របៀបដែលពិធីការ DeFi ទាំងពីរនេះបានធ្លាក់ចូលទៅក្នុង 11 លានដុល្លារ 'ការវាយប្រហារឡើងវិញ'

On 15 March, an attacker ស៊ីផុន over $11 million from two Defy វេទិកា, agave និង ហិរញ្ញវត្ថុរាប់រយ. It appeared to be a flash loan ‘reentrancy attack’ on both protocols on the ខ្សែសង្វាក់ Gnosis as per investigation. Likewise, the platforms halted their contracts to forestall further damage.

ការវាយតម្លៃការខូចខាត 

Solidity developer and creator of an NFT liquidity protocol app, Shegen chose to highlight the hack in a series of tweets on 16 March. Surprisingly, this analysis came after the aforementioned entity lost $225,000 in the same exploit.

Her preliminary investigations revealed the attack worked by exploiting a wETH contract function on Gnosis Chain. It allowed the attacker to continue borrowing crypto before the apps could calculate the debt, which would prevent further borrowing. Ergo, the culprit carried the said exploit by borrowing against the same collateral they posted until the funds drained from the protocols.

To make things worse, the funds weren’t safe. ‘They are pretty much gone forever, but there is still hope,’ she បានបន្ថែម. That said, the founder of Gnosis, Martin Koppelmann did tweet to bring in some certainity amidst the chaos. Koppelmann asserted,

After some further research, the attacker allegedly deployed this contract with 3 functions; In blocks 21120283 and 21120284, the hacker used the contract to interact with the affected protocol, Agave directly. The smart contract on Agave was essentially the same as Aave, which secured $18.4B.

As there was no reported exploit in អេវ, how could Agave be drained? Well, here’s a សេចក្តី​សង្ខេប of how it was used in an unsafe way “unintentionally”.

The said hacker was able to borrow more than their collateral in agave. Thereby, walking away with all borrowable assets.

ប្រភព: Twitter

The borrowed assets comprised of 2,728.9 WETH, 243,423 USDC, 24,563 LINK, 16.76 WBTC, 8,400 GNO, and 347,787 WXDAI. Overall, the hacker made off with approximately $11 million.

Nonetheless, Shegen did not blame the Agave developers for failing to prevent the attack. She said, the developers ran a secure and safe AAVE-based code. Although ដែលប្រើ with unsafe tokens, in an unsafe way.

“All DeFi protocols on GC should swap out existing bridged tokens for new ones,” she concluded.

Blockchain security researcher មីតទិតហ្គីតា បានរំលឹកឡើងវិញ a similar cause behind the exploit.

Source: https://ambcrypto.com/how-these-two-defi-protocols-fell-prey-to-11-million-reentrancy-attack/