Domů
Oznámení
Profil
Trendující články
Novinky
Přidáno do záložek a oblíbených
Centrum pro tvůrce
Nastavení
Zobrazit originál
LIVE
BlockSec
--
Sledovat
Token 2049 je bezkonkurenční vzrušení! 🔥 BlockSec na @token2049 Zažijte vzrušení z blockchainu!
👀 Vítejte na setkání s BlockSec v Singapuru!#Token2049#Singapur #BlockSec
Vyloučení odpovědnosti: Obsahuje názory třetích stran. Nejedná se o finanční poradenství. Může obsahovat sponzorovaný obsah.
Viz obchodní podmínky.
1.3k
0
Odpovědi
0
Prohlédněte si nejnovější zprávy o kryptoměnách
⚡️ Zúčastněte se aktuálních diskuzí o kryptoměnách
💬 Komunikujte se svými oblíbenými tvůrci
👍 Užívejte si obsah, který vás zajímá
E-mail / telefonní číslo
Registrovat se
Přihlásit se
Relevantní tvůrce
LIVE
BlockSec
@BlockSec
Sledovat
Prozkoumat více od tvůrce
🚀BlockSec and OKX Explorer @OKXExplorer have launched a comprehensive partnership focusing on blockchain data interoperability, product integration, and API enhancements. https://blocksec.com/blog/block-sec-partners-with-okx-explorer-to-strengthen-on-chain-data-compliance
--
Enhanced security measures attract more users, increase TVL, and drive ecosystem prosperity, promoting wider adoption. YESSS! Security is CRUCIAL for the growth of L2! As a security company, BlockSec offers an effective solution for L2 networks with the Sequencer Threat Overwatch Program (S.T.O.P). Leveraging BlockSec Phalcon's @Phalcon_xyz excellent threat detection capabilities, S.T.O.P brings innovative security solutions to L2. Find out more here🔗 https://t.co/6FaQqgFH5L #BlockchainSecurity #L2Innovation #DevCon2024  
--
Our investigation on meme coin SHAR Pump and Dump on #Solana https://metasleuth.io/blog/pump-dump-shar-MetaSleuth
--
We have released our dataset on Web3 phishing website detection, containing 26,333 phishing URLs. Feel free to use the dataset for further research and development of better anti-phishing solutions. https://github.com/blocksecteam/TxPhishScope
--
.@OnyxDAO was attacked, resulting in a loss of nearly $4M. The root cause was unverified user input during the liquidation process. Specifically, key parameters of the liquidateWithSingleRepay function in the NFTLiquidation contract were controllable by the attacker, allowing manipulation of the extraRepayAmount variable through the repayAmount parameter. By exploiting this, the attacker was able to liquidate all collateral with just one token. The key attack steps are summarized as follows: 1. The attacker first deposited oETH and borrowed various assets to reach the liquidation threshold. Simultaneously, they created a new contract that, through a donation attack and precision loss (inherent from the Compound V2 fork), reduced the oETH exchange rate, making the attacker's position eligible for liquidation. 2. The attacker then performed the liquidation. Due to insufficient parameter validation, the attacker manipulated the extraRepayAmount variable, which was added to the calculation of how many tokens needed to be liquidated. This allowed the attacker to obtain more oETH through liquidation, leading to a profit. Attack Tx:
--
Nejnovější zprávy
Rumble Inc. Allocates $20 Million To Bitcoin As Inflation Hedge
--
Bitcoin(BTC) Drops Below 93,000 USDT with a 5.18% Decrease in 24 Hours
--
BNB Drops Below 630 USDT with a 4.20% Decrease in 24 Hours
--
Ethereum(ETH) Drops Below 3,400 USDT with a Narrowed 1.26% Increase in 24 Hours
--
Hashdex Advances Crypto ETF Proposal Amid Regulatory Developments
--
Zobrazit více
Mapa stránek
Cookie Preferences
Pravidla a podmínky platformy