EthSecurity
5.24K subscribers
112 photos
20 files
766 links
Download Telegram
someone with a $500 bankroll accidentally discovered we were using an old FTM price to mark Sonic ($0.70 vs $0.50) and looped it $50/time in our UI for twelve hours today and like +40x'ed his port, whoever you are ggwp you deserve it (you should learn how to use an API tho)
https://x.com/tomkysar/status/1897125825889398817 @EthSecurity1
😁14
critical vulnerability let in time.fun steal all trading fees and modify metadata (e.g. change "toly's minute" to "vitalik's minute") of every tokens launched.
time.fun provides each new user with a dedicated wallet to deposit USDC for trading. User's private key is securely stored in a third party provider. But SOL is needed to cover gas fees and time.fun wants a seamless interaction for users, the wallet “HW2C...Lo1H” signs every trade transaction alongside the user’s wallet signature. Surprisingly, this same wallet also owns all tokens launched by time.fun. As it is one of the signers, we can act on behalf of “HW2C...Lo1H” if we can let the backend sign arbitrary data.

@EthSecurity1
4
At 23:00 CET on 05.03.25, the 1inch team discovered a vulnerability in resolver smart contracts using the obsolete Fusion v1 implementation. No end-user funds were at risk—only resolvers using Fusion v1 in their own contracts. @EthSecurity1
👍7
EthSecurity
At 23:00 CET on 05.03.25, the 1inch team discovered a vulnerability in resolver smart contracts using the obsolete Fusion v1 implementation. No end-user funds were at risk—only resolvers using Fusion v1 in their own contracts. @EthSecurity1
1inch market maker @trustedvolumes got hacked for over $4.5M and a few smaller MMs got hacked for $0.5M yesterday.

The root cause is that 1inch calls MM contract’s resolveOrders function to get funds to its settlement contract. Most bots only checked the msg.sender = settlement contract - and unfortunately there was an arbitrary call vulnerability in settlement contract. Thus the hacker could forge resolveOrders call and drain MM contracts.

The funny thing is the hacker incorrectly transferred half of the stolen funds to the 1inch settlement contract, making the funds available for everyone to grab, and he spent quite sometime to get funds back. We were trying to compete but the hacker got it first unfortunately.

By shoucccc



1inch Postmortem by decurity
https://blog.decurity.io/yul-calldata-corruption-1inch-postmortem-a7ea7a53bfd9
@EthSecurity1
4😁3👍1🤔1
Forwarded from Vladimir S. | Officer's Channel (Vladimir S. | officercia)
Trezor Reveals Potential Vulnerability in Older Safe 3 Crypto Wallets !

Trezor disclosed a potential vulnerability in its Safe 3 wallet after Ledger identified a supply chain attack using voltage glitching.

The attack requires physical access and advanced skills, making it unlikely for widespread exploitation. Newer Trezor models, including Safe 5, are unaffected. Users are advised to buy from official sources, use strong PINs, enable passphrases, and keep firmware updated.

https://www.theblock.co/post/346018/trezor-discloses-vulnerability-safe-3-crypto-wallet-rival-ledger

#opsec #security
🫡42
Happy nowruz
🎉174🤔3🙉1
Issues in Protocols Interacting with Uniswap V3 Liquidity & Cross-Chain Swaps - link

Modern Stablecoins, How They're Made: M^0 - link

Bybit Hack Tracing Dune panel - link


@EthSecurity1
👍4🔥3
Forwarded from Vladimir S. | Officer's Channel (Vladimir S. | officercia)
Use this list of fantastic telegram channels I've put together in order to discover them as your own personal Web3-Google!

Feel free to use this folder to onboard your non-web3 friends to Web3, as the majority of the channels are maintained by independent researchers. There are also additional channels for news, CT reviews, and more!

Link: t.me/addlist/uesom31GM1I4Yjgy

#telegram #offtopic
7
DeFi Liquidation Vulnerabilities - link

Learn how to debug bytecode with huff and forge -
link

Solidity Development with Foundry: Cast, Anvil, Chisel, and Forge by Ethereum Engineering group -
link

@EthSecurity1
6
Forwarded from Leviathan News
Check out this extremely detailed graphical breakdown of “the journey of a smart contract” - 𝕏/@officer_cia
👍4
postmortem on HyperledgerBesu had the wrong address for the deposit contract - link

BRC20 Snipping Attack -
link

Lessons from OpenZeppelin’s 1000+ Audits -
link

@EthSecurity1
3
ImpermaxFinance hacked
The root cause of the ImpermaxFinance attack is the mispricing of Uniswap V3 NFTs.
@EthSecurity1
Loopscale hacked for ~ 5.7M USD and 1200 SOL

Root cause: one stale price feed → under-collateralized loans → exit liquidity.

all stolen funds returned to protcol!

@EthSecurity1
👍10