The multisig is designed to delay execution of risky transactions using a timelock, where higher-value transactions wait longer before execution, giving signers and observers time to react.
The timelock duration is determined only by the ETH value (txn.value), completely ignoring the actual effect of the transaction calldata (txn.data). As a result, transactions with zero ETH value but high governance or fund impact execute instantly, bypassing the timelock entirely.
Likelihood:
Governance and treasury interactions commonly use value = 0 while moving large ERC20 balances or modifying protocol state.
Any signer can execute arbitrary calldata once confirmations are met, making this bypass available during normal protocol usage.
Impact:
Timelock protection is rendered ineffective for high-impact actions.
Enables instant execution of governance takeovers, token drains, or admin role changes.
Violates signer expectations and governance safety guarantees.
The following transaction drains ERC20 funds without any timelock delay:
Introduce timelock logic that accounts for transaction intent, not just ETH value.
Enforce a minimum delay for any external call
Require explicit delay parameters per proposal
Classify transactions (ETH transfer vs governance call)
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.