Opyn Hacks: Root Cause Analysis

Summary

Details

Figure 1: exercise() Loops a List of Given Vaults
Figure 2: Re-using the ETH Sent into the Contract to Retrieve Collateral
Figure 3: Exploit Transaction

Mitigation

About Us

--

--

--

A Blockchain Security Company (https://peckshield.com)

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

{UPDATE} USA Cargo Truck Simulator Hack Free Resources Generator

Life Hack: Everyone Can Use VPNs

RSA Wins: Election Security, & The Utter Lack Thereof

Hacked Dutch Government Website. All I got was this l̶o̶u̶s̶y̶ cool T-Shirt.

How to Create a Vox File for Cryptovoxels

[BugHunt] Authenticated RCE found in HorizontCMS — Part 2 (PHP Filetype Bypass)

6 Online Password Safety Tips to Teach Your Kids

Survive yourself — Digital inheritance

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
PeckShield

PeckShield

A Blockchain Security Company (https://peckshield.com)

More from Medium

Cropper is Using Socean Streams

The First Bond Voucher Financing in DeFi: Strips & Solv

0bOptions Integrates Chainlink Keepers to Decentralize the Automation of Its Prediction Market

01 Exchange lists NEAR-PERP, up to 20x Leverage