The multisig is designed to allow queued transactions to be executed once they receive sufficient confirmations.
However, a transaction that reverts during execution remains permanently executable-but-failing, with no mechanism to cancel, invalidate, or clean it up. This allows a single malicious or malformed transaction to irreversibly poison governance execution flow.
Likelihood:
Occurs during normal multisig usage when interacting with external contracts
Common when targets change behavior, upgrade, or intentionally revert
Impact:
Permanent DoS of governance execution for affected transactions
Blocks treasury operations, upgrades, signer rotations, or emergency actions
Because failed executions do not transition the transaction into a terminal state (cancelled / failed), the multisig accumulates toxic transactions that cannot be resolved. Over time, this can completely halt operational governance.
Introduce an explicit cancellation / failure finalization path
Allow governance-approved cancellation
Track failed attempts and auto-invalidate
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.
The contest is complete and the rewards are being distributed.