Zellic proudly announces the EVM trackooor, a modular tool for monitoring arbitrary actions on chain.
With the amount of data that blockchains contain, it’s difficult to query and process anything that isn’t indexed event fields.
This is why we built EVM trackooor 🧵👇
What is the EVM trackooor? The EVM trackooor is a framework for tracking any kind of data on a blockchain, including event logs, transactions, and blocks mined.
The EVM trackooor allows you to register what data you want from a blockchain and define what happens when you receive the data, such as processing it and recording it in a database or sending an alert through a webhook.
The EVM trackooor features the following:
- Real-time data monitoring, including event logs, transactions, and blocks mined
- The ability to request historical data, such as past events or transactions that occurred within a block range
- A modular approach to request and process data for any purpose
- Event and function-ABI fetching to automatically decode event logs and transaction calldata
Why did we make the EVM trackooor? Creating a new project every time you want to query and filter data is troublesome.
The EVM trackooor simplifies this process. By being a generic framework for querying and filtering data — all you need to do is tell it what data you’re looking for, and it provides the data directly to you
Let’s look at an example.
Let’s say there’s an address `0xcafe…` holding native ETH and some ERC-20 tokens, and you want to be alerted when it moves those funds.
With the EVM trackooor, all you need to do is provide the address you want to monitor and a callback function that the EVM trackooor will call with your requested data to process.
Then in the callback function, you can implement checking the value and sending alerts.
How has the EVM trackooor been used? We’ve already used the EVM trackooor to…
Monitor for potential exploits funded by Tornado Cash,
Graph funding paths to visualize movements of funds, including native ETH and ERC-20 tokens,
And listen for ownership transfers and proxy upgrades for high-value contracts.
The EVM trackooor is a command-line tool, and you can access it on GitHub. There, you can review its documentation with more info on usage, including how to use preexisting modules or create your own module: github.com/Zellic/EVM-tra…
For a more in-depth look at the EVM trackooor, including example code for a sample use case, check out the full announcement on our blog: zellic.io/blog/evm-track…
Also, go over to the January edition of the Zellic Security Roundup where we cover the latest news in Web3 security: newsletter.zellic.io/p/zellic-secur…
• • •
Missing some Tweet in this thread? You can try to
force a refresh
- approve; approving the victim account a large amount (why?)
- burnFrom; burning 0 from the victim (huh?)
- transferFrom; the exploiter is mysteriously able to transfer a large amount from the victim?
1/ Nomad was just hacked for $190M, making it the 5th largest DeFi hack of all time. How did this happen? We break down not just the exploit, but also HOW THE VULNERABILITY WAS INTRODUCED IN THE FIRST PLACE.
Understanding bugs isn't enough. We need to stop merging them.👇
2/ The hack a mess. Most hacks occur instantly. For Nomad, the bridge was slowly drained over the course of an hour.
This was the first exploit transaction.
It was simple: it interacted directly with the bridge, calling a single function, process().
3/ Looking at process(), this function is responsible for executing cross-chain messages. This function's security is absolutely critical. It is the linchpin of the entire bridge. Every message ends up here.
It must ensure that only valid messages are executed, and only once.