The contract lacks explicit access control mechanisms for its functions.
Public and external functions like getPositionInfo(), willPositionCollateralBeInsufficient(), and getPriceImpactInCollateral() do not have any access restrictions.
Unauthorized users could potentially call sensitive functions, leading to information leakage or manipulation of contract state.
Manual code review
Implement access control modifiers (e.g., onlyOwner, onlyAuthorized)
Use OpenZeppelin's AccessControl library for role-based access control
Clearly define and enforce which roles or addresses should have access to each function
Please read the CodeHawks documentation to know which submissions are valid. If you disagree, provide a coded PoC and explain the real likelihood and the detailed impact on the mainnet without any supposition (if, it could, etc) to prove your point.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.