Timelock Can Be Bypassed Through Value Manipulation
The timelock delay is determined solely by the transaction value at proposal time. An attacker who gains control could propose a transaction with a low value (e.g., 0.99 ETH for no timelock), then later modify the transaction data to execute a different action, or chain multiple small transactions to achieve the same effect as one large transaction without the corresponding timelock delay.
Likelihood:
An attacker who gains control could propose a transaction with a low value (e.g., 0.99 ETH for no timelock), then later modify the transaction data to execute a different action, or chain multiple small transactions to achieve the same effect as one large transaction without the corresponding timelock delay.
Impact:
An attacker could drain large amounts by splitting transfers into sub-1 ETH transactions with no timelock, or execute time-sensitive malicious actions without delay.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.
The contest is complete and the rewards are being distributed.