The withdraw
function in the TokenManager contract lacks a proper authorization check, allowing any user to potentially call this function and withdraw tokens, leading to unauthorized token transfers.
In the withdraw
function, inside TokenManager, there is no onlyOwner
modifier or any other check to ensure that the caller is authorized to perform the withdrawal. This oversight could allow any user to call the function and withdraw tokens, potentially resulting in significant security risks.
This missing authorization check could allow any user to withdraw tokens, leading to unauthorized token transfers and potentially severe financial losses.
Imagination
Add an onlyOwner
modifier or similar authorization check to the withdraw function to ensure that only the owner or an authorized user can call this function.
Invalid, withdrawals are gated to caller context `msg.sender`, not anybody. This acts as the access control and hence "owner", to withdraw collateral/points tokens after finalization of market actions.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.