Tapioca DAO hacked
vesting contract ownership transferred to exploiter, and then all vesting tokens emergency released
https://arbiscan.io/token/0x2c650dab03a59332e2e0c0c4a7f726913e5028c1?a=0x70285a11489bed93686410ebc727057cafb8129d
@EthSecurity1
vesting contract ownership transferred to exploiter, and then all vesting tokens emergency released
https://arbiscan.io/token/0x2c650dab03a59332e2e0c0c4a7f726913e5028c1?a=0x70285a11489bed93686410ebc727057cafb8129d
@EthSecurity1
Arbitrum One (ETH) Blockchain Explorer
TapToken (TAP) Token Tracker | Arbitrum One
TapToken (TAP) Token Tracker on Arbitrum One shows the price of the Token $0.0021, total supply 47,500,000, number of holders 5,074 and updated information of the token. The token tracker page also shows the analytics and historical data.
👍5
Forwarded from Vladimir S. | Officer's Channel (Vladimir S. | officercia)
Looks like $20M of seized funds tied to the US Government was likely stolen in the past hour. - @investigations
RT for visibility: x.com/officer_cia/status/1849534839319302453
#security #opsec
RT for visibility: x.com/officer_cia/status/1849534839319302453
#security #opsec
$150,000 Evmos Vulnerability Through Reading Documentation
https://medium.com/@jjordanjjordan/150-000-evmos-vulnerability-through-reading-documentation-d26328590a7a [12 hours] Ethereum code line-by-line
https://youtu.be/gPQ-uXj03iQ?feature=shared @EthSecurity1
https://medium.com/@jjordanjjordan/150-000-evmos-vulnerability-through-reading-documentation-d26328590a7a [12 hours] Ethereum code line-by-line
https://youtu.be/gPQ-uXj03iQ?feature=shared @EthSecurity1
Medium
$150,000 Evmos Vulnerability Through Reading Documentation
Life as a Web3 security researcher often consists of deep diving into technical subjects that can be difficult to grasp. Because of this…
🔥5🍾1
Forwarded from Vladimir S. | Officer's Channel (Vladimir S. | officercia)
Use this list of fantastic telegram channels I've put together in order to discover them as your own personal Web3-Google!
Feel free to use this folder to onboard your non-web3 friends to Web3, as the majority of the channels are maintained by independent researchers. There are also additional channels for news, CT reviews, and more!
A small tip to subscribooors: if you find a channel interesting, move it out of the folder into your main list of chats. That way you’ll view content you’re interested in more often, and channels get more views instead of just subscribers!
Feel free to use this folder to onboard your non-web3 friends to Web3, as the majority of the channels are maintained by independent researchers. There are also additional channels for news, CT reviews, and more!
A small tip to subscribooors: if you find a channel interesting, move it out of the folder into your main list of chats. That way you’ll view content you’re interested in more often, and channels get more views instead of just subscribers!
👍6👏1
- Aztec Multiple-Spend Error Bugfix Review - Alchemix Missing Solvency Check Bugfix Review - CurveFinance price anomaly - Defi fork bugs @EthSecurity1
Medium
Aztec Multiple-Spend Error Bugfix Review
On September 12th, 2023, the security researcher LonelySloth responsibly disclosed a Critical severity vulnerability from the Aztec Network…
👍3
- A detailed write-up Fuel critical vulnerability Immunefi Attackathon, 150 $k paid - An exploration of low-level Solana VM behavior. How to escalate from a powerful memory corruption primitive to full program control. - Foundry tips @EthSecurity1
GitHub
GitHub - minato7namikazi/Fuel-Blockchain-Critical-Vulnerability: A detailed write-up of a solo critical vulnerability discovered…
A detailed write-up of a solo critical vulnerability discovered during the Immunefi Attackathon, before the mainnet launch - minato7namikazi/Fuel-Blockchain-Critical-Vulnerability
🔥10
BGM TOKEN. The reward logic can reduce the token in LP, leading to price inflation when there is limited token in the LP. loss : 500k $ hack trx: https://app.blocksec.com/explorer/tx/bsc/0x8580825008800b9e13266f40b41a838a521e4d0bb4abc1cb78684253b7bc9fd1?line=26&debugLine=26 @EthSecurity1
❤3
deltaprime incident The exploit is made possible due to the lack of input validation in claiming possible rewards. Specifically, the exploiter provides an evil pair in order to change the collateral asset into reward asset. By doing so, the initial collateral to borrow funds can be stolen out while leaving the debt unpaid.
the exploiter has added liquidity (~$1.3M) to #LFJ (formerly Trader Joe) & farmed $USDC on #Stargate @EthSecurity1
the exploiter has added liquidity (~$1.3M) to #LFJ (formerly Trader Joe) & farmed $USDC on #Stargate @EthSecurity1
❤5
thala was hacked for 25 m$ but seal911 exposed hacker identity and he accepted 300 k$ bounty. rootcause: https://x.com/moon_shiesty/status/1857886309580157260 @EthSecurity1
X (formerly Twitter)
moon shiesty (@moonshiesty) on X
here's a timeline and technical explanation of the @ThalaLabs exploit:
first the exploiter funded their account with 10 APT from bybit
first the exploiter funded their account with 10 APT from bybit
🔥7
seems polterfinance hacked
$polter exploited more than 7 m$ when they added the new $BOO market on fantom blockchain. root cause: The price oracle relies on the SpookySwap V2/V3 pool of BOO token and is easily manipulated through a quick flashloan. @EthSecurity1
$polter exploited more than 7 m$ when they added the new $BOO market on fantom blockchain. root cause: The price oracle relies on the SpookySwap V2/V3 pool of BOO token and is easily manipulated through a quick flashloan. @EthSecurity1
⚡5🔥2
CoinPoker hacked for 2 m$. seems custodian service compromised. @EthSecurity1
🔥5
DCF token hacked because of wrong transfer logic.
In "transfer" function, if target address is pancake pair, it exchanges 5% of tokens to USDT and adds liquidity to DCT-USDT pancake pair. This can be used for exploit. Hacker borrowed a huge amount of USDT and exchanged them to DCF and DCT. After that he transferred some of DCF to pancake pair. Liquidity added and he exchanged DCT to USDT again, gained 600k more USDT. Also, because of unnecessary burn functionality, pancake pair lost almost all DCF tokens. Developers, be careful when making new transfer logic, it should be audited. https://app.blocksec.com/explorer/tx/bsc/0xb375932951c271606360b6bf4287d080c5601f4f59452b0484ea6c856defd6fd @EthSecurity1
In "transfer" function, if target address is pancake pair, it exchanges 5% of tokens to USDT and adds liquidity to DCT-USDT pancake pair. This can be used for exploit. Hacker borrowed a huge amount of USDT and exchanged them to DCF and DCT. After that he transferred some of DCF to pancake pair. Liquidity added and he exchanged DCT to USDT again, gained 600k more USDT. Also, because of unnecessary burn functionality, pancake pair lost almost all DCF tokens. Developers, be careful when making new transfer logic, it should be audited. https://app.blocksec.com/explorer/tx/bsc/0xb375932951c271606360b6bf4287d080c5601f4f59452b0484ea6c856defd6fd @EthSecurity1
🔥4⚡1👍1
GFT was recently delisted by Binance, and now they're minting over 1 billion tokens and dumping them on exchanges lol
https://bscscan.com/token/0x72ff5742319ef07061836f5c924ac6d72c919080?a=0x0000000000000000000000000000000000000000 @EthSecurity1
https://bscscan.com/token/0x72ff5742319ef07061836f5c924ac6d72c919080?a=0x0000000000000000000000000000000000000000 @EthSecurity1
BNB Smart Chain Explorer
Gifto (GFT) | BEP-20 | Address: 0x72ff5742...72c919080 | BscScan
Token Rep: Neutral | Price: $0.0001 | Onchain Market Cap: $223,840.71 | Holders: 14,650 | As at Feb-06-2026 09:42:05 PM (UTC)
🙉4😁3
Forwarded from Vladimir S. | Officer's Channel (Vladimir S. | officercia)
Clipper DEX is hacked due to API vulnerability (like private key leak). $500K+ loss and $6.5M at risk right now. Withdraw immediately.
• https://x.com/officer_cia/status/1863108671221157985
#security #alert
• https://x.com/officer_cia/status/1863108671221157985
#security #alert
X (formerly Twitter)
Vladimir S. | Officer's Notes (@officer_secret) on X
Clipper Exchange @Clipper_DEX is hacked due to API vulnerability (like private key leak). $500K+ loss and $6.5M at risk right now. Withdraw immediately. - @fried_rice
- Past Permissions, Present Problems: Analysis of Theft through Authorized Malicious Contracts - Cryptographic Asymmetry and How To Shut Down A Cosmos-Ethereum Bridge - SoK: Security of Cross-chain Bridges: Attack Surfaces, Defenses, and Open Problems @EthSecurity1
Medium
Past Permissions, Present Problems: Analysis of Theft through Authorized Malicious Contracts
Background
🔥4
Forwarded from Daily Security
Malware in the @solana/web3.js
Seen some similar cases of npm takeover in the past. Be careful💫
https://x.com/anza_xyz/status/1864085236432134264?s=46
Linkedin post
Seen some similar cases of npm takeover in the past. Be careful💫
https://x.com/anza_xyz/status/1864085236432134264?s=46
Linkedin post
🔥3🤯2❤1👍1😁1