How to get URL link on X (Twitter) App
2/ The hack is made possible due to a flawed impl in its MasterPlatypusV4 contract. Specifically, the emergencyWithdraw func incorrectly evaluates the insolvency before the collateral removal, resulting in an insolvent debt position of ~41.7M after the emergency withdrawal.
https://twitter.com/peckshield/status/16238880024298823692/ The hack is made possible due to the price manipulation of the @dForcenet wstETHCRV-gauge asset via reentrancy (via wstETHCRV.remove_liquidity), so that the exploiter can liquidate a number of positions w/ the wstETHCRV-guage as collateral.
https://twitter.com/peckshield/status/16211786623967887362/ The hack is made possible due to incomplete reentrancy protection: swapThroughOrionPool func allows user-provided swap path w/ crafted tokens whose transfer can be hijacked into re-entering depositAsset func to increase user balance accounting w/o actually costing funds!

Using the above tx as an example, with the manipulated #WALBT price, the malicious actor is able to mint >100M #BEUR.
https://twitter.com/peckshield/status/15855694778147799052/ The protocol has a flawed migrate() that is exploited to transfer real UniswapV2 liquidity to an attacker-controlled new V3 pair with skewed price, resulting in huge leftover as the refund for profit. Also, the authorized sender check is bypassed by locking any tokens.
https://twitter.com/OlympusDAO/status/1580629201744367619
2/ #KillSwitch is proposed with the observation that DeFi exploits/hacks pose a significant, serious threat to the security of our ecosystem. In particular, this year’s DeFi hacks have so far resulted in a whopping $2.1B loss, 25% increase from 2021 and 8 times more than 2020.
https://twitter.com/peckshield/status/1503632734299701250


https://twitter.com/peckshield/status/15079243806590279732/ The hack is made possible due to missed reentrancy protection for the key functions of Revest. Moreover, the update of the next fnftId is not timely and then exploited to make profit in the reentrancy attack by modifying an existing NFT’s depositAmount.
2/4 The hack is made possible due to the public exposure of a privileged function, which is then exploited to set the trustedForwarder and further hijack the owner privilege of @crosswisefi MasterChef
2/4 The hack is made possible due to a profit inflation bug, which was exploited to donate a large amount of $NOVAs so that a huge amount of $JAWS tokens can be minted as reward!
2/x The hack is made possible due to the relatively low pool liquidity so that the hacker can use flashloans to occupy the majority of pool share (to recover swap loss/fee) while still enjoy the sizable "swap fee reward” (increased from each huge swap).