Binance Square
PvP
9,688 megtekintés
5 Bejegyzések
Népszerű
Legfrissebb
LIVE
LIVE
kaymyg
--
Bikajellegű
Xpet Devs on X We will NOT MINT any #BPET tokens to cover the exploit consequences. Instead, all #BPET tokens used to mitigate the consequences will be repurchased from open market using the project funds and returned back to #PvP contract in full amount. $ARB
Xpet Devs on X

We will NOT MINT any #BPET tokens to cover the exploit consequences. Instead, all #BPET tokens used to mitigate the consequences will be repurchased from open market using the project funds and returned back to #PvP contract in full amount.
$ARB
LIVE
kaymyg
--
Bikajellegű
A newly-launched #PvP feature has encountered an exploit resulting in the theft of 91.5 #ETH (~$254K). The exploit involved the withdrawal of #BPET tokens from an on-chain PvP contract. The perpetrator's address on #Arbitrum is 0x22518a5c1f3e29b01d8b04145953ce20d3c99f31. The stolen funds are stored at 0x0671E3357655AaCe65fCBe323293A6760579B6e1 on the #Ethereum mainnet. The platform seeks assistance from renowned exploit investigators such as @zachxbt and @RektHQ to trace the exploiter. Specific wallet addresses associated with the exploit are provided, and a detailed post-mortem report explains the incident. The project assures that ongoing PvP and operational aspects remain unaffected. Efforts are underway to collaborate with third parties to identify the exploiter's real-life identity. The stolen funds' current status can be tracked through provided transaction details.

https://etherscan.io/address/0x0671e3357655aace65fcbe323293a6760579b6e1

@Michaeltalkhere on X
LIVE
--
Bikajellegű
A newly-launched #PvP feature has encountered an exploit resulting in the theft of 91.5 #ETH (~$254K). The exploit involved the withdrawal of #BPET tokens from an on-chain PvP contract. The perpetrator's address on #Arbitrum is 0x22518a5c1f3e29b01d8b04145953ce20d3c99f31. The stolen funds are stored at 0x0671E3357655AaCe65fCBe323293A6760579B6e1 on the #Ethereum mainnet. The platform seeks assistance from renowned exploit investigators such as @zachxbt and @RektHQ to trace the exploiter. Specific wallet addresses associated with the exploit are provided, and a detailed post-mortem report explains the incident. The project assures that ongoing PvP and operational aspects remain unaffected. Efforts are underway to collaborate with third parties to identify the exploiter's real-life identity. The stolen funds' current status can be tracked through provided transaction details. https://etherscan.io/address/0x0671e3357655aace65fcbe323293a6760579b6e1 @Michaeltalkhere on X
A newly-launched #PvP feature has encountered an exploit resulting in the theft of 91.5 #ETH (~$254K). The exploit involved the withdrawal of #BPET tokens from an on-chain PvP contract. The perpetrator's address on #Arbitrum is 0x22518a5c1f3e29b01d8b04145953ce20d3c99f31. The stolen funds are stored at 0x0671E3357655AaCe65fCBe323293A6760579B6e1 on the #Ethereum mainnet. The platform seeks assistance from renowned exploit investigators such as @zachxbt and @RektHQ to trace the exploiter. Specific wallet addresses associated with the exploit are provided, and a detailed post-mortem report explains the incident. The project assures that ongoing PvP and operational aspects remain unaffected. Efforts are underway to collaborate with third parties to identify the exploiter's real-life identity. The stolen funds' current status can be tracked through provided transaction details.

https://etherscan.io/address/0x0671e3357655aace65fcbe323293a6760579b6e1

@Michaeltalkhere on X
LIVE
--
Bikajellegű
Via @Michaeltalkhere ($BPET dev team lead ) on X regarding the #PvP contract #exploit As announced, I would like to disclose the details of the exploit and how did we get the money back. Firsly, the reason of the exploit was there was a bug in ‘request swap from #POTION to #BPET ’ functionality that makes the exploiter be able to withdraw excessive amounts of $BPET tokens from the PvP contract after staking their own tokens. Below are some noticeable withdrawing transactions the exploiter made. (https://arbiscan.io/tx/0x058b8808e721f68c01c62ad70687f38f39d749bfc9d0e8f6be839c3af603dec6) (https://arbiscan.io/tx/0x1ad1f7536e2d91cc5aeef6e29f948ee73fa760a482b0455ca78adade83c4ef53) (https://arbiscan.io/tx/0x500713e7c025d5ab71e2446069a46a60009ef8060d2537bc4b29296c6f76f9d7) Right after becoming fully aware of the exploit, we did 2 things - Checked out to see if the exploiter’s addresses can be mapped with any Twitter profiles of any xPet users (and we found the user mapping with one of the exploiter addresses) - Reached out to all partners in our network who can pour in the helps. They were explorer sites, centralized exchanges, privacy mixers, offramp tools, and security firms. To be specific, #Etherscan team helped us to tag all 4 addresses related to the exploiter on Ethereum on Arbiscan as ‘xPet exploiter’. Thanks for that, the exploiter addresses were visibly exposed to and closely-watched by the public. All the centralized exchange, privacy mixer, and offramp tool teams helped to take close notice In case any of the exploiting address would have interactions with centralized exchange Hot wallets, privacy mixer contracts, or offramp tool depositing addresses. The security firms has helped us follow all, even smallest, onchain traces from the exploiter In short, we had the combined efforts from multiple parties to closely monitoring the exploiter's movements and ensure that exploiter doesn’t have any chance to get the stolen funds mixed or obscured.
Via @Michaeltalkhere ($BPET dev team lead ) on X regarding the #PvP contract #exploit

As announced, I would like to disclose the details of the exploit and how did we get the money back.
Firsly, the reason of the exploit was there was a bug in ‘request swap from #POTION to #BPET ’ functionality that makes the exploiter be able to withdraw excessive amounts of $BPET tokens from the PvP contract after staking their own tokens.
Below are some noticeable withdrawing transactions the exploiter made.
(https://arbiscan.io/tx/0x058b8808e721f68c01c62ad70687f38f39d749bfc9d0e8f6be839c3af603dec6)
(https://arbiscan.io/tx/0x1ad1f7536e2d91cc5aeef6e29f948ee73fa760a482b0455ca78adade83c4ef53)
(https://arbiscan.io/tx/0x500713e7c025d5ab71e2446069a46a60009ef8060d2537bc4b29296c6f76f9d7)

Right after becoming fully aware of the exploit, we did 2 things

- Checked out to see if the exploiter’s addresses can be mapped with any Twitter profiles of any xPet users (and we found the user mapping with one of the exploiter addresses)

- Reached out to all partners in our network who can pour in the helps. They were explorer sites, centralized exchanges, privacy mixers, offramp tools, and security firms.

To be specific, #Etherscan team helped us to tag all 4 addresses related to the exploiter on Ethereum on Arbiscan as ‘xPet exploiter’. Thanks for that, the exploiter addresses were visibly exposed to and closely-watched by the public. All the centralized exchange, privacy mixer, and offramp tool teams helped to take close notice In case any of the exploiting address would have interactions with centralized exchange Hot wallets, privacy mixer contracts, or offramp tool depositing addresses. The security firms has helped us follow all, even smallest, onchain traces from the exploiter

In short, we had the combined efforts from multiple parties to closely monitoring the exploiter's movements and ensure that exploiter doesn’t have any chance to get the stolen funds mixed or obscured.
🔥🔥🔥 #metalcore launches Barony guild system to enhance #PvP experience Blockchain-based game MetalCore has introduced a new guild program called the Barony system, as announced by Studio 369, the developers of the game. This system allows players to form self-governed factions, known as Baronies, which enhance their gameplay through accelerated progression, resource sharing, and recruitment opportunities. Members of these Baronies can collaborate to dominate large-scale PvP faction wars. Each Barony includes a comprehensive hierarchy of roles, from the supreme Baron leader to Ministers, Knights, Initiates, and more. Higher-tier "Premium Baronies" receive additional privileges, such as exclusive in-game events. Several prominent gaming guilds, including Yield Guild Games, Merit Circle, W3GG, Perion, Ancient8 Gaming, and Avocado #DAO , are already establishing Baronies. These guilds, which collectively have over 100 million #gamers , are poised to take advantage of early unlocking benefits at launch. Studio 369 plans to roll out the Barony system in #Q3 2024, ahead of MetalCore’s full release on PC and the Epic Games Store. Source - cryptobriefing.com
🔥🔥🔥 #metalcore launches Barony guild system to enhance #PvP experience

Blockchain-based game MetalCore has introduced a new guild program called the Barony system, as announced by Studio 369, the developers of the game. This system allows players to form self-governed factions, known as Baronies, which enhance their gameplay through accelerated progression, resource sharing, and recruitment opportunities. Members of these Baronies can collaborate to dominate large-scale PvP faction wars.

Each Barony includes a comprehensive hierarchy of roles, from the supreme Baron leader to Ministers, Knights, Initiates, and more. Higher-tier "Premium Baronies" receive additional privileges, such as exclusive in-game events.

Several prominent gaming guilds, including Yield Guild Games, Merit Circle, W3GG, Perion, Ancient8 Gaming, and Avocado #DAO , are already establishing Baronies. These guilds, which collectively have over 100 million #gamers , are poised to take advantage of early unlocking benefits at launch.

Studio 369 plans to roll out the Barony system in #Q3 2024, ahead of MetalCore’s full release on PC and the Epic Games Store.

Source - cryptobriefing.com
Fedezd fel a legfrissebb kriptovaluta híreket
⚡️ Vegyél részt a legfrissebb kriptovaluta megbeszéléseken
💬 Lépj kapcsolatba a kedvenc alkotóiddal
👍 Élvezd a téged érdeklő tartalmakat
E-mail-cím/telefonszám