SCSVS-AUTH-2
S4.2 Authorization Mechanisms
Control Objective
Implement secure authorization mechanisms to safeguard critical functions and sensitive operations, ensuring only authorized entities can perform these actions.
S4.2.A Secure Access to Critical Functions
| SCSVS VR ID |
Requirement |
L1 |
L2 |
L3 |
SCWE |
| S4.2.A1 |
Verify that the contract uses msg.sender for authorization instead of tx.origin to avoid vulnerabilities related to contracts that forward calls from legitimate users. |
|
✓ |
✓ |
|
| S4.2.A2 |
Implement and verify appropriate access controls for functions that modify contract state or perform sensitive operations to prevent unauthorized access. |
|
✓ |
✓ |
|
S4.2.B Timed Permissions
| SCSVS VR ID |
Requirement |
L1 |
L2 |
L3 |
SCWE |
| S4.2.B1 |
Ensure that msg.sender validation is properly implemented when using Merkle trees to maintain security and prevent unauthorized access. |
|
✓ |
✓ |
|
| S4.2.B2 |
Use whitelisting to restrict interactions to a specific set of addresses, providing additional security against malicious actors. |
|
✓ |
✓ |
|
| S4.2.B3 |
Ensure that functions modifying the contract state or accessing sensitive operations have proper access controls implemented. |
|
✓ |
✓ |
|