Keepers, such as those integrated with OpenZeppelin Defender, play a vital role in automating maintenance tasks as pointed out in the protocol. However, this automation can be vulnerable to frontrunning.
The deterministic behavior of keeper transactions can be predicted and exploited by frontrunners. The transactions to be made by keepers are well known and very predictable and a malicious actor with enough time to study, the maintenance sequence of the keepers can figure out when and where those transactions can be exploited and profited from.
The impact this will have is if a Malicious actor can study how to manipulate the actions of these relayers /Keepers, they could potentially either cause a DOS in the Vaults or Make a Profit of their Actions
The Actions of the Keepers being monitored are not a devastating issue, but it has a probability of escalating to a higher level in different types of circumstances. So the Protocol should Keep this in mind for their future Operations.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.