The Vault contract lacks proper access control mechanisms, allowing for potential unauthorized initialization of the vaults. This vulnerability could lead to unauthorized manipulation of token funds and disrupt the functionality of associated contracts such as Airdrop and Staking.
The vulnerability arises from the absence of access control checks in the initVault
function of the Vault contract. Without proper access restrictions, any address can initialize the vault, potentially leading to unauthorized access and manipulation of token funds.
The impact of this vulnerability includes the risk of financial losses due to unauthorized access and manipulation of token funds held in the vaults. Furthermore, it could disrupt the functionality of associated contracts, affecting the overall operation of the system.
Manual code review and analysis techniques were used to identify the vulnerability.
Implement access control mechanisms to restrict vault initialization to authorized contracts or addresses. For example, utilize modifiers to only allow specific addresses to call the initVault
function.
Utilize event logging to monitor vault initialization activities and detect any unauthorized attempts. Emit events within the initVault
function to log successful vault initializations and potential unauthorized access attempts.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.