Inicio
Notificación
Perfil
Artículos populares
Noticias
Historial de marcadores y "me gusta"
Historial
Centro de creador
Ajustes
GoPlusSecurity
--
Seguir
If your #DeFi project doesn’t use secure, pre-audited token contracts... are you even serious about safety?
Aviso legal: Se incluyen opiniones de terceros. Esto no representa una asesoría financiera. Puede haber contenido patrocinado.
Lee los TyC.
210
0
Conoce las noticias más recientes del sector
⚡️ Participa en los últimos debates del mundo cripto
💬 Interactúa con tus creadores favoritos
👍 Disfruta contenido de tu interés
Email/número de teléfono
Registrarse
Iniciar sesión
Creador relevante
GoPlusSecurity
@GoPlusSecurity
Seguir
Explora más de este creador
🚀 GoPlus SafeToken Locker now supports @Uniswap V4 Pool! 🚀 Experience next-level token locking with V4 Pool integration. Secure your project's future today! 🦄 Lock up Your V4 LP tokens Now:
--
Introducing GoPlus-MCP. The first AI-native security layer for Web3. Now natively callable from @AnthropicAI Claude, @deepseek_ai, and other LLM clients supporting MCP. A new way of thinking about Web3 security. Try it now at https://mcp.so/server/goplu
--
Introducing GoPlus-MCP. The first AI-native security layer for Web3. Now natively callable from @AnthropicAI Claude, @deepseek_ai, and other LLM clients supporting MCP. A new wa y of thinking about Web3 security. Try it now at https://mcp.so/server/gopl
--
🔍 Technical Report: Cork Protocol Exploit May 28th, 2025 | Loss: 3,761.87 ETH (~$12M) 📕Root Cause Analysis: 1️⃣ Market creation lacked permission restrictions, allowing custom parameters for RA, DS, and CT to be freely defined. 2️⃣ The market's RA, DS, and CT parameters lacked logical validation during definition. DS could be set as RA - which was exactly how the attacker exploited in this transaction. 📘Attacker Address: 0xea6f30e360192bae715599e15e2f765b49e4da98 📙Attack Contract: 0x9af3dce0813fd7428c47f57a39da2f6dd7c9bb09 📓Attack Process Analysis: The attacker created 3 types of tokens and 1 Liquidity Token 1️⃣ Hackers purchase 88 weETH8CT-2 from the existing market 2️⃣ Deposit PSM into the existing market to obtain DS and CT 0.004 wstETH => 0.004 wstETH8DS-2 + 0.004 wstETH8CT-2 3️⃣ Attacker creates market 4️⃣ Deposit LV into new market and add liquidity - 0.002 RA(weETH8DS-2) => 0.002 weETH!LV-3 - 0.001 RA(weETH8DS-2) => 0.001 wstETH5CT-3 + 0.001 wstETH5DS-3 - Liquidity: 0.001 RA(weETH8DS-2) + 0.001 wstETH5CT-3 5️⃣ Unlock to get 25 wstETH5DS-3 + 3761.25 wstETH5CT-3 📗Security Recommendations: GoPlus suggests users suspend all interactions with , revoke any previous authorizations, closely follow official announcements, and wait for further updates.
--
Introducing GoPlus-MCP. The first AI-native security layer for Web3. Natively integrated @AnthropicAI , @deepseek_ai , and more. Real-time protection. Seamless integration. Intelligent defense. A new way of thinking about blockchain safety. Try it now a
--
Lo más reciente
MegaETH Regains Control of X Account After Security Breach
--
Meta Shareholders Reject Proposal to Include Bitcoin in Treasury
--
Call for Stricter Penalties on SIM Card Fraud in Canada and EU
--
Silk Road Founder Receives Significant Bitcoin Donation
--
Web3 Industry Faces Regulatory and Market Developments in June
--
Ver más
Mapa del sitio
Cookie Preferences
Términos y condiciones de la plataforma