The applyTreasuryUpdate
and applyRepairFundUpdate
functions lack proper access control, allowing any external entity to execute them. This could lead to unauthorized updates to critical contract addresses and potential fund mismanagement.
Both applyTreasuryUpdate and applyRepairFundUpdate functions update key financial contract addresses but do not have any role-based access control to restrict their execution:
Any external entity can call these functions, allowing unauthorized users to execute treasury and repair fund updates.
Malicious actors could apply treasury or repair fund updates, redirecting funds to unintended addresses. Anytime the admin set the prendingtreasury he opens the attack for the atatcker to wait for the effectivetime to apply their own malicious treasury
Manual Review
Restrict execution of applyTreasuryUpdate and applyRepairFundUpdate to authorized roles, such as DEFAULT_ADMIN_ROLE
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.