🔐
Access Control & Authorization
Vulnerabilities related to improper access control, permissions, and authorization mechanisms
4 vulnerabilities2 critical
🔐Access Control & Authorization
Delegatecall Untrusted Callee
Delegatecall to Untrusted Callee `Delegatecall` is a special variant of a message call. It is almost identical to a regular message call except the t...
CriticalLearn more →
🔐Access Control & Authorization
Insufficient Access Control
Insufficient Access Control Access control is often imperative in management and ownership of smart contracts. It's important to consider ways in whi...
CriticalLearn more →
🔐Access Control & Authorization
Authorization Txorigin
Authorization Through tx.origin `tx.origin` is a global variable in Solidity which returns the address that sent a transaction. It's important that y...
MediumLearn more →
🔐Access Control & Authorization
Default Visibility
Default Visibility Visibility specifiers are used to determine where a function or variable can be accessed from. As explained in the [solidity docs]...
LowLearn more →