CertiK: The Rebalancer contract on the Base chain was attacked by a reentrancy attack, resulting in a loss of more than $500,000
On December 10th, CertiK's alarm system detected a vulnerability exploit attack on the Rebalancer contract on the Base chain. The attacker profited 133.7 ETH, equivalent to approximately $501,000 USD, through a reentrancy vulnerability. Analysis shows that the root cause of the vulnerability is that the open() function of the contract allows for the input of any pool.strategy contract address. The attacker exploited this feature to input the attack contract and, when calling the burn function, performed a reentrancy operation, thereby obtaining an additional 50% of ETH.
Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.
You may also like
Elon Musk slams SEC as ‘broken’ over ‘artificially’ created $150 million Twitter stock windfall
SEC claims Musk's delayed Twitter disclosure saved him $150 million and hurt retail investors.
MicroStrategy's preferred MSTR issuance seeks 'returns and volatility' at 1.5x bitcoin, Saylor says
MicroStrategy Executive Chairman Michael Saylor spoke Jan. 13 at a Benchmark-hosted investor meeting in Orlando.The company plans to raise up to $2 billion in the first quarter of 2025 by issuing perpetual preferred stock.
Cardano poised for historic growth in 2025 driven by US political scenario
Stocks and S&P 500 Rally Boosted by Positive CPI Data