An auditor is reviewing a smart contract's token distribution function, which iterates through a large, externally-provided array of recipient addresses to execute transfers.
As the number of recipients grows, transactions calling this function begin to fail consistently.
What is the most likely vulnerability?