A multisig timelock must enforce a mandatory delay for all security-critical operations, ensuring signers and observers have time to react before execution.
The timelock enforcement is applied uniformly without distinguishing operation type, allowing privilege-changing or governance actions (e.g., signer additions, role grants) to execute after the same delay as regular transfers. This collapses the security boundary between fund movement and authority escalation, enabling rapid governance takeover.
Likelihood:
Governance or role-management transactions are proposed regularly.
Signers assume timelock sufficiently protects all operations equally.
Impact:
Attackers gain signer/admin roles with minimal delay.
Full multisig takeover possible without external detection window.
Although the timelock expires correctly, it does not account for risk asymmetry between transfers and governance actions. A single signer-set mutation permanently compromises system trust.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.
The contest is complete and the rewards are being distributed.