Platypus attack exploited incorrect ordering of code, auditor claims

Platypus attack exploited incorrect ordering of code, auditor claims

Disclaimer: The article has been updated to reflect that Omniscia did not audit a version of the MasterPlatypusV4 contract. Instead, the company audited a version of the MasterPlatypusV1 contract from Nov. 21 to Dec. 5, 2021.

The $8 million Platypus flash loan attack was made possible because of code that was in the wrong order, according to a post-mortem report from Platypus auditor Omniscia. The auditing company claims the problematic code didn’t exist in the version they audited.

According to the report, the Platypus MasterPlatypusV4 contract “contained a fatal misconception in its emergencyWithdraw mechanism,” which made it perform “its solvency check before updating the LP tokens associated with the stake position.”

The report emphasized that the code for the emergencyWithdraw function had all of the necessary elements to prevent an attack, but these elements were simply written in the wrong order, as Omniscia explained:

“The issue could have been prevented by re-ordering the MasterPlatypusV4::emergencyWithdraw statements and performing the solvency check after the user’s amount entry has been set to 0 which would have prohibited the attack from taking place.”

Omniscia audited a version of the MasterPlatypusV1 contract from Nov. 21 to Dec. 5, 2021. However, this version “contained no integration points with an external platypusTreasure system” and therefore did not contain the misordered lines of code.

It is important to note that the code that was exploited did not exist at the time of Omniscia’s audit. Omniscia’s point of view implies that the developers must have deployed a new version of the contract at some point after the audit was made.

関連する Raydium announces details of hack, proposes compensation for victims

The auditor claims that the contract implementation at Avalanche C-Chain address 0xc007f27b757a782c833c568f5851ae1dfe0e6ec7 is the one that was exploited. Lines 582–584 of this contract appear to call a function called “isSolvent” on the PlatypusTreasure contract, and lines 599–601 appear to set the user’s amount, factor and rewardDebt to zero. However, these amounts are set to zero after the “isSolvent” function has already been called.

The Platypus team confirmed on Feb. 16 that the attacker exploited a “flaw in [the] USP solvency check mechanism,” but the team did not initially provide further detail. This new report from the auditor sheds further light on how the attacker may have been able to accomplish the exploit.

The Platypus team announced on Feb. 16 that the attack had occurred. It has attempted to contact the hacker and get the funds returned in exchange for a bug bounty. The attacker used flashed loans to perform the exploit, which is similar to the strategy used in the Defrost Finance exploit on Dec. 25, 2022.

今すぐBNBの財布にエニックスを入れて、次の数ヶ月で驚異的な成長の恩恵を受けましょう。

エニック・イニシャル・コイン・オファーに今すぐ参加する
大きな収益を上げることができます。
よくよく考えてみると

は、携帯電話やタブレットで操作しているのでしょうか?

以下のアドレスをコピーするか、暗号ウォレットにスキャンして、このアドレスにENICに変換したいBNBを送信してください。

0x5c887F4518a95CdAfFe4E4B3AFDA00C2BB2BcD69

または、お使いの暗号ウォレットアプリケーションで、すぐに以下のQRコードをスキャンしてください。

送信されたBNBは即座にENICに変換され、数秒後にあなたのウォレットに届きます。

はデスクトップで操作しているのでしょうか?

(MetamaskまたはTrustwallet拡張機能を持つChromeブラウザを推奨)

以下のアドレスをコピーするか、暗号ウォレット拡張機能にスキャンして、このアドレスにENICに変換したいBNBを送信してください。

0x5c887F4518a95CdAfFe4E4B3AFDA00C2BB2BcD69

送信されたBNBは即座にENICに変換され、数秒後にあなたのウォレットに届きます。

オア

私たちの社会

のホルダーがあります。
せかいかくち

今すぐTelegramチャンネルに参加して、Enicの成長を実感してください。

0
参加した人
0 +
アイコスケジューラー
0
エネルギー
納入業者
ja日本語