The updateRegistry function lacks access control, allowing any address to change the charity registry address, effectively compromising the entire donation system.
Test demonstrating vulnerability:
HIGH severity:
Any address can change the registry
Attacker can point to malicious registry that validates fake charities
Complete compromise of donation verification system
Potential theft of donations through fake charities
Manual code review
Foundry testing framework
Custom access control test
Add Ownable pattern:
Or implement role-based access control:
Likelyhood: High, anyone can change it at anytime Impact: High, can bypass the verification process
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.