Critical functions lack proper access control, allowing unauthorized actors to manipulate protocol parameters.
Functions like setAutoDeleveragingParams or updateDynamicCaps in MarketCreditBranch or CreditDelegationBranch may not enforce onlyOwner/onlyPerpsEngine modifiers.
Attackers could disable auto-deleveraging, set malicious caps, or drain funds.
Manual review, Slither (access control detector).
Use OpenZeppelin’s AccessControl to restrict critical functions to trusted roles (e.g., DEFAULT_ADMIN_ROLE).
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.