An auditor is reviewing a smart contract's token distribution function, which iterates through a large, externally-provided array of recipient addresses to execute transfers. As the number of recipients grows, transactions calling this function begin to fail consistently. What is the most likely vulnerability?
-
A
Reentrancy attack
-
B
Denial of Service (DoS) due to block gas limit
-
C
Timestamp dependence
-
D
Integer underflow