Home
Notification
Profile
Trending Articles
News
Bookmarked and Liked
Creator Center
Settings
LIVE
BlockSec
--
Follow
Our investigation on
meme
coin SHAR Pump and Dump on #
Solana
https://metasleuth.io/blog/pump-dump-shar-MetaSleuth
Disclaimer: Includes third-party opinions. No financial advice. May include sponsored content.
Ā
See T&Cs.
SOL
233.19
-4.19%
310
0
Replies
0
Explore the latest crypto news
ā”ļø Be a part of the latests discussions in crypto
š¬ Interact with your favorite creators
š Enjoy content that interests you
Email / Phone number
Sign Up
Login
Relevant Creator
LIVE
BlockSec
@BlockSec
Follow
Explore More From Creator
šBlockSec and OKX Explorer @OKXExplorer have launched a comprehensive partnership focusing on blockchain data interoperability, product integration, and API enhancements. https://blocksec.com/blog/block-sec-partners-with-okx-explorer-to-strengthen-on-chain-data-compliance
--
EnhancedĀ securityĀ measuresĀ attractĀ moreĀ users,Ā increaseĀ TVL,Ā andĀ driveĀ ecosystemĀ prosperity,Ā promotingĀ widerĀ adoption.Ā YESSS!Ā SecurityĀ isĀ CRUCIALĀ forĀ theĀ growthĀ ofĀ L2! AsĀ aĀ securityĀ company,Ā BlockSecĀ offersĀ anĀ effectiveĀ solutionĀ forĀ L2Ā networksĀ withĀ theĀ SequencerĀ ThreatĀ OverwatchĀ ProgramĀ (S.T.O.P).Ā LeveragingĀ BlockSecĀ Phalcon'sĀ @Phalcon_xyzĀ excellentĀ threatĀ detectionĀ capabilities,Ā S.T.O.PĀ bringsĀ innovativeĀ securityĀ solutionsĀ toĀ L2. FindĀ outĀ moreĀ hereš https://t.co/6FaQqgFH5L #BlockchainSecurityĀ #L2InnovationĀ #DevCon2024 ļæ¼ ļæ¼
--
We have released our dataset on Web3 phishing website detection, containing 26,333 phishing URLs. Feel free to use the dataset for further research and development of better anti-phishing solutions. https://github.com/blocksecteam/TxPhishScope
--
.@OnyxDAO was attacked, resulting in a loss of nearly $4M. The root cause was unverified user input during the liquidation process. Specifically, key parameters of the liquidateWithSingleRepay function in the NFTLiquidation contract were controllable by the attacker, allowing manipulation of the extraRepayAmount variable through the repayAmount parameter. By exploiting this, the attacker was able to liquidate all collateral with just one token. The key attack steps are summarized as follows: 1. The attacker first deposited oETH and borrowed various assets to reach the liquidation threshold. Simultaneously, they created a new contract that, through a donation attack and precision loss (inherent from the Compound V2 fork), reduced the oETH exchange rate, making the attacker's position eligible for liquidation. 2. The attacker then performed the liquidation. Due to insufficient parameter validation, the attacker manipulated the extraRepayAmount variable, which was added to the calculation of how many tokens needed to be liquidated. This allowed the attacker to obtain more oETH through liquidation, leading to a profit. Attack Tx:
--
Token 2049 ę äø伦ęÆēēé¹ļ¼š„ BlockSecåØ @token2049 ęååŗåé¾ēē²¾å½©ļ¼ š ę¬¢čæåØę°å å”äøBlockSecēøčļ¼ #Token2049 #ę°å å” #BlockSec
--
Latest News
MicroStrategy's Trading Volume Surpasses Nvidia And Tesla In U.S. Stock Market
--
Japan To Implement Stimulus Package With Tax Reforms
--
Fed Governor Cook Discusses Potential Pause In Interest Rate Hikes
--
Deepfake Scams Target Cryptocurrency Users
--
Trump Nominates Matthew Whitaker As U.S. Ambassador To NATO
--
View More
Trending Articles
Dogecoin Forms A āNasty Triple Topā: Analyst Reveals Whatās Next
Crypto Breaking
šØ $ETH ETH/USDT ALERT: Enter NOW at 3,086.48 ā Decision Tim
Janni Olsson
7 Costly Mistakes in Crypto Trading and How to Prevent Them The cryptocurrency market is brimming w
Niela James
š MASSIVE XRP NEWS UPDATE - HOLDERS PLEASE WATCH THIS NOW!
Crypto Journey1
$BTC ęäøåč·å¤§å®¶ęéčæäŗļ¼ē°åØ大ēēēå¾å±é©ļ¼å¤§é„¼äø天äøäøŖę°é«ļ¼å±±åÆØåčäøåØļ¼å ę¬ä¹åē“§č·å¤§é„¼ēēēåø$DOGE
ęå ē
View More
Sitemap
Cookie Preferences
Platform T&Cs