The get_random_slice
function can be called by anyone since it's marked as entry
, but it should only be called internally during registration. This allows external actors to manipulate user allocations.
Likelihood:
Any external user can call this function directly
Malicious actors can override existing user allocations
Front-running attacks during registration process
Impact:
Users' allocated amounts can be changed without authorization
Potential for denial of service by consuming computational resources
Breaking of intended registration flow and business logic
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.