The function applyTreasuryUpdate do not enforce proper role-based access control, allowing unauthorized users to update treasury address. This could lead to funds being redirected to malicious addresses, resulting in potential financial loss.
Unauthorized Fund Redirection: Malicious actors could update treasury addresses, diverting protocol funds.
Protocol Manipulation: Attackers could exploit this vulnerability to disrupt normal operations and governance.
Manual Review
Restrict Access: Use OpenZeppelin’s AccessControl or Ownable to ensure only authorized roles (e.g., ADMIN_ROLE) can call this function.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.