Migration Proxy Vulnerability
A migration proxy vulnerability occurs when the administrative or automated mechanism responsible for routing user interactions between old and new contracts is itself insecure. Proxies are often used to ensure seamless transitions, but if the proxy contract has flaws, an attacker could intercept funds or redirect state changes during the migration process.
This represents a significant attack vector, as the proxy effectively acts as a gatekeeper for the entire migration. If the authorization logic for the proxy is poorly implemented, unauthorized parties could trigger migrations or lock the system.
Protecting the proxy requires strict access control, multisig authorization, and clear visibility into how the routing logic handles state transitions.