access-control

25 articles
Sort: New Top Best
clear filter
0 3/10
bragging-post

Security researcher's portfolio showcasing multiple critical vulnerability disclosures in DeFi and NFT smart contracts, primarily focused on proxy vulnerabilities (UUPS), uninitialized logic contracts, and access control issues that collectively protected over $50M in TVL. While demonstrating significant impact, the article lacks technical depth and primarily lists findings with references to external postmortems rather than detailed exploitation methodology.

OpenZeppelin 88mph Polygon KeeperDAO Rivermen NFT iosiro Immunefi Alchemix Ondo Finance pxMythics abwagmi AxonsToken Code4rena yAcademy Curve Finance Ashiq Amien Dedaub
ashiq.co.za · Ashiq Amien · 3 hours ago · details
0 2/10
bragging-post

Portfolio page showcasing multiple critical smart contract vulnerabilities disclosed across DeFi protocols, including UUPS proxy initialization flaws, access control bypasses, and token theft vectors. While listing numerous bug bounty successes (>$6.5m rescued), it provides minimal technical depth and primarily serves as credentials summary.

88mph Polygon KeeperDAO Rivermen NFT OpenZeppelin abwagmi AxonsToken pxMythics Alchemix Ondo Finance Code4rena Immunefi iosiro Hack South YesWeHack BSides Cape Town Damn Vulnerable DeFi yAcademy TrustX Curve Finance
ashiq.co.za · Ashiq Amien · 3 hours ago · details
0 2/10
bragging-post

A portfolio page showcasing multiple critical smart contract vulnerability disclosures across DeFi protocols (88mph, Polygon, KeeperDAO, Alchemix, Ondo Finance) and bug bounty wins totaling over $6.5M in rescued funds, with brief technical descriptions of UUPS proxy exploits, access control flaws, and token theft vulnerabilities.

88mph Polygon KeeperDAO Rivermen NFT OpenZeppelin abwagmi AxonsToken pxMythics Alchemix Ondo Finance Code4rena yAcademy Immunefi iosiro BSides Cape Town Underhanded Solidity Contest Curve Finance
ashiq.co.za · Ashiq Amien · 3 hours ago · details
0 2/10
bug-bounty

Portfolio page showcasing multiple critical smart contract vulnerabilities disclosed across DeFi/NFT protocols, including access control flaws, uninitialized UUPS proxies enabling arbitrary delegatecalls, and broken token transfer functions. Author details bounty payouts and rescued funds across 88mph, Polygon, KeeperDAO, and other projects, with limited technical depth on each vulnerability.

pxMythics 88mph Polygon KeeperDAO Rivermen NFT OpenZeppelin abwagmi AxonsToken Alchemix Ondo Finance Code 4rena Immunefi iosiro Damn Vulnerable DeFi Decently Safe DeFi yAcademy Curve Finance BSides Cape Town Dedaub Ashiq Amien
ashiq.co.za · Ashiq Amien · 3 hours ago · details
0 8/10
vulnerability

A missing access control and unchecked state transition vulnerability in Alchemist's TimelockConfig.confirmChange() function allows any attacker to set arbitrary configuration parameters (including admin and recipient addresses) to zero without initiating the required first step, permanently bricking critical DeFi functions like token minting for staking rewards.

Alchemist Fjord Foundry Aludel Crucible TimelockConfig Dacian gogotheauditor pashovkrum
dacian.me · Dacian · 3 hours ago · details
0 8/10
vulnerability

A high-risk vulnerability in Ondo Finance's TrancheToken smart contract allowed attackers to destroy the uninitialized implementation contract via selfdestruct, causing all proxy contracts to no-op and potentially draining $50m from UniswapStrategy contracts if a minting flag were enabled. The bug was patched immediately after disclosure with no user funds at risk.

Ondo Finance Ashiq Amien iosiro TrancheToken AllPairVault UniswapStrategy Immunefi
iosiro.com · Ashiq Amien · 3 hours ago · details
0
vulnerability

This article collection documents smart contract vulnerabilities discovered in Web3 projects, including Betverse's public function visibility flaw enabling token theft and Ocean Protocol's unprotected ownerWithdraw function allowing unauthorized fund transfers. These medium to critical severity bugs highlight improper access control in Solidity smart contracts.

Shanmuga Bharathi Betverse Ocean Protocol Immunefi Oasys BToken
mirror.xyz · Shanmuga Bharathi. N · 3 hours ago · details
0
vulnerability

A critical vulnerability in the Betverse ICO Token contract's transferTokenToLockedAddresses() function was caused by incorrectly marking it as public instead of internal, allowing attackers to steal BToken by repeatedly transferring funds to their addresses. The article documents this access control misconfiguration discovered during security research on the Immunefi platform.

Betverse Immunefi BToken Shanmuga Bharathi Ocean Protocol OASYS
mirror.xyz · Shanmuga Bharathi. N · 3 hours ago · details
0
vulnerability

Compound's liquidation mechanism fails to validate that seized assets are actually held as collateral, allowing liquidators to seize any user assets when borrowing becomes undercollateralized, not just those explicitly marked as collateral via enterMarkets().

Compound CVE-2020-26241 AAVE GitHub - compound-finance/compound-protocol/pull/127
trust-security.xyz · Trust · 3 hours ago · details
0
O3
vulnerability

O3 bridge aggregators are vulnerable to token theft through callproxy parameter manipulation in exactInputSinglePToken(), allowing attackers to impersonate approved users and steal their funds when they've approved the aggregator with non-MAX amounts. The vulnerability affects all O3 aggregators across 10+ chains, though the team disputed the severity citing their frontend's default MAX approval behavior.

O3 O3EthereumUniswapV3Aggregator 0x561f712b4659be27efa68043541876a137da532b 0xC11073e2F3EC407a44b1Cff9D5962e6763F71187 0xdAC17F958D2ee523a2206206994597C13D831ec7 0xC02aaA39b223FE8D0A0e5C4F27eAD9083C756Cc2 0x1337133713371337133713371337133713371337 0xDjango Immunefi Uniswap V3
trust-security.xyz · Trust · 3 hours ago · details
0
vulnerability

Iron Bank's CCollateralCapERC20 token fails to enforce the collateralCap invariant during account initialization via initializeAccountCollateralTokens(), allowing the total collateral to exceed the cap and exposing the protocol to liquidation insolvency risks. The vulnerability exists because initialization bypasses the increaseUserCollateralInternal() cap check that other collateral increase operations enforce.

Iron Bank CCollateralCapERC20 0x00e5c0774A5F065c285068170b20393925C84BF3 Puff
trust-security.xyz · Trust · 3 hours ago · details
0
vulnerability

Iron Bank's seizeInternal() function fails to credit liquidators with the correct collateral amount when seizing tokens, undercounting their collateral and potentially triggering unintended liquidations. The bug stems from only increasing collateral by collateralTokens instead of the full seizeTokens amount, with the difference (buffer) not being accounted for.

Iron Bank CCollateralCapERC20.sol 0x7e8844ea4c211a69ad9308ba0b6cdb3ea0bb2b05
trust-security.xyz · Trust · 3 hours ago · details
0
vulnerability

Morpho Finance's PositionsManager implementation contract can be directly called (bypassing proxy) with arbitrary state mutation via unvalidated delegatecall, potentially allowing attackers to trigger selfdestruct and shut down the system. The vulnerability stems from uninitialized storage pointers and lack of access controls on dangerous delegatecall operations.

Morpho Finance PositionsManager MorphoStorage interestRatesManager
trust-security.xyz · Trust · 3 hours ago · details
0
vulnerability

A critical access control vulnerability was discovered in oasisDEX's MultiplyProxyActions contract where the recreateTrigger function performs an unsafe delegatecall assuming msg.sender is AutomationBot, allowing external attackers to execute arbitrary code in the command context and potentially access user vault funds or cause system denial of service. The researcher found the vulnerability had already been patched a month prior, highlighting the importance of verifying contract versions against live deployments.

oasisDEX MakerDAO Immunefi MultiplyProxyActions DSProxy DeFiSaver AutomationBot AutomationExecutor BuyCommand SellCommand BaseMPACommand
trust-security.xyz · Trust · 3 hours ago · details
0
vulnerability

A privilege escalation vulnerability in Tokemak's liquidity controllers allows attackers with ADD_LIQUIDITY_ROLE to steal protocol funds by manipulating pool ratios and exploiting the deploy() function's lack of price validation. The attack creates a malicious liquidity pool with a skewed token ratio, triggers the controller to deposit at the bad ratio, then extracts tokens through swaps, potentially stealing entire reserve amounts of FOX and ALCX tokens.

Tokemak SushiswapControllerV2 UniswapController Chainlink FOX ALCX
trust-security.xyz · Trust · 3 hours ago · details
0
vulnerability

A critical bug in Thena's reward claiming mechanism prevents veNFT holders from claiming rewards after their lock period expires due to an improper expiry check in the deposit_for function. The vulnerability freezes user rewards and was missed by CodeArena auditors despite affecting forked code from previously audited protocols.

Thena CodeArena trust__90 Uniswap Curve OlympusDAO Velodrome 3xcalibur immunefi RewardsDistributor.sol VotingEscrow.sol THE
zzykxx.com · zzykxx · 3 hours ago · details
0

Research demonstrating a complete RCE attack chain on DeskPro helpdesk software through multiple chained vulnerabilities: insufficient API access control (leaking JWT secrets and admin config), and insecure deserialization in the template editor. The exploit was demonstrated against Bitdefender's support center, achieving remote code execution from an unauthenticated user registration.

CVE-2020-11465 CVE-2020-11463 CVE-2020-11466 CVE-2020-11464 CVE-2020-11467 DeskPro Bitdefender osTicket Kayako PHP Live! Freelancer Inc Redforce Web Security
blog.redforce.io · devanshbatham/Awesome-Bugbounty-Writeups · 3 hours ago · details
0

A Jenkins instance was found vulnerable to RCE due to improper access control, allowing unauthenticated users to gain admin access via GitHub OAuth and execute arbitrary Groovy scripts. The vulnerability was discovered during subdomain enumeration and responsibly disclosed to the organization's CTO.

Jenkins GitHub DoSomething.org MuhammadKhizerJaved nahamsec Matt HackerOne Bugcrowd
blog.securitybreached.org · devanshbatham/Awesome-Bugbounty-Writeups · 3 hours ago · details
0

An IDOR vulnerability in Facebook Events allowed attackers to add any user—including non-friends and blocked contacts—as co-hosts to personal events by tampering with the co_hosts parameter in the event creation request. The vulnerability was patched by Facebook and rewarded $750 through their bug bounty program.

Facebook Binit Ghimire Bugreader BurpSuite OWASP ZAP
bugreader.com · devanshbatham/Awesome-Bugbounty-Writeups · 3 hours ago · details
0

An IDOR vulnerability in Facebook Analytics allows users with analyst roles to access private dashboard charts by manipulating the chartID parameter in GraphQL requests, disclosing chart names and data intended only for the dashboard owner. The vulnerability exploits insufficient access control on a sub-option (chart info) within the main dashboard feature.

Facebook Sarmad Hassan AnalyticsChartDeleteMutation AnalyticsStoredAggregationChart
bugreader.com · devanshbatham/Awesome-Bugbounty-Writeups · 3 hours ago · details
0 5/10

A white-box penetration test uncovered an OTP validation bypass combined with an IDOR vulnerability in a web application's data export function, allowing unauthorized access to sensitive data.

medium.com · Shir0E · 3 hours ago · details
0 2/10

Article discussing a critical multi-tenant isolation vulnerability where tenant data isolation mechanisms completely failed, allowing unauthorized cross-tenant access.

Sahar Shlichove
mixbanana.medium.com · MixBanana · 6 hours ago · details
0 2/10

A Web3-focused article exploring Insecure Direct Object Reference (IDOR) vulnerabilities in blockchain applications, using the metaphor of an unlocked bank vault to illustrate authorization flaws that allow unauthorized access to resources.

hunterx461.medium.com · Tabrez Mukadam · 13 hours ago · details
0 1/10

WhatsApp is introducing parental control features that allow parents and guardians to manage pre-teen accounts, controlling contacts and group membership permissions.

WhatsApp
bleepingcomputer.com · Sergiu Gatlan · 1 day ago · details
0 7/10

Technical writeup identifying six common vulnerability patterns in ERC-4337 smart account implementations, starting with incorrect access control on execute functions that can allow unauthorized fund drainage. The article covers ERC-4337 architecture basics and demonstrates vulnerable vs. secure code patterns for smart account development.

ERC-4337 ERC-7579 EntryPoint UserOperation Trail of Bits
blog.trailofbits.com · trailofbits · 1 day ago · details