Scope
src/MultiSigTimelock.sol: proposeTransaction, confirmTransaction
Normal behavior: Multisigs should throttle proposal and approval cadence.
Issue: There are no per-signer or global rate limits. An attacker with the owner key can spam thousands of proposals; a malicious signer can spam confirmations/revocations to create alert fatigue and front-run legitimate executions.
Likelihood:
Reason 1 // Automation makes spam trivial
Reason 2 // Social-engineering relies on noisy channels to hide payloads
Impact:
Impact 1 // Signers miss critical malicious proposals buried in noise
Impact 2 // Gas and time wasted on repeated confirmations/revocations
Explanation: Bot submits hundreds of proposals per minute; signers cannot review them all, increasing odds of approving a hidden malicious call.
Explanation: Add cooldowns and per-signer daily quotas on proposals and confirmations, enforced on-chain.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.
The contest is complete and the rewards are being distributed.