code-423n4 / 2024-01-curves-findings

0 stars 0 forks source link

Missing access control in `CurvesERC20Factory::deploy()` will allow anyone to deploy `CurvesERC20` contract and mint unscrupulous tokens. #1049

Open c4-bot-5 opened 9 months ago

c4-bot-5 commented 9 months ago

Lines of code

https://github.com/code-423n4/2024-01-curves/blob/516aedb7b9a8d341d0d2666c23780d2bd8a9a600/contracts/CurvesERC20Factory.sol#L7-L10

Vulnerability details

Impact

Proof of Concept

REFERENCES

Recommended Mitigation Steps

Use a reputable access controller contracts like Openzeppelin's Ownable.

Assessed type

Access Control

c4-pre-sort commented 9 months ago

raymondfam marked the issue as insufficient quality report

c4-pre-sort commented 9 months ago

raymondfam marked the issue as duplicate of #1036

c4-pre-sort commented 9 months ago

raymondfam marked the issue as not a duplicate

c4-pre-sort commented 9 months ago

raymondfam marked the issue as duplicate of #340

c4-judge commented 8 months ago

alcueca changed the severity to QA (Quality Assurance)

c4-judge commented 8 months ago

alcueca marked the issue as grade-a