The MembershipFactory contract is susceptible to front-running attacks when one user attempts to join a certain tier that has only one spot remaining. Another user can monitor the mempool and front-run the transaction, seizing the last available position.
The vulnerability exists in the joinDAO function of the MembershipFactory contract:
The issue arises because:
the function lacks any mechanism to prevent front-running
The vulnerability can lead to:
Legitimate users being unable to join their desired DAO tier
Users losing gas fees on failed transactions
Potential manipulation of membership acquisition by MEV bots
Degraded user experience and potential reputational damage to the protocol
Manual code review
Consider Using Flashbots: Implement private transaction submission through Flashbots to avoid mempool exposure in order to protecte against front-running
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.