Use of a signature to verify the deployment of proxy & rewards distribution might be frontrun by a malicious attacker since there is no data regarding who can use the signature to execute the function.
Frontrunner can copy all the data and replace the reward data into one which transfers it all to the attackers' wallet.
Loss of the entire reward pool set by the contest sponsor.
Manual Review
Set a message hash as such so that it uses delegated address and verify it in the deployProxyAndDistributeBySignature
function
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.