The RapBattle protocol is designed to operate as a decentralized gaming platform where users can safely stake valuable NFT assets, earn rewards through training, and engage in competitive battles with confidence that their assets are protected by smart contract guarantees. The protocol should implement robust access controls and asset custody mechanisms that prevent any single entity from manipulating core functionality or confiscating user assets, ensuring trustless operation and user sovereignty.
The protocol implements extreme centralization through @battle_addr
which controls all critical functions including NFT minting authority, CRED token supply management, user asset custody, stats modification, and unstaking authorization. The custody model transfers actual NFT ownership (not just custody) to @battle_addr
during staking and battles, meaning users cannot retrieve their assets without cooperation from the centralized authority. This architecture creates a complete single point of failure that contradicts decentralized protocol principles.
The vulnerability stems from centralized control patterns across all protocol modules:
Likelihood:
Single private key control over entire protocol makes compromise inevitable over time through various attack vectors including social engineering, technical exploits, insider threats, or simple operational security failures.
The high-value NFT custody model creates attractive targets for sophisticated attackers. Centralized control points are easily identified through public code analysis, making them obvious targets for exploitation.
Impact:
Complete protocol compromise enables the controlling entity to mint infinite NFTs (destroying collection value), mint infinite CRED tokens (causing hyperinflation), confiscate all staked user NFTs permanently, manipulate any user's NFT statistics, and block users from accessing their staked assets indefinitely. Unlike typical DeFi protocols where users retain custody, RapBattle users transfer full ownership, meaning asset recovery is impossible without authority cooperation.
The following analysis demonstrates the extent of centralized control:
Custody Risk Analysis:
Implement proper decentralized architecture with multi-signature controls and trustless custody:
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.
The contest is complete and the rewards are being distributed.