Opyn Hacks: Root Cause Analysis

Summary

Details

Figure 1: exercise() Loops a List of Given Vaults
Figure 2: Re-using the ETH Sent into the Contract to Retrieve Collateral
Figure 3: Exploit Transaction

Mitigation

About Us

--

--

--

A Blockchain Security Company (https://peckshield.com)

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

COVID-19 and Cyber Attacks:- The Basic Protection Advices and Practices

Working on the Go? How to Be Wi-Fi Aware.

{UPDATE} Treasure Hack Free Resources Generator

How I Played My first Capture the Flag Event.

PlatON Bi-Weekly Report, 11.1–15, 2020

Announcing the 100 veDOUGH holders ZSU 🧟 NFT Winners

Thinking to purchase a hotbit listed coin?!

Data archival solutions with cloud replication

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
PeckShield

PeckShield

A Blockchain Security Company (https://peckshield.com)

More from Medium

Security Partnership: YOP partners with BTblock

Cryptopoly.pro partners with Polygon Studios🎮

Curious case of Lido Finance

Avaxscape x Avax Research AMA