Data | CryptoAttack 🤖
10.9K subscribers
205 photos
4 videos
21.8K links
🤖 Некоторые данные и метрики по крипто из @cryptoattackbot - передовые инструменты и решения на базе AI🤖

@cryptoattack24 - новости быстрее всех 24/7

@cryptoattack - топ дайджесты

@pro_demo - о боте

Связь - @Attackconnect_bot
Download Telegram
🙋‍♂️ Вырастет ли цена на токены, связанные с NFT, с запуском #BLUR на Binance , Gateio , MEXC 14 февраля? Мы проанализировали крупнейших держателей #LOOKS , #X2Y2, #BEND и #JPEG и обнаружили, что некоторые киты увеличили свои активы за последний месяц.

https://twitter.com/lookonchain/status/1621538874605568005

#обзоры @cryptoattackbot
#CRV #JPEG #ALETH #peth #ALCX Vyperlang Exploit
#VERYHIGH #
Status: In-Progress
Peckshield has alerted JPEG'd of a potential contract exploit. According to Supremacy Alert, the exploit is a "reentrancy issue, maybe vyperlang 0.2.15 version has some kind of vulnerability that can bypass '@nonreentrant('lock').'" The contract exploit is believed to have caused an issue with Curve factory pools impacting JPEG'd, Alchemix, and Metranome

The JPEG'd protocol was exploited for roughly $11.5 million from the pETH/ETH pool, according to Etherscan. The team stated that "The vault contracts allowing to borrow against NFTs are safe and still running solidly. NFTs and the treasury funds are safe."

Alchemix's alETH/ETH pools on Curve has also been affected for roughly $13.6 million. The team stated that they "are aware of the ongoing situation with the $alETH curve pool and the team are actively working."

The Vyperlang team has stated that "Vyper versions 0.2.15, 0.2.16 and 0.3.0 are vulnerable to malfunctioning reentrancy locks. The investigation is ongoing but any project relying on these versions should immediately reach out to us."
Curve | Hack Or Attack
📅 30.07.2023 19:56:00
#SmartEvent @cryptoattackbot