This report identifies a vulnerability in the setPassword function of the "PasswordStore" smart contract. The issue arises from the absence of access control checks, allowing anyone to set the password without proper authorization.
Contract Name: PasswordStore
Function Affected: setPassword(string memory newPassword)
Description: The setPassword function does not include a require statement or access control check, enabling unauthorized users to change the stored password. This oversight could potentially compromise the integrity of the password management system.
Unauthorized users can change the stored password, potentially compromising the security of the data.
No specific tool used. Vulnerability identified using manual code review.
Add an access control modifier (e.g., "onlyOwner") to the setPassword function, ensuring that only the contract owner (the address that deployed the contract) can change the password.
Anyone can call `setPassword` and set a new password contrary to the intended purpose.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.