No Access Control in Constructor Vulnerability in Proxy Contract
The vulnerability stems from the absence of access control in the constructor of the Proxy contract. As a result, any address can deploy a Proxy instance with any implementation address, potentially leading to unauthorized deployments and unintended behavior.
Unauthorized or malicious actors could deploy Proxy instances with arbitrary implementation addresses, potentially compromising the security and functionality of the contract.
Manual code review and analysis of the access control mechanisms in the Proxy contract's constructor.
To mitigate this vulnerability, consider the following recommendations:
Access Control in Constructor: Implement access control checks in the constructor to restrict its execution to authorized addresses only.
Access Restriction Logic: Determine which addresses should have the ability to deploy Proxy instances and implement logic to enforce access restrictions.
Documentation: Clearly document the intended usage of the constructor and its access control mechanisms.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.