Lucene search

K
code423n4Code4renaCODE423N4:2022-06-CANTO-FINDINGS-ISSUES-203
HistoryJun 21, 2022 - 12:00 a.m.

Attacker can frontrun calling _mint_to_Accountant() which mints the entire supply to the caller, and sets them as _accountant and admin

2022-06-2100:00:00
Code4rena
github.com
4

Lines of code

Vulnerability details

Impact

By leaving _mint_to_Accountant() with no access control when accountant = address(0) it allows an attacker to call the function, mint the entire supply to themselves, and gain the accountant and admin roles. Additionally, the parameter โ€œaddress accountantDelegatorโ€ is expected but never used in the function.

Proof of Concept

Note.sol#L13

Recommended Mitigation Steps

Add admin access control to the _mint_to_Accountant() function


The text was updated successfully, but these errors were encountered:

All reactions