non-token contracts should not be put into the params of the approve function, however, it can be put into the params.
-the address which has a malicious logic in the function approve can be called.
-the token that has been mapped before can be mapped once again
VScode, foundry
short term: set the interface like IERC20 or other interfaces to avoid vulnerable contracts being called
long term: set the allowed token lists to minimize the impact of the listsnon-token address can be called by the contract
This is at most low severity, even though giving max approvals shouldn't be permisionless, the respective tokenManager address is retrieved from the TadleFactory contract whereby the trusted guardian role is responsible for deploying such contracts as seen [here](https://github.com/Cyfrin/2024-08-tadle/blob/04fd8634701697184a3f3a5558b41c109866e5f8/src/factory/TadleFactory.sol#L68). Since the user still has to go through the PreMarkets/DeliveryPlace contracts to perform market actions, this max approval cannot be exploited.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.