The function distributeAssets has an access control vulnerability because it lacks any access restrictions, allowing any user to call it with potentially fraudulent tokens. This could lead to unauthorized distribution of assets and loss of user funds.
The distributeAssets function is intended to distribute assets among holders based on their stake. However, there are no checks to ensure that the caller is authorized to invoke this function, which means that anyone can call it with arbitrary tokens.
The impact of this vulnerability is high, as it could result in the loss of funds for users. Malicious actors could exploit this function to distribute assets to themselves or to diminish the value of the assets by introducing fraudulent tokens.
Manual Testing
To mitigate this vulnerability, implement access control mechanisms and make it callable by only the manager.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.