Missing access control when whitelisting tokens will allow a malicious user to whitelist any token
this function is missing access control during mitigation and user can front run the init to whitelist any token or malicious token.
then the malicious user can deposit a malicious token to mint BEAN out and dump the BEAN tokens
Malicious user can whitelist tokens to swap for beans and cause a complete loss of funds to the protocol
manual review
add access control and ensure this function can only be called once, the code should also enforce that the tokens whitelisted in l2 is consistent with the tokens whitelisted in l1.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.