The contract allow anyone to propose themselves for the owner
role of the contract, the rest of the users can vote in favor by sending a governance token. If a proposal was voted for with more than a third of the current supply, the user gets the owner
role.
pub enum ExecuteMsg {
Propose {},
ResolveProposal {},
OwnerAction {
action: CosmosMsg,
},
Receive(Cw20ReceiveMsg),
}
Please check the challenge's integration_tests for expected usage examples. You can use these tests as a base to create your exploit Proof of Concept.
🏠 Base scenario:
- The contract is newly instantiated
⭐ Goal for the challenge:
- Demonstrate how a proposer can obtain the owner role without controlling 1/3 of the total supply.
This challenge has been assigned a total of 150 points:
- 40 points will be awarded for a proper description of the finding that allows you to achieve the Goal above.
- 35 points will be awarded for a proper recommendation that fixes the issue.
- If the report is deemed valid, the remaining 75 additional points will be awarded for a working Proof of Concept exploit of the vulnerability.
❗ The usage of cw-multi-test
is mandatory for the PoC, please take the approach of the provided integration tests as a suggestion.
❗ Remember that insider threats and centralization concerns are out of the scope of the CTF.
If you are unsure about the contract's logic or expected behavior, drop your question on the official Telegram channel and one of our team members will reply to you as soon as possible.
Please remember that only questions about the functionality from the point of view of a standard user will be answered. Potential solutions, vulnerabilities, threat analysis or any other "attacker-minded" questions should never be discussed publicly in the channel and will not be answered.