Skip to main content

Unnecessary admin parameter

Description

In Rust, it is considered bad practice to pass variables with names like "admin" as parameters in require_auth calls within contract functions. Ideally, admin information should be retrieved directly from storage to prevent security vulnerabilities.

Why is this bad?

Passing admin information as a parameter can introduce security risks, as the value could be manipulated, leading to incorrect authentication verification.

Issue example

Consider the following function:


pub fn set_admin(env: Env, new_admin: Address, admin: Address) {
admin.require_auth();
env.storage().instance().set(&DataKey::Admin, &new_admin);
}

In this example the admin is being passed as a parameter and then validated with require_auth.

The code example can be found here.

Remediated example

Consider the following function:


pub fn set_admin(env: Env, new_admin: Address) {
// Initialize has already set the admin, so we can retrieve it directly.
let current_admin: Address = env.storage().instance().get(&DataKey::Admin).unwrap();
current_admin.require_auth();
env.storage().instance().set(&DataKey::Admin, &new_admin);
}

In this example, the admin information is retrieved directly from storage and then validated with require_auth.

The remediated code example can be found here.

How is it detected?

Checks the use of function parameters with names similar to "admin."