You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
An access control vulnerability in the setNameAndSymbol function allows privileged users (e.g., owners) to arbitrarily modify the name and symbol state variables post-deployment. This can lead to denial of service (DoS) by disrupting dependent transactions, escalation of privileges, and loss of trust due to mutable critical identifiers that are expected to be immutable (e.g., ERC-20 compliance).
Recommendation
Remove setNameAndSymbol or implement immutable variables (e.g., constructor()-only assignment).