The isModuleAllowed
function fails to properly validate module whitelisting, always returning true
. This critical flaw undermines the entire module validation process, exposing the system to potential attacks and unauthorized access.
The isModuleAllowed
function in the smart contract always returns true
, regardless of the actual whitelisting status of the module. This bypasses the intended security check.
This vulnerability allows any module, including malicious ones, to pass the whitelisting check. Consequently, unauthorized modules can be added to the system, potentially compromising its security and functionality.
Manual Review
Modify the isModuleAllowed
function to return the actual result of the REGISTRY.check
call:
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.