The contract accepts any value for minimumAmount in the constructor without validation against a maximum limit. This could allow setting an excessively high minimum entry barrier.
Likelihood:
Unrestricted minimumAmount accepts arbitrarily large values during contract deployment
No bounds checking creates permanent barrier once contract is deployed
Impact:
Excessive minimum deposit threshold prevents regular user participation
Enables deployment of effectively private/closed betting pools disguised as public ones
Deploy contract with minimumAmount=1000000 ether, creating a tournament that appears public but limits participation to only select wealthy addresses who know the extreme threshold.
Implement MAX_MINIMUM_AMOUNT constant (e.g., 1000 ether) and add constructor validation requiring _minimumAmount <= MAX_MINIMUM_AMOUNT.
This is owner action and the owner is assumed to be trusted and to provide correct input arguments.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.