Because of ballot name conflict mechanism, Legitimate proposal creation could be DoSed by malicious user through front-running same proposal creation but different other infos
Mitigation
commit 39921b4
The mitigation included all necessary arguments into ballotName:
Lines of code
Vulnerability details
Comments
Because of ballot name conflict mechanism, Legitimate proposal creation could be DoSed by malicious user through front-running same proposal creation but different other infos
Mitigation
commit 39921b4 The mitigation included all necessary arguments into
ballotName
:proposeParameterBallot()
:parameterType
,description
proposeTokenWhitelisting()
:token
,tokenIconURL
,description
proposeTokenUnwhitelisting()
:token
,tokenIconURL
,description
proposeSendSALT()
:wallet
,amount
,description
proposeCallContract()
:contractAddress
,number
,description
proposeCountryInclusion()
:countryCode
,description
proposeCountryExclusion()
:countryCode
,description
proposeSetAccessManager()
:newAddress
,description
proposeWebsiteUpdate()
:newWebsiteURL
,description
The original issue was resolved.
Conclusion
Confirmed