The xFORCE vault is a xSUSHI contract fork. The implementation used assumes tokens revert the transaction on failure. github.com/ForceDAO/contr…
11/
ANALYSIS (2/3)
The token used by Force DAO is an Aragon Minime token that returns a false bool if “transferFrom” fails (instead of reverting). github.com/aragon/minime/…
12/
ANALYSIS (3/3)
The exploiters were able to deposit FORCE tokens that would fail the transferFrom call and receive xFORCE tokens, as the xFORCE contract expects a revert from the token but instead receives false.
And then withdraw these newly minted xFORCE tokens for the ..
13/
remaining FORCE tokens in the vault, and liquidate them for ETH on exchanges.
This could’ve been prevented by using a standard Open Zeppelin ERC-20 or adding a safeTransferFrom wrapper in the xSUSHI contract.
14/
WHO WAS AFFECTED?
Force, xForce, and Force/ETH LPs on UniSwap and SushiSwap were affected.
- - - - - - - - - - - - - - --
*ForceDAO strategy, vault and reward pool contracts were not affected.
15/
NEXT STEPS
We’re currently engaged with 2 separate security firms to review and analyze our repos to ensure all contract systems perform as designed.
Over the coming days, our team will announce a plan to re-launch xFORCE — with a snapshot and new token. We continue to...
16/
investigate the event with the relevant authorities as some of the addresses originated from FTX and Binance.
This incident will only make us stronger, as a team of builders and a community. And we look forward to sharing the new products we've been working on.
Thanks
• • •
Missing some Tweet in this thread? You can try to
force a refresh