When a signer confirms a transaction, their confirmation is recorded and permanently contributes to the transaction’s confirmation count.
If that signer is later revoked, the contract removes their signing privileges but does not invalidate or discount their historical confirmations.
As a result, a transaction may still reach execution using confirmations from accounts that are no longer authorized signers, violating the expected governance trust model.
Likelihood:
Signers are commonly revoked due to compromise or governance decisions.
Historical confirmations persist automatically without additional attacker action.
Impact:
Revoked or compromised signers can continue influencing transaction execution.
Governance decisions may be executed based on invalid or outdated authority.
Explanation:
This PoC shows that a signer’s confirmation continues to be counted even after their signing role has been revoked. The transaction is executed despite relying on an authorization that should no longer be valid.
Explanation:
Rather than relying on a cached confirmation counter, execution should dynamically compute confirmations based only on currently active signers. This ensures that revoked signers lose all governance influence immediately and prevents stale confirmations from affecting transaction execution.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.
The contest is complete and the rewards are being distributed.