The L2TokenReceiver.sol
contract implements the deadline of the swap
and increaseLiquidityCurrentRange
wrong.
Proposers can anticipate proposing single or consecutive blocks in advance. In this situation, a malicious validator can delay the transaction, strategically executing it at a more advantageous block number
.
This provides no safeguard, as the block.timestamp
will reflect the value of the block in which the transaction is included. Consequently, malicious validators can indefinitely withhold the transaction.
Manual review.
Consider enabling users to specify a deadline
parameter for their transactions
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.