Lack of Access Control on commit()
and apply()
Anyone can call commit()
and apply()
unless restricted in the implementation.
Malicious users could commit fake block hashes or override valid ones.
An attacker submits incorrect block hashes, leading to wrong state validation.
If these hashes are used for cross-chain validation or rollups, they could cause major financial losses.
Implement an access control mechanism (e.g., only allow trusted oracles/governance).
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.