The discovered security issue allows unauthorized users to access the SantasList.checklist
function and assign a status to any address of their choice. This creates a serious danger because it allows unauthenticated users to modify the status assignments, potentially resulting in illegal access or harmful activity within the contract.
Any user, without proper authentication, can call this function and assign a chosen address any status, presenting a risk of unauthorized access and potential misuse. at Checklist() function
The contract is susceptible to unauthorized manipulation through the checklist function.
add the following block of code to the test file:
then run the command below to check it out:
forge t --mt testAttackCheckList
Foundry
In the function, including the onlySanta modifier could solve the issue:
Anyone is able to call checkList() changing the status of a provided address. This is not intended functionality and is meant to be callable by only Santa.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.