When a user want to create new DAO membership, he calls MembershipFactory::createNewDAOMembership. But the function use CREATE, which is vulnerable to reorg attack.
As mentioned in the contest's readme file. This function will be deployed in Polygon which is vulnerable to reorg attack. There is spesific cases with 157 blocks depth. Reference
Example:
Alice deploys a new DAO.
Bob has a bot that observes the blockchain for reorg.
Bob calls the spesific transaction
Finally Alice's tx is executed and a new DAO will controlled by Bob without Alice knowing.
Bob immediately modified the proxyAdmin in the newly created MembershipERC1155.sol and transfers the tokens to himself if there is profit being transferred.
The actor will get the newly transferred profit.
Likelihood : Low
Impact : High
Manual Review
Deploy the DAO via CREATE2 with salt that includes msg.sender.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.