EthSecurity
5.22K subscribers
112 photos
20 files
761 links
Download Telegram
-Chainge finance Hack for insufficient validation 150 k $

-Curio Defi Hack post-mortem 40 m $ https://www.halborn.com/blog/post/explained-the-curio-hack-march-2024 @EthSecurity1
❀5
Zelic found critical vulnerability in Gains network forks

https://x.com/zellic_io/status/1781389554764886289?s=61
@EthSecurity1
πŸ”₯4
EthSecurity
Deploy scripts are now in scope for smart contract audits https://medium.com/cyfrin/deploy-scripts-are-now-in-scope-for-smart-contract-audits-7fbb95788ce7 …
in Astar Bug, amount transfered truncate to 0.why is that? The amount argument gets truncated to 0 because of how the read function is implemented in the EvmDataReader struct.

When the read function is called with a type parameter of BalanceOf<Runtime, Instance>, which is a type alias for u128, it reads 32 bytes from the calldata and then uses buffer.copy_from_slice to copy the relevant bytes into a u128 buffer.

However, since the input value is larger than the maximum u128 value, the buffer.copy_from_slice function will only copy the lower 16 bytes of the input value into the buffer, effectively truncating the value.

In this case, when the input value is type(uint128).max + 1, the lower 16 bytes of this value are all zeros. Therefore, the buffer.copy_from_slice function copies these zero bytes into the buffer, resulting in a u128 value of 0.

This is why the amount argument gets truncated to 0, allowing the attacker to exploit this vulnerability. @EthSecurity1
πŸ‘4
1-Vulnerability Report: Binance PoR Dummy User Attack https://www.leku.blog/binance_vuln/ 2-Rolling in the Shadows: Analyzing the Extraction of MEV Across Layer-2 Rollups https://arxiv.org/abs/2405.00138 3-Patrick collins & txFusion join
to discuss TxFusion, a set of tools and products designed to improve developers' experience on the ZK ecosystem.
Today, at 7 pm UTC on
https://www.youtube.com/watch?v=QUmM7LF4ch0 @EthSecurity1
❀3πŸ‘3
Forwarded from Vladimir S. | Officer's Channel (officercia)
πŸ“šVulnerability Wiki Page of the Week: "Borrowing"

Uncover how DeFi's lending & borrowing pose security challenges. From unchecked repayments to smart contract exploits, see how you can safeguard against vulnerabilities!

Read more πŸ‘‰

β€’ https://wiki.r.security/wiki/Lending/Borrowing

#audit #solidity #web3 #security
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯4🀝3❀1πŸ’―1
seems $NORMIE Got Exploited,hecker have access to minted tokens.@EthSecurity1
πŸ‘4😁2
unassigned pool earnings In the context of the Uniswap V3 protocol, the "unassigned pool earnings" How it works:

When a user deposits their assets into the pool, they earn a share of the pool's earnings.
The pool earns rewards in the form of interest, fees, or other incentives.
The pool's earnings are not yet assigned to any specific user, so they are considered "unassigned".
When a user withdraws their assets from the pool, their share of the unassigned earnings is assigned to them.
Why unassigned pool earnings?

The unassigned pool earnings are a result of the way the Uniswap V3 protocol is designed. When a user deposits their assets into the pool, they earn a share of the pool's earnings. However, the earnings are not yet assigned to any specific user, so they are considered "unassigned".

How are unassigned pool earnings assigned?

When a user withdraws their assets from the pool, their share of the unassigned earnings is assigned to them. This is done by calculating the user's share of the pool's earnings based on their deposited assets and the pool's earnings.

Why is it important?

The unassigned pool earnings are important because they represent the rewards earned by the pool, which are not yet assigned to any specific user. When a user withdraws their assets from the pool, their share of the unassigned earnings is assigned to them, ensuring that they receive their fair share of the pool's earnings. in recent audit protocol ignored unassigned pool earnings https://github.com/sherlock-audit/2024-04-interest-rate-model-judging?tab=readme-ov-file#issue-h-2-unassigned-pool-earnings-can-be-stolen-when-a-maturity-borrow-is-liquidated-by-depositing-at-maturity-with-1-principal
@EthSecurity1
πŸ”₯2πŸ‘1
Forwarded from Wu Blockchain News
An OKX user disclosed today that hackers purchased his personal information and used AI to create fake videos. Hackers used these to change the victim's OKX passwords and even 2FA. More than $2 million US were stolen. Be wary of Deepfakes and personal data leaks. β€” link
🀯8πŸ”₯3