Unnecessary admin parameter
Description
- Category:
Access control
- Severity:
Medium
- Detector:
unnecessary-admin-parameter
- Test Cases:
unnecessary-admin-parameter-1
In Rust, it is considered bad practice to pass variables with names like "admin" as parameters in require_auth
calls within contract functions. Ideally, admin information should be retrieved directly from storage to prevent security vulnerabilities.
Why is this bad?
Passing admin information as a parameter can introduce security risks, as the value could be manipulated, leading to incorrect authentication verification.
Issue example
Consider the following function:
pub fn set_admin(env: Env, new_admin: Address, admin: Address) {
admin.require_auth();
env.storage().instance().set(&DataKey::Admin, &new_admin);
}
In this example the admin is being passed as a parameter and then validated with require_auth
.
The code example can be found here.
Remediated example
Consider the following function:
pub fn set_admin(env: Env, new_admin: Address) {
// Initialize has already set the admin, so we can retrieve it directly.
let current_admin: Address = env.storage().instance().get(&DataKey::Admin).unwrap();
current_admin.require_auth();
env.storage().instance().set(&DataKey::Admin, &new_admin);
}
In this example, the admin information is retrieved directly from storage and then validated with require_auth
.
The remediated code example can be found here.
How is it detected?
Checks the use of function parameters with names similar to "admin."