EthSecurity
5.22K subscribers
112 photos
20 files
760 links
Download Telegram
Happy noroz and new year 2583 achaemenid
To all kurdish and persians
โค4๐Ÿพ4๐Ÿ”ฅ3๐ŸŽ‰3๐Ÿคฌ1๐Ÿคฎ1
GJNRFZtWYAA7Au0.jpg
22.5 KB
SSS Hacked on Blast. a kid wrote it. @EthSecurity1
๐Ÿ˜ข3
Forwarded from Vladimir S. | Officer's Channel (officercia)
๐Ÿ”“โ˜๏ธ unizen_io, a crypto exchange and trading platform, experienced a security breach on March 8 that resulted in the loss of more than $2.1 million.

The attack technique involved authorizing a trading aggregator running on the Ethereum ( $ETH ) blockchain network. The hacker exploited an open external challenge vulnerability in the contract.

Detailed analysis: https://x.com/amlbothq/status/1770102963521867916

#offtopic #security #investigations
๐Ÿ’ฏ4๐Ÿ‘1
๐Ÿ‘2โค1๐Ÿค”1
EIP 3074 approved to go live on next Ethereum Hard fork. EIP Details: https://eips.ethereum.org/EIPS/eip-3074
it has some pitfalls for now:
-malicious invokers could steal funds
-ether in EOAs cannot be spent
-self-sponsoring breaks a weak form of flash-loan protection -invokers can make upgrading ethereum more challenging @EthSecurity1
๐Ÿค”4๐Ÿ†’4
-Chainge finance Hack for insufficient validation 150 k $

-Curio Defi Hack post-mortem 40 m $ https://www.halborn.com/blog/post/explained-the-curio-hack-march-2024 @EthSecurity1
โค5
Zelic found critical vulnerability in Gains network forks

https://x.com/zellic_io/status/1781389554764886289?s=61
@EthSecurity1
๐Ÿ”ฅ4
EthSecurity
Deploy scripts are now in scope for smart contract audits https://medium.com/cyfrin/deploy-scripts-are-now-in-scope-for-smart-contract-audits-7fbb95788ce7 โ€ฆ
in Astar Bug, amount transfered truncate to 0.why is that? The amount argument gets truncated to 0 because of how the read function is implemented in the EvmDataReader struct.

When the read function is called with a type parameter of BalanceOf<Runtime, Instance>, which is a type alias for u128, it reads 32 bytes from the calldata and then uses buffer.copy_from_slice to copy the relevant bytes into a u128 buffer.

However, since the input value is larger than the maximum u128 value, the buffer.copy_from_slice function will only copy the lower 16 bytes of the input value into the buffer, effectively truncating the value.

In this case, when the input value is type(uint128).max + 1, the lower 16 bytes of this value are all zeros. Therefore, the buffer.copy_from_slice function copies these zero bytes into the buffer, resulting in a u128 value of 0.

This is why the amount argument gets truncated to 0, allowing the attacker to exploit this vulnerability. @EthSecurity1
๐Ÿ‘4
1-Vulnerability Report: Binance PoR Dummy User Attack https://www.leku.blog/binance_vuln/ 2-Rolling in the Shadows: Analyzing the Extraction of MEV Across Layer-2 Rollups https://arxiv.org/abs/2405.00138 3-Patrick collins & txFusion join
to discuss TxFusion, a set of tools and products designed to improve developers' experience on the ZK ecosystem.
Today, at 7 pm UTC on
https://www.youtube.com/watch?v=QUmM7LF4ch0 @EthSecurity1
โค3๐Ÿ‘3