stake.link

stake.link
DeFiHardhatBridge
27,500 USDC
View results
Submission Details
Severity: low
Invalid

No access control on RewardsInitiator.performUpkeep()

Vulnerability Details

In RewardsInitiator.sol:83, the function performUpkeep is implemented without a check to ensure it is called by an authorized keeper. This omission allows any external entity to call this function, the function receives a bytes array to perform the work and even when further analysis didn't show it can be used to perform some kind of attack it would be advisable to ensure only the authorized keeper calls this function.

Tools Used

Manual Review

Recommendations

To mitigate this vulnerability, it is recommended to add a modifier that checks if the caller is an authorized keeper.

Updates

Lead Judging Commences

0kage Lead Judge over 1 year ago
Submission Judgement Published
Invalidated
Reason: Non-acceptable severity

Support

FAQs

Can't find an answer? Chat with us on Discord, Twitter or Linkedin.