The ERC20 Permit feature, as detailed in EIP-2612, is vulnerable to frontrunning because transactions can be observed in the mempool, allowing malicious actors to duplicate and preempt the transaction. This can lead to Denial of Service (DOS) by making the subsequent intended contract functionality fail. Source [trust-security](https://www.trust-security.xyz/post/permission-denied)
Permit functionality DoS
Manual Analysis
Implement a try-catch wherein incase of a permit() call failure and, if it fails due to frontrunning, continuing with the intended logic if the allowance check passes.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.