The "LSTRewardsSplitter" contract lacks suficient access contorol on the "splitRewards" function, allowing any user to trigger the reward distribution process.
Affected Function: splitRewards
function splitRewards() external {
..//
}
The "splitRewards" function is designeed to split newly accrued reward among specified fee receivers. However, it does not implement any access control modifiers, making it accessible to any Ethereum address.
An attacker can call the "splitRewards" function repeateded to drain or misalocate rewards, diverting funds intended for legitimate users.
The vulnerability was identified through a manual review of the Solidity code, focusing on function definitions and visibility modifiers.
Implement Access Control: Restrict access to the splitRewards function by adding the "onlyController" modifier to ensure only authorized entities can call it.
function splitRewards() external onlyController {
..//
}
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.