The GivingThanks smart contract has a security vulnerability in the updateRegistry function, allowing any user to change the registry contract address.
The updateRegistry function allows any user to change the registry contract address. This can lead to severe security vulnerabilities, where a malicious user could point the registry to a contract they control, thereby manipulating the verification process and potentially redirecting donations.
Any user can replace the CharityRegistry with a malicious contract.
Manual Review
Restrict access to the updateRegistry function so that only the contract owner can perform this action.
Likelyhood: High, anyone can change it at anytime Impact: High, can bypass the verification process
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.