The checkList
function in the Santa's List contract lacks proper access control, allowing anyone to call it. This vulnerability could lead to unauthorized modifications of the list, compromising the intended behavior of the contract.
The checkList
function is designed to be only callable by Santa; however, there is no implemented access control mechanism. Without proper access control, any external entity can call this function, potentially altering the status of addresses on the list.
The lack of access control in the checkList
function poses a security risk, as it allows unauthorized parties to change the status of addresses on the list. This could lead to manipulation of the list, impacting the intended behavior of the contract.
#POC
Manual review
To address this vulnerability, it is recommended to implement proper access control mechanisms in the checkList
function. This can be achieved by adding a modifier or a require statement at the beginning of the function to ensure that only authorized entities, such as Santa, can invoke this function.
Example:
By implementing access control, the contract can prevent unauthorized access to critical functions, enhancing the overall security of the system. Additionally,
Anyone is able to call checkList() changing the status of a provided address. This is not intended functionality and is meant to be callable by only Santa.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.