publicqi Profile picture
Mar 5 1 tweets 3 min read Read on X
We @shoucccc @tonykebot found a critical vulnerability in time.fun last week and conducted a hack. The vulnerability allows hackers to steal all trading fees and modify metadata (e.g. change "toly's minute" to "vitalik's minute") of every tokens launched.

As the issue has been resolved, here is the full disclosure:

time.fun provides each new user with a dedicated wallet to deposit USDC for trading. User's private key is securely stored in a third party provider. But SOL is needed to cover gas fees and time.fun wants a seamless interaction for users, the wallet “HW2C...Lo1H” signs every trade transaction alongside the user’s wallet signature. Surprisingly, this same wallet also owns all tokens launched by time.fun. As it is one of the signers, we can act on behalf of “HW2C...Lo1H” if we can let the backend sign arbitrary data.

We discovered that by forging a token, it was possible to trick the backend into believing it was signing a legitimate transaction—letting us change metadata or withdraw all funds from “HW2C...Lo1H.” We reached out to the team (through buying 1 minute of their founder on time.fun) meanwhile did a whitehat hack. The team responded and fixed quickly and we returned all the funds.

All backends should never sign transactions coming from the frontend, regardless of how thorough the validation or simulation checks appear. These safeguards can be bypassed by obfuscating transactions or bundling/front-running transactions to alter their semantics.Image

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with publicqi

publicqi Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(