Scope
src/MultiSigTimelock.sol: MultiSigTimelock
Normal behavior: Multisigs managing large treasuries typically expose a pause circuit breaker.
Issue: There is no Pausable hook; once a malicious proposal reaches quorum, there is no on-chain way to halt execution even if compromise is detected moments before execution.
Likelihood:
Reason 1 // Operational incidents and key compromises are inevitable
Reason 2 // Response windows are short
Impact:
Impact 1 // Funds or governance power lost because executions cannot be frozen
Impact 2 // Off-chain coordination is the only fallback, increasing human error
Explanation: Detect malicious proposal with 3 confirmations pending. Without pause, any signer can still execute immediately.
Explanation: Inherit Pausable and gate propose/confirm/execute with whenNotPaused, and add a fast multisig-controlled pause() path.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.
The contest is complete and the rewards are being distributed.