当前位置:网站首页>NFT liquidity market security issues occur frequently - Analysis of the black incident of NFT trading platform quixotic
NFT liquidity market security issues occur frequently - Analysis of the black incident of NFT trading platform quixotic
2022-07-04 17:13:00 【SharkTeam】
7 month 1 Japan ,Optimism Ecological maximum NFT trading platform Quixotic There are loopholes in smart contracts , Hackers use this vulnerability to steal a large number of users' assets

In the near future NFT Liquidity market security problems occur frequently .SharkTeam The technical analysis of this event was carried out for the first time , And summarizes the means of safety precautions , I hope that the follow-up projects can take warning , Build a security defense line for the blockchain industry .

One 、 Event analysis
The attacker's address :0x0a0805082ea0fc8bfdcc6218a986efda6704efe5, Short for 0x0a08
Attack contract address :0xbe81eabdbd437cba43e4c1c330c63022772c2520, Short for 0xbe81
The attacked contract address :0x065e8a87b8f11aed6facf9447abe5e8c5d7502b6, Short for 0x065e

After the attacker creates the attack contract , A large number of attack transactions have been launched through attack contracts , Attacked many users , Stolen assets with WETH and Optimism (OP) Mainly . Take the first attack transaction as an example , The analysis is as follows :
txHash: 0xfdee36012cbeb26d37a857a4bb1937ce0b30379a25198735089c75cfd3ea799a

In this transaction , The attacker stole 0.0975 WETH, The functions and parameters called are as follows :

The transaction is addressed by the attacker 0x0a08 launch , Invoked the attacked contract 0x065e Medium fillSellOrder function , The parameter contractAddress Actual attack contract address 0xbe81.
fillSellOrder Function as follows :

validateSellerSignature Function as follows :

here _validateSellerSignature There are no verification parameters sellOrder Medium contractAddress, Therefore, the attacker passed in a custom contract address , Attack the contract address
_fillSellOrder Function as follows :

It's moving here NFT when , The parameter... Was called contractAddress Corresponding NFT Transfer function in contract , The user must be authorized before calling this function , Attackers can completely customize this function to extract all tokens authorized by the user to their own account , Include ERC721、ERC1155、ERC20 Etc . Here the attacker can only extract the token authorized by the user .
in summary , The root cause of this security incident lies in the loopholes in the contract itself , The over authorization of users gives hackers an opportunity .
Two 、 Safety suggestion
The root cause of this security incident is the lack of verification of address type parameters in the contract and the over authorization of users . therefore , We suggest that both the project party and users should improve their safety awareness , Try to avoid contract loopholes . Be careful when authorizing tokens , Try to minimize the type and number of authorized tokens .
3、 ... and 、 About us
SharkTeam Our vision is to fully protect Web3 The security of the world . The team members are located in Beijing 、 nanjing 、 Suzhou 、 Silicon valley , It is composed of experienced security professionals and senior researchers from all over the world , Proficient in the underlying theory of blockchain and smart contract , Provide services including smart contract audit 、 On chain analysis 、 Emergency response and other services . We have worked with key players in various fields of the blockchain ecosystem , Such as Huobi Global、OKC、polygon、Polkadot、imToken、ChainIDE And establish a long-term cooperative relationship .
Telegram:https://t.me/sharkteamorg
Twitter:https://twitter.com/sharkteamorg
Reddit:https://www.reddit.com/r/sharkteamorg
More blockchain security consulting and analysis , Click the link below to view
D Check | Chain risk verification https://m.chainaegis.com
边栏推荐
- Years of training, towards Kata 3.0! Enter the safe container experience out of the box | dragon lizard Technology
- egg. JS learning notes
- Maximum subarray and matrix multiplication
- 一图看懂ThreadLocal
- Research Report on market supply and demand and strategy of China's Sodium Tetraphenylborate (cas+143-66-8) industry
- 【云原生】服务网格是什么“格”?
- Median and order statistics
- Firebird experience summary
- ~89 deformation translation
- Solution of commercial supply chain coordination system in the mineral industry: build a digital intelligent supply chain platform to ensure the safe supply of mineral resources
猜你喜欢

Understand ThreadLocal in one picture

嵌入式软件架构设计-函数调用

detectron2安装方法

一图看懂ThreadLocal

建筑建材行业经销商协同系统解决方案:赋能企业构建核心竞争力

Understand asp Net core - Authentication Based on jwtbearer

照明行业S2B2B解决方案:高效赋能产业供应链,提升企业经济效益

"Cannot initialize Photoshop because the temporary storage disk is full" graphic solution

PingCode 性能测试之负载测试实践

智慧物流園區供應鏈管理系統解决方案:數智化供應鏈賦能物流運輸行業供應鏈新模式
随机推荐
Redis 的内存淘汰策略和过期删除策略的区别
基于wifi控制的51单片机温度报警器
第十八届IET交直流输电国际会议(ACDC2022)于线上成功举办
C# 服务器日志模块
Understand ThreadLocal in one picture
Sequence diagram data modeling and industrial chain analysis
整理混乱的头文件,我用include what you use
线程池的使用和原理
APOC custom functions and procedures
Array filter fliter in JS
2022年国内云管平台厂商哪家好?为什么?
How to contribute to the source code of ongdb core project
力扣今日题-1200. 最小绝对差
Oracle监听器Server端与Client端配置实例
智慧物流园区供应链管理系统解决方案:数智化供应链赋能物流运输行业供应链新模式
昆明三环闭合工程将经过这些地方,有在你家附近的吗?
How to decrypt worksheet protection password in Excel file
~88 running people practice
矿产行业商业供应链协同系统解决方案:构建数智化供应链平台,保障矿产资源安全供应
Position encoding practice in transformer