How to get URL link on X (Twitter) App
https://twitter.com/peckshield/status/16238880024298823692/ The hack is made possible due to the price manipulation of the @dForcenet wstETHCRV-gauge asset via reentrancy (via wstETHCRV.remove_liquidity), so that the exploiter can liquidate a number of positions w/ the wstETHCRV-guage as collateral.
https://twitter.com/peckshield/status/16211786623967887362/ The hack is made possible due to incomplete reentrancy protection: swapThroughOrionPool func allows user-provided swap path w/ crafted tokens whose transfer can be hijacked into re-entering depositAsset func to increase user balance accounting w/o actually costing funds!
https://twitter.com/peckshield/status/15855694778147799052/ The protocol has a flawed migrate() that is exploited to transfer real UniswapV2 liquidity to an attacker-controlled new V3 pair with skewed price, resulting in huge leftover as the refund for profit. Also, the authorized sender check is bypassed by locking any tokens.
https://twitter.com/OlympusDAO/status/1580629201744367619
https://twitter.com/peckshield/status/1503632734299701250
https://twitter.com/peckshield/status/15079243806590279732/ The hack is made possible due to missed reentrancy protection for the key functions of Revest. Moreover, the update of the next fnftId is not timely and then exploited to make profit in the reentrancy attack by modifying an existing NFT’s depositAmount.