Scan to download
BTC $64,400.01 +0.24%
ETH $1,852.06 -0.18%
BNB $588.78 -0.62%
XRP $1.42 -4.56%
SOL $81.67 -4.53%
TRX $0.2795 -0.47%
DOGE $0.0974 -3.83%
ADA $0.2735 -4.22%
BCH $483.32 -5.12%
LINK $8.64 -2.97%
HYPE $28.98 -1.81%
AAVE $122.61 -3.42%
SUI $0.9138 -6.63%
XLM $0.1605 -4.62%
ZEC $260.31 -8.86%
BTC $64,400.01 +0.24%
ETH $1,852.06 -0.18%
BNB $588.78 -0.62%
XRP $1.42 -4.56%
SOL $81.67 -4.53%
TRX $0.2795 -0.47%
DOGE $0.0974 -3.83%
ADA $0.2735 -4.22%
BCH $483.32 -5.12%
LINK $8.64 -2.97%
HYPE $28.98 -1.81%
AAVE $122.61 -3.42%
SUI $0.9138 -6.63%
XLM $0.1605 -4.62%
ZEC $260.31 -8.86%

goplus

GoPlus: Polymarket Hacked, Flaws in Off-Chain and On-Chain Transaction Result Synchronization Mechanism

According to disclosures from the GoPlus Chinese community, the prediction market platform Polymarket was hacked due to a design flaw in the synchronization mechanism between off-chain and on-chain trading results in its order system.The attacker manipulated the nonce, causing on-chain matched trades to be canceled or invalidated before execution, while off-chain records remained valid, leading to API false reports that affected trading behaviors of bots like Negrisk, resulting in user losses. The analysis of the attack process is as follows:The attacker submitted/matched large reverse trades with the market-making bot on the Polymarket off-chain orderbook.The attacker constructed transactions with forged/repeated nonces or utilized on-chain nonce competition, causing the on-chain transactions to inevitably revert.The Polymarket API returned "transaction successful" to the bot before on-chain confirmation, leading the bot to believe that the position had been hedged, while the actual on-chain state had not changed.The attacker then executed real on-chain trades to take advantage of the direction exposed by the bot, thus profiting "risk-free."Since the revert occurred at the chain level, Polymarket fees would not explode, making the attack cost controllable and executable continuously.GoPlus recommends that users pause automated trading tools, verify on-chain trading statuses, enhance wallet security, and closely monitor official announcements from Polymarket.

GoPlus: Discover multiple x402 ecosystem projects with risks, including excessive authorization, signature replay, etc

According to official news, GoPlus Security Research Institute conducted a detailed security risk scan on more than 30 x402 projects and community-reported risk projects in Binance Wallet and OKX Wallet, discovering that the following projects have issues such as excessive authorization, signature replay, HonyPot (PiXiu token), and unlimited issuance risks.FLOCK (0x5ab3): The transfer ERC20 function allows the owner to withdraw any amount of any token from the contract. x420 (0x68e2): The cross chain Mint function can mint tokens without restriction. U402 (0xd2b3): The mint By Bond function allows unlimited minting of coins. MRDN (0xe57e): The withdraw Token function allows the owner to withdraw any amount of any token from the contract. PENG (0x4444ee, 0x444450, 0x444428): The manual Swap function allows the owner to withdraw ETH from the contract, and the transfer From function bypasses the allowance check for special accounts. x402 Token (0x40ff): The transfer From function bypasses the allowance check for special accounts. x402b (0xd8af5f): The manual Swap function allows the owner to withdraw ETH from the contract, and the transfer From function bypasses the allowance check for special accounts. x402MO (0x3c47df): The manual Swap function allows the owner to withdraw ETH from the contract, and the transfer From function bypasses the allowance check for special accounts.
app_icon
ChainCatcher Building the Web3 world with innovations.