Normal Behavior
The multisig timelock is designed to require a fixed number of confirmations (REQUIRED_CONFIRMATIONS) from active signers before a transaction can be executed.
Under normal conditions, the number of active signers should always be sufficient to reach the required confirmation threshold, ensuring that governance actions remain executable.
Issue
When signers are revoked via revokeSigningRole, the total number of active signers (s_signerCount) can drop below REQUIRED_CONFIRMATIONS.
However, the required confirmation threshold is not updated accordingly. As a result, no future transaction can ever collect enough confirmations, permanently locking governance functionality.
Likelihood:
Occurs whenever the owner removes one or more signers without coordinating threshold updates
Likely during operational signer rotation, key compromise response, or DAO governance changes
Impact:
Permanent denial of service for all governance actions
Funds and protocol configuration become irreversibly locked
Explanation:
This PoC demonstrates that once the signer count is reduced below the required confirmation threshold, no transaction—regardless of how many confirmations it previously received—can ever be executed. This results in a permanent denial of service for the multisig governance.
Explanation:
This mitigation enforces a critical governance invariant by ensuring that the multisig always retains enough active signers to meet the execution threshold. Preventing signer count from dropping below REQUIRED_CONFIRMATIONS eliminates the risk of permanently locking governance.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.
The contest is complete and the rewards are being distributed.