The changeOwner function lacks proper access control, allowing unauthorized users to modify the contract's ownership. As a result, an attacker could potentially transfer ownership to themselves and subsequently drain all funds from the contract.
The function lacks an onlyOwner check, allowing any user to access it and change the contract's ownership.
This vulnerability allows an attacker to take ownership of the contract and potentially drain all its funds.
Foundry.
It is recommended to add a check ensuring that the msg.sender is the current owner of the contract before allowing any ownership updates.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.