Wu said that CertiK issued an alert that it detected an attack that was suspected of exploiting a vulnerability in the contract of the flash loan and NFT marketplace. The attacker initiates an operation through a 0-fee flash loan, and exploits the deleGate.iocall and quotation logic vulnerabilities (makeOffer and acceptOffer) in the NFT marketplace to return the flash loan after the abnormal transfer of assets, completing a “traceless exit”. At present, there has been no direct financial loss, but it is recommended that projects that use the deleGate.iocall quotation logic immediately review the permission control and parameter verification mechanism.
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
CertiK Monitoring: NFT market suspected of being attacked by Flash Loans contracts, with logic vulnerabilities in makeOffer and acceptOffer.
Wu said that CertiK issued an alert that it detected an attack that was suspected of exploiting a vulnerability in the contract of the flash loan and NFT marketplace. The attacker initiates an operation through a 0-fee flash loan, and exploits the deleGate.iocall and quotation logic vulnerabilities (makeOffer and acceptOffer) in the NFT marketplace to return the flash loan after the abnormal transfer of assets, completing a “traceless exit”. At present, there has been no direct financial loss, but it is recommended that projects that use the deleGate.iocall quotation logic immediately review the permission control and parameter verification mechanism.