Skip to content
This repository has been archived by the owner on May 26, 2023. It is now read-only.

WATCHPUG - Lack of sanity checks in the setter functions can result in malfunctions #123

Closed
sherlock-admin opened this issue Oct 28, 2022 · 1 comment

Comments

@sherlock-admin
Copy link
Contributor

WATCHPUG

medium

Lack of sanity checks in the setter functions can result in malfunctions

Summary

There are many settings that can be changed by the admin at any time, but there are not enough sanity checks to ensure it won't break the system.

Vulnerability Detail

For instance:

Impact

Malfunctioning of multiple major features when improper values are used.

Code Snippet

https://github.com/sherlock-audit/2022-10-mover/blob/main/cardtopup_contract/contracts/HardenedTopupProxy.sol#L199-L229

Tool used

Manual Review

Recommendation

Consider adding the missing sanity checks.

@McMannaman
Copy link

#71
is also a duplicate.

Admin is a trusted entity and is not expected to set values without knowing what is it for. Technically yes, but this not allows for stealing of funds (though can disrupt execution, but if admin access is stolen probably this is a major issue outside of these checks scope). Not sure if adding such checks could be of real practical value except for formal reason.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

No branches or pull requests

3 participants