Critical functions lack proper access control, allowing unauthorized actors to manipulate protocol parameters.
Functions like setAutoDeleveragingParams
or updateDynamicCaps
in MarketCreditBranch
or CreditDelegationBranch
may not enforce onlyOwner
/onlyPerpsEngine
modifiers.
Attackers could disable auto-deleveraging, set malicious caps, or drain funds.
Manual review, Slither (access control detector).
Use OpenZeppelin’s AccessControl
to restrict critical functions to trusted roles (e.g., DEFAULT_ADMIN_ROLE
).
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.