首頁
通知
個人檔案
熱門文章
新聞
書籤與點讚
創作者中心
設定
查看原文
LIVE
BlockSec
--
關注
Token 2049 無與倫比的熱鬧!🔥 BlockSec在 @token2049 感受區塊鏈的精彩!
👀 歡迎在新加坡與BlockSec相聚!
#Token2049 #新加坡 #BlockSec
免責聲明:包含來自第三方的見解。非財務建議。可能包含贊助內容。
請參閱條款。
1.3k
0
回覆
0
探索最新的加密貨幣新聞
⚡️ 參與加密貨幣領域的最新討論
💬 與您喜愛的創作者互動
👍 享受您感興趣的內容
電子郵件 / 電話號碼
註冊
登入
相關創作者
LIVE
BlockSec
@BlockSec
關注
創作者的更多內容
🚀BlockSec and OKX Explorer @OKXExplorer have launched a comprehensive partnership focusing on blockchain data interoperability, product integration, and API enhancements. https://blocksec.com/blog/block-sec-partners-with-okx-explorer-to-strengthen-on-chain-data-compliance
--
Enhanced security measures attract more users, increase TVL, and drive ecosystem prosperity, promoting wider adoption. YESSS! Security is CRUCIAL for the growth of L2! As a security company, BlockSec offers an effective solution for L2 networks with the Sequencer Threat Overwatch Program (S.T.O.P). Leveraging BlockSec Phalcon's @Phalcon_xyz excellent threat detection capabilities, S.T.O.P brings innovative security solutions to L2. Find out more here🔗 https://t.co/6FaQqgFH5L #BlockchainSecurity #L2Innovation #DevCon2024  
--
Our investigation on meme coin SHAR Pump and Dump on #Solana https://metasleuth.io/blog/pump-dump-shar-MetaSleuth
--
We have released our dataset on Web3 phishing website detection, containing 26,333 phishing URLs. Feel free to use the dataset for further research and development of better anti-phishing solutions. https://github.com/blocksecteam/TxPhishScope
--
.@OnyxDAO was attacked, resulting in a loss of nearly $4M. The root cause was unverified user input during the liquidation process. Specifically, key parameters of the liquidateWithSingleRepay function in the NFTLiquidation contract were controllable by the attacker, allowing manipulation of the extraRepayAmount variable through the repayAmount parameter. By exploiting this, the attacker was able to liquidate all collateral with just one token. The key attack steps are summarized as follows: 1. The attacker first deposited oETH and borrowed various assets to reach the liquidation threshold. Simultaneously, they created a new contract that, through a donation attack and precision loss (inherent from the Compound V2 fork), reduced the oETH exchange rate, making the attacker's position eligible for liquidation. 2. The attacker then performed the liquidation. Due to insufficient parameter validation, the attacker manipulated the extraRepayAmount variable, which was added to the calculation of how many tokens needed to be liquidated. This allowed the attacker to obtain more oETH through liquidation, leading to a profit. Attack Tx:
--
實時新聞
美国国会为过期项目提供5160亿美元资金
--
西太平洋银行预计澳洲联储明年5月开始降息
--
MSTR 未来几个月关键时间节点揭示
--
五人被控参与黑客团伙盗取1100万美元加密货币
--
ETH 突破 3,100 USDT,24 小时涨幅0.42%
--
查看更多
熱門文章
$BTC 这一波9万4甚至近9万5,山寨集体不明显跟涨表态,连狗狗都跟跌幅大于跟涨幅了,着实诡异,打破稳健的宁静了。山寨
LighthouseKeeper
雅虎的錯誤與谷歌的幸運
阿斗在这里
佈局這5個山寨幣將在山寨狂潮中暴漲100倍!
加密毒哥
BTC压根就没怎么动,从94800👇到93300一共也就下跌了1500点;很明显的主力左手倒右手,从哪里跌下来的又拉回
币圈大白兔
#MEME趋势风向 Pepe币惊天逆袭!未来一周价格预测暴涨221%! 告诉大家个事儿,之前的预测都挺准的PEPE
币途财富舟
查看更多
網站地圖
Cookie Preferences
平台條款