The setContest()
lacks proper input validation for it parameters, potentially exposing the contract to vulnerabilities.
1
Invalid Address: without a proper validation, the setContest()
could accept invalid address for the organizer
and inplementation
parameters. This might allow attackers to create contest with unauthorized or non-existent organizers or use malicious implementations.
2
ConstestID Manipulation: The absence of check on the contestId
parameter could allow attackers to set contest IDs in unexpected formats, potentially causing conflicts or misrepresentation of contests.
Invalid contest IDs could result in data corruption or misinterpretation, leading to incorrect contest outcomes and rewards.
Attackers could exploit the lack of address validation to create contests with unauthorized participants or malicious implementations, compromising the integrity of the contests.
VScode
Implement robust input validation checks for the setContest
function to prevent potential exploits. By adding proper validation, the contract can be safeguarded against potential misuse and vulnerabilities.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.