A cross-chain bridge often monitors deposit events on one blockchain to transfer funds to the other.
If an attacker can generate a deposit event without making a real deposit or by depositing with a valueless token, they can withdraw value from bridge at other end.
Message Verification Bug:
Cross-chain bridges confirm the legitimacy of a deposit or withdrawal prior to beginning any transactions.
A missed signature validation is often all it takes for hackers to gain access to millions of dollars.
⬇️⬇️
Lack of cross-contract access control in blockchain bridges:
It is important to have access control validations on critical functions that execute actions like modifying the owner, transferring funds and tokens, pausing and unpausing the contracts, etc.
⬇️⬇️
Validator Takeover:
Some cross-chain bridges have a set of validators that vote whether or not to approve a particular transfer. If the attacker controls most of these validators, they can approve fake and malicious transfers.
⬇️⬇️
Admin Private Key Leak:
If the admin key of the smart contract is leaked, all the funds and operation of the smart contract will be at great risk. Recently, the Harmony bridge was exploited via the theft of two private keys.
➡️ Hackers immediately sent the freshly minted GALA to #PancakeSwap.
➡️ The attacker dumped a total of 10.72 billion $GALA and earned a total of 12,977 billion $BNB ($4.4 million) by draining the PancakeSwap pool to zero.
@pNetworkDeFi stated that a new pGALA token will be created to replace the old compromised one and will be airdropped to those who had pGALA before the pool was drained in the coming days.
It can steal any NFT that users listed on Opensea before May 2022 (i.e. before Seaport upgrades), primarily through the Wyvern protocol, which grants proxy contracts the ability to withdraw user NFTs.
Each company implied it would be the “first” to bring a zkEVM to market.
🔽MEGA...🧵👇
TL; DR
➚➚There are several applications for zero-knowledge proof in blockchain scaling and privacy since it can ensure computational integrity, accuracy, and privacy.
➚➚Both zk-SNARK and zk-STARK have advantages, but their combination offers more possibilities.