Access control is typically enforced on functions using modifiers that check if specific addresses/roles are calling these functions. A system can have multiple roles with different privileges. Ensure that correct modifiers are used on functions requiring specific access control enforced by that modifier.
- Modifiers Incorrect Use
- Modifiers -> Which/Why/How/What/When/Where
- Correct Functions & Modifiers & Parameters
- Ensure Correct Usage