Submitted by Trust
When the project wishes to mint reserved tokens, they call mintReservesFor which allows minting up to the amount calculated by DelegateStores _numberOfReservedTokensOutstandingFor. The function has this line:
In order to ease calculations, if reserve rate is not 0 and no token has been minted yet, the function allows a single reserve token to be printed. It turns out that this introduces a very significant risk for users. Projects can launch with several tierIDs of similar contribution size, and reserve rate as low as 1%. Once a victim contributes to the project, it can instantly mint a single reserve token of all the rest of the tiers. They can then redeem the reserve token and receive most of the users contribution, without putting in any money of their own.
Since this attack does not require setting dangerous flags like lockReservedTokenChanges or lockManualMintingChanges, it represents a very considerable threat to unsuspecting users. Note that the attack circumvents user voting or any funding cycle changes which leave time for victim to withdraw their funds. 
Honeypot project can instantly take most of first users contribution.
New project launches, with 10 tiers, of contributions 1000, 1050, 1100, 
Reserve rate is set to 1% and redemption rate = 100%
User contributes 1100 and gets a Tier 3 NFT reward. 
Project immediately mints Tier 1,  Tier 2, Tier 4, Tier 10 reserve tokens, and redeems all the reserve tokens.
Projects total weight = 12250
Reserve token weight = 11150
Malicious project cashes 1100 (overflow) * 11150 / 12250 = ~1001 tokens.
Dont round up outstanding reserve tokens as it represents too much of a threat.
mejango (Juicebox DAO) acknowledged 
Picodes (judge) commented:
Trust (warden) commented:
Picodes (judge) commented:
