The GivingThanks
smart contract has a security vulnerability in the updateRegistry
function, allowing any user to change the registry contract address.
The updateRegistry
function allows any user to change the registry contract address. This can lead to severe security vulnerabilities, where a malicious user could point the registry
to a contract they control, thereby manipulating the verification process and potentially redirecting donations.
Any user can replace the CharityRegistry
with a malicious contract.
Manual Review
Restrict access to the updateRegistry
function so that only the contract owner can perform this action.
Likelyhood: High, anyone can change it at anytime Impact: High, can bypass the verification process
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.