Normal behavior: Owner should be able to rotate or delete secrets, and reclaim storage when a vault is no longer needed.
Issue: There is no function to move_from<Vault>
the resource. Users can never erase leaked/compromised data or reclaim storage. On Aptos, state size costs money; without deletion, the rent-like liability persists.
Likelihood:
Reason 1: Users make mistakes and need to rotate or purge secrets.
Reason 2: Projects deprecate features; without a destroy path, state lingers forever.
Impact:
Impact 1: Permanent on-chain exposure if the plaintext is ever read; user cannot wipe.
Impact 2: Ongoing storage costs with no way to reclaim.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.