer goes down](https://github.com/code-423n4/2023-07-axelar-findings/issues/210)
## [[M-205] No deadline option is provided for interchain transfers/messages](https://github.com/code-423n4/2023-07-axelar-findings/issues/205)
## [[M-202] Failure of token transfer on destination chain does not result in a refund](https://github.com/code-423n4/2023-07-axelar-findings/issues/202)
## [[M-201] Violation of the `ERC-1967` standard](https://github.com/code-423n4/2023-07-axelar-findings/issues/201)
## [[M-200] Lack of whitelisting on the destination chainID](https://github.com/code-423n4/2023-07-axelar-findings/issues/200)
## [[M-196] Problems in stroring operators AxelarAuthWeighted](https://github.com/code-423n4/2023-07-axelar-findings/issues/196)
## [[M-177] Cross-chain message execution may be DOS due to exceeding the block limit](https://github.com/code-423n4/2023-07-axelar-findings/issues/177)
## [[M-132] upgrade() function should have timelock mechanism per the documentation](https://github.com/code-423n4/2023-07-axelar-findings/issues/132)
## [[M-130] Issues with governance in AxelarGateway.sol](https://github.com/code-423n4/2023-07-axelar-findings/issues/130)
## [[M-87] An Optimizer Bug in AddressBytesUtils.sol](https://github.com/code-423n4/2023-07-axelar-findings/issues/87)
## [[M-82] ITS: Using the canonical bridge on a pre-existing yield generating token, will result in the yield being permanently locked in the contract ](https://github.com/code-423n4/2023-07-axelar-findings/issues/82)
## [[M-52] Insufficient support for tokens with different decimals on different chains lead to loss of funds on cross-chain bridging](https://github.com/code-423n4/2023-07-axelar-findings/issues/52)
## [[M-45] possible panic error/ unexpected revert in interchainTransferFrom() of interchainToken.sol due to improper subtraction](https://github.com/code-423n4/2023-07-axelar-findings/issues/45)
## [[M-25] InterchainProposalExecutor.sol doesn't support non-evm address as caller or sender](https://github.com/code-423n4/2023-07-axelar-findings/issues/25)
## [[M-24] Flow limit can be bypassed in certain scenario](https://github.com/code-423n4/2023-07-axelar-findings/issues/24)
## [[M-23] Hard-fork evm chains won't be supported by InterchainTokenService.sol](https://github.com/code-423n4/2023-07-axelar-findings/issues/23)