The ChoosingRam::increaseValuesOfParticipants
function lacks proper access control, allowing unauthorized participants to increase their values without paying the entrance fee. This vulnerability can lead to unfair advantages and potential manipulation of the RAM selection process.
The lack of access control enables anyone to enter the challenge and increase their value for free. This increases the likelihood of unauthorized participants winning the RAM selection, undermining the fairness and integrity of the protocol.
Execute the following code in Dussehra.t.sol
. Ensure to update the variables player3
and player4
to attacker
and attacker2
respectively:
output :
Implement robust access control mechanisms to ensure that only participants who have paid the entrance fee can increase their values. Consider restricting value increases to a specific array of authorized participants, such as address[] public WantToBeLikeRam in Dussehra.sol. This approach will help maintain fairness and prevent unauthorized participants from manipulating the RAM selection process.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.