The Vulnerability Smart contracts on Ethereum often have time-sensitive logic, whether it’s for auctions, lotteries, or token vesting. These time-sensitive…
-
-
Overview Short Address Attack is a vulnerability where attackers exploit the characteristic of address encoding algorithms to ignore the trailing…
-
Overview Time jacking exploits a theoretical vulnerability in Bitcoin timestamp handling. During a time-jacking attack, a hacker alters the network…
-
Introduction Arithmetic issues, specifically integer overflow and underflow, are common vulnerabilities in Solidity smart contracts. These issues occur when unsigned…
-
Smart Contract AuditWeb3 Security
Self-Destruct Exploit: Forced Ether Injection in Solidity Contracts
by ImmuneBytesIntroduction The selfdestruct function in Solidity provides a mechanism for contract termination and balance transfer, but it comes with inherent…
-
Introduction Bad randomness, often referred to as the “nothing is secret” attack, is a vulnerability in Solidity smart contracts deployed…
-
Introduction On Aug 18, DeFi @ExactlyProtocol, operating on Optimism, encountered a breach resulting in a loss of around $7.3M. A…
-
Crypto Hacks & ExploitsWeb3 Security
AVAX/USDC Joe LP NXUSD Market—Flash Loan Exploit—Sep 6, 2022—Detailed Analysis
by ImmuneBytesOverview On September 7, 2022, the Nereus protocol’s AVAX/USDC Joe LP NXUSD market was reported to be exploited, leading to…
-
Crypto Hacks & ExploitsWeb3 Security
DAO Maker Exploit—Sep 4, 2021- Detailed Analysis
by ImmuneBytesOn September 4, 2021, DAO Maker’s vesting contract was exploited, resulting in a significant loss of funds. This report provides…
-
Crypto Hacks & ExploitsWeb3 Security
Wintermute Crypto Exchange Hack – Sep 20, 2022 – Detailed Analysis
by ImmuneBytesExecutive Summary On Sep 20, 2022, the cryptocurrency market maker Wintermute experienced a significant security breach, resulting in approximately $160…