The L2TokenReceiver.sol contract implements the deadline of the swap and increaseLiquidityCurrentRange wrong.
Proposers can anticipate proposing single or consecutive blocks in advance. In this situation, a malicious validator can delay the transaction, strategically executing it at a more advantageous block number.
This provides no safeguard, as the block.timestamp will reflect the value of the block in which the transaction is included. Consequently, malicious validators can indefinitely withhold the transaction.
Manual review.
Consider enabling users to specify a deadline parameter for their transactions
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.