There is no information about the SmartVaultManagerV5::swapRouter variable in the contract code, but if it is set, it will lead to protocol funds loss due to a known bug in SmartVaultV3::swap.
There was a hack of the protocol (see details here). To mitigate it:
SmartVaultManagerV5::swapRouter was set to the zero address (https://arbiscan.io/tx/0xa70011c81471401dd6683994542ed63d99c9177bcdc500a5803e9af4ac7f394e).
The setter for SmartVaultManagerV5::swapRouter was removed.
A new variable SmartVaultManagerV5::swapRouter2 was introduced.
But there is no information about why SmartVaultManagerV5::swapRouter is not used. In several years, this knowledge could be forgotten, and the variable could be re-used. After this variable is set, old vaults will be vulnerable again since MINTER_ROLE wasn't revoked from vulnerable vaults.
Even in the Discord channel of the contest, there were questions about why this variable is not re-used.
If the variable is set, users of already deployed vaults could create unlimited bad debt using the bug described here.
Manual review
Write a detailed doc block for SmartVaultManagerV5::swapRouter explaining why it should never be used.
Revoke MINTER_ROLE from the vulnerable vaults (and ask users to migrate funds to the new vaults).
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.