The smart contract's initializer can be called by any address, potentially leading to unauthorized initialization and compromising the system's integrity. By front-running the contract to initialize the contract, the incorrect parameters may be supplied, leaving the contract needing to be redeployed.
The vulnerability allows any address to call the smart contract's initializer, which can lead to unauthorized initialization and compromise the integrity of the system.
It can lead to unauthorized access, potential exploitation, and compromise the integrity of the system.
Manual Review
Implementing proper access control mechanisms will mitigate the risk of unauthorized initialization and safeguard the system's integrity.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.