Inicio
Notificación
Perfil
Artículos populares
Noticias
Historial de marcadores y "me gusta"
Centro de creador
Ajustes
Ver original
LIVE
BlockSec
--
Seguir
Nuestra investigación sobre el aumento y la caída de la moneda meme SHAR en #Solana
https://metasleuth.io/blog/pump-dump-shar-MetaSleuth
Aviso legal: Se incluyen opiniones de terceros. Esto no representa una asesoría financiera. Puede haber contenido patrocinado.
Lee los TyC.
SOL
254,81
+1.90%
310
0
Respuestas
0
Conoce las noticias más recientes del sector
⚡️ Participa en los últimos debates del mundo cripto
💬 Interactúa con tus creadores favoritos
👍 Disfruta contenido de tu interés
Email/número de teléfono
Registrarse
Iniciar sesión
Creador relevante
LIVE
BlockSec
@BlockSec
Seguir
Explora más de este creador
🚀BlockSec and OKX Explorer @OKXExplorer have launched a comprehensive partnership focusing on blockchain data interoperability, product integration, and API enhancements. https://blocksec.com/blog/block-sec-partners-with-okx-explorer-to-strengthen-on-chain-data-compliance
--
Enhanced security measures attract more users, increase TVL, and drive ecosystem prosperity, promoting wider adoption. YESSS! Security is CRUCIAL for the growth of L2! As a security company, BlockSec offers an effective solution for L2 networks with the Sequencer Threat Overwatch Program (S.T.O.P). Leveraging BlockSec Phalcon's @Phalcon_xyz excellent threat detection capabilities, S.T.O.P brings innovative security solutions to L2. Find out more here🔗 https://t.co/6FaQqgFH5L #BlockchainSecurity #L2Innovation #DevCon2024  
--
We have released our dataset on Web3 phishing website detection, containing 26,333 phishing URLs. Feel free to use the dataset for further research and development of better anti-phishing solutions. https://github.com/blocksecteam/TxPhishScope
--
.@OnyxDAO was attacked, resulting in a loss of nearly $4M. The root cause was unverified user input during the liquidation process. Specifically, key parameters of the liquidateWithSingleRepay function in the NFTLiquidation contract were controllable by the attacker, allowing manipulation of the extraRepayAmount variable through the repayAmount parameter. By exploiting this, the attacker was able to liquidate all collateral with just one token. The key attack steps are summarized as follows: 1. The attacker first deposited oETH and borrowed various assets to reach the liquidation threshold. Simultaneously, they created a new contract that, through a donation attack and precision loss (inherent from the Compound V2 fork), reduced the oETH exchange rate, making the attacker's position eligible for liquidation. 2. The attacker then performed the liquidation. Due to insufficient parameter validation, the attacker manipulated the extraRepayAmount variable, which was added to the calculation of how many tokens needed to be liquidated. This allowed the attacker to obtain more oETH through liquidation, leading to a profit. Attack Tx:
--
Token 2049 无与伦比的热闹!🔥 BlockSec在 @token2049 感受区块链的精彩! 👀 欢迎在新加坡与BlockSec相聚! #Token2049 #新加坡 #BlockSec
--
Lo más reciente
Un posible cambio de liderazgo en la SEC despierta el interés en la industria de las criptomonedas
--
CBOE lanzará opciones de Bitcoin liquidadas en efectivo en diciembre
--
Las expectativas de inflación de noviembre en EE.UU. muestran resultados mixtos
--
La Asociación Blockchain insta al gobierno de EE. UU. a priorizar la regulación de las criptomonedas
--
Polymarket suspende el acceso a los usuarios franceses en medio de una investigación por incumplimiento
--
Ver más
Mapa del sitio
Cookie Preferences
Términos y condiciones de la plataforma