The IBlockHashRetain.vyi
interface's commit pattern is vulnerable to front-running attacks, violating which requires proper commit-reveal schemes for actions visible in the mempool.
The current implementation exposes the commit operation without any protection:
An attacker can:
Monitor the mempool for commit()
transactions
Front-run with their own commit using higher gas
Manipulate the block hash retention process
Malicious actors can front-run legitimate commits
Disruption of oracle block hash data
Potential manipulation of dependent protocols
Loss of commit operation integrity
Manual Review
Implement proper commit-reveal scheme:
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.