ERC20 allowances should prevent the classic approval race condition by enforcing:
The internal helper directly overwrites allowance without enforcing safe patterns.
Likelihood:
Happens whenever a user changes allowance from X to Y.
MEV bots and attackers routinely scan for these transactions.
Impact:
Attacker drains the old allowance
User sets new allowance
Attacker drains again → double-loss
Total stolen: 300.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.
The contest is complete and the rewards are being distributed.