The function applyRepairFundUpdate do not enforce proper role-based access control, allowing unauthorized users to update repair fund address. This could lead to funds being redirected to malicious addresses, resulting in potential financial loss.
Loss of Funds: If an attacker changes the repair fund address, funds intended for system maintenance could be lost.
Protocol Manipulation: Attackers could exploit this vulnerability to disrupt normal operations and governance.
Manual Review
Restrict Access: Use OpenZeppelin’s AccessControl or Ownable to ensure only authorized roles (e.g., ADMIN_ROLE) can call this function.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.