Implementation contracts lack initialization protection, allowing attackers to hijack the contract if not properly initialized.
Malicious actors could initialize contracts with their own address
Complete protocol takeover
Manual review
MythX
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.