The vulnerability arises from the loop, where the contract iterates over the tierConfigs array to calculate the total number of members across all tiers. If a tier.amount is set to an excessively large value, it could result in a denial of service (DOS) due to the high gas consumption required to process the loop. This could prevent the createNewDAOMembership function from executing successfully, thereby blocking the creation of new DAOs. To mitigate this, a reasonable upper limit should be enforced on the tier.amount values to ensure that the loop can execute within the block gas limit.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.