Running the update for the provided rule can be DoSed due to the perform update function not having an access modifier or a sufficient require statement.
On lines 279 to 300 the performUpdate function does not have enough security restriction to prevent any caller from intermittently calling the performUpdate function and causing additional processing of calls. Leading to denial of service. The bug can be found at this location
Notice that is does not have an access modifier.
Also notice that it does not have sufficient require statement that validates the sender.
None of the require or if statement conditions validate the sender. And there is no access control modifier. Which means any malicious actor can repeatedly call this function at will. Which can exhaust gas and cause a DoS.
Manual review.
Add an access modifier like onlyOwner. Or add a require statement similar to the following.
Please read the CodeHawks documentation to know which submissions are valid. If you disagree, provide a coded PoC and explain the real likelyhood and the detailed impact on the mainnet without any supposition (if, it could, etc) to prove your point.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.