Attacker can cause treasury DoS, because any token can be used in deposit() function.
Variable _totalValue will be increased by any amount of any deposited token. Attacker can create malicious custom token and deposit type(uint256).max - 1 amount of the token (in one transaction or multiple), causing _totalValue to become big enough to overflow in all future deposits.
Treasury can be DoSed forever, because any future deposts will revert due to overflow in _totalValue.
Manual reveaw.
Allow only whitelisted tokens with limited totalSuply() to be deposited, or even remove _totalValue variable.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.