EthSecurity
5.23K subscribers
112 photos
20 files
766 links
Download Telegram
BGM TOKEN. The reward logic can reduce the token in LP, leading to price inflation when there is limited token in the LP. loss : 500k $ hack trx: https://app.blocksec.com/explorer/tx/bsc/0x8580825008800b9e13266f40b41a838a521e4d0bb4abc1cb78684253b7bc9fd1?line=26&debugLine=26 @EthSecurity1
❀3
deltaprime incident The exploit is made possible due to the lack of input validation in claiming possible rewards. Specifically, the exploiter provides an evil pair in order to change the collateral asset into reward asset. By doing so, the initial collateral to borrow funds can be stolen out while leaving the debt unpaid.
the exploiter has added liquidity (~$1.3M) to #LFJ (formerly Trader Joe) & farmed $USDC on #Stargate @EthSecurity1
❀5
seems polterfinance hacked
$polter exploited more than 7 m$ when they added the new $BOO market on fantom blockchain. root cause: The price oracle relies on the SpookySwap V2/V3 pool of BOO token and is easily manipulated through a quick flashloan. @EthSecurity1
⚑5πŸ”₯2
CoinPoker hacked for 2 m$. seems custodian service compromised. @EthSecurity1
πŸ”₯5
DCF token hacked because of wrong transfer logic.

In "transfer" function, if target address is pancake pair, it exchanges 5% of tokens to USDT and adds liquidity to DCT-USDT pancake pair. This can be used for exploit. Hacker borrowed a huge amount of USDT and exchanged them to DCF and DCT. After that he transferred some of DCF to pancake pair. Liquidity added and he exchanged DCT to USDT again, gained 600k more USDT. Also, because of unnecessary burn functionality, pancake pair lost almost all DCF tokens. Developers, be careful when making new transfer logic, it should be audited. https://app.blocksec.com/explorer/tx/bsc/0xb375932951c271606360b6bf4287d080c5601f4f59452b0484ea6c856defd6fd @EthSecurity1
πŸ”₯4⚑1πŸ‘1
Forwarded from Daily Security
Malware in the @solana/web3.js
Seen some similar cases of npm takeover in the past. Be carefulπŸ’«

https://x.com/anza_xyz/status/1864085236432134264?s=46

Linkedin post
πŸ”₯3🀯2❀1πŸ‘1😁1
Vestra Dao hacked. 73 m $vstr stolen. Root cause: there's no code for remove user staking info, this means anyone who staked some amount can unstake several times. Hacker just called "unStake" several times @EthSecurity1
πŸ™‰10😁1🀯1😨1
Users lost millions due to AlpacaFinance
allegedly using manual CoinGecko price updates instead of real oracles. When questioned, they asked "which faster oracle would you have used?" https://rekt.news/false-prophet/ @EthSecurity1
😁4🀯3😱1
Forwarded from Vladimir S. | Officer's Channel (Vladimir S. | officercia)
Use this list of fantastic telegram channels I've put together in order to discover them as your own personal Web3-Google!

Link: t.me/addlist/uesom31GM1I4Yjgy

Feel free to use this folder to onboard your non-web3 friends to Web3, as the majority of the channels are maintained by independent researchers. There are also additional channels for news, CT reviews, and more!

A small tip to subscribooors: if you find a channel interesting, move it out of the folder into your main list of chats. That way you’ll view content you’re interested in more often, and channels get more views instead of just subscribers!

#crypto #web3
❀5πŸ’―1
sorra staking lost 43 k$. why? because of in every withdraw userRewardDistributed increasing. hacker withdraw 1wei multiple time. https://app.blocksec.com/explorer/tx/eth/0x6439d63cc57fb68a32ea8ffd8f02496e8abad67292be94904c0b47a4d14ce90d @EthSecurity1
πŸ”₯8❀1🫑1