The protocol implements fallback handlers, when installed they can be triggered by anyone by using the fallback
function:
as we go through the fallback
flow we see that no authorization control has been implemented
This is also confirmed per the sponsor on discord:
The protocol states to be fully compliant with ERC 7579
:
But as per the EIP 7579:
This means that if fallback handlers are installed, they must include authorization control. However, in this case, the protocol does not implement any authorization control.
Ultimately, a core functionality from ERC-7579
is broken.
implement authorization control to be EIP-7579
compliant.
There is indeed no access control within `fallback()` function which violates ERC7579 spec but the impact shown by all issues is insufficient. Need a better impact description/PoC that exceeds violation of ERC7579 to raise the severity of this issue. There will likely be no exploit for staticcall types, given there is not [state change/funds transfer allowed](https://www.rareskills.io/post/solidity-staticcall), so the possible vulnerability would be in the `CALLTYPE_SINGLE`. If no sufficient proof is provided to show a possible exploit, I will likely invalidate these issues.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.