The contract's transaction proposal mechanism accepts arbitrary call data, enabling invocation of any function on the target contract. This unrestricted input can lead to execution of unauthorized or harmful operations if the proposer is malicious or compromised.
Likelihood: High
An attacker or malicious proposer can submit transactions invoking any function on the destination address.
Impact: High
This may result in unauthorized state changes, asset transfers, or other malicious effects depending on the called function’s logic.
Implement strict validation on the calldata input by maintaining an allowlist of permitted functions or actions callable via the transaction proposal. This can be achieved by:
Restricting data to encoded calls matching predefined function selectors.
Validating the target address and calldata before acceptance.
Enforcing access control on proposers able to submit arbitrary call data.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.
The contest is complete and the rewards are being distributed.