当前位置:网站首页>NFT liquidity market security issues occur frequently - Analysis of the black incident of NFT trading platform quixotic
NFT liquidity market security issues occur frequently - Analysis of the black incident of NFT trading platform quixotic
2022-07-04 17:13:00 【SharkTeam】
7 month 1 Japan ,Optimism Ecological maximum NFT trading platform Quixotic There are loopholes in smart contracts , Hackers use this vulnerability to steal a large number of users' assets
In the near future NFT Liquidity market security problems occur frequently .SharkTeam The technical analysis of this event was carried out for the first time , And summarizes the means of safety precautions , I hope that the follow-up projects can take warning , Build a security defense line for the blockchain industry .
One 、 Event analysis
The attacker's address :0x0a0805082ea0fc8bfdcc6218a986efda6704efe5, Short for 0x0a08
Attack contract address :0xbe81eabdbd437cba43e4c1c330c63022772c2520, Short for 0xbe81
The attacked contract address :0x065e8a87b8f11aed6facf9447abe5e8c5d7502b6, Short for 0x065e
After the attacker creates the attack contract , A large number of attack transactions have been launched through attack contracts , Attacked many users , Stolen assets with WETH and Optimism (OP) Mainly . Take the first attack transaction as an example , The analysis is as follows :
txHash: 0xfdee36012cbeb26d37a857a4bb1937ce0b30379a25198735089c75cfd3ea799a
In this transaction , The attacker stole 0.0975 WETH, The functions and parameters called are as follows :
The transaction is addressed by the attacker 0x0a08 launch , Invoked the attacked contract 0x065e Medium fillSellOrder function , The parameter contractAddress Actual attack contract address 0xbe81.
fillSellOrder Function as follows :
validateSellerSignature Function as follows :
here _validateSellerSignature There are no verification parameters sellOrder Medium contractAddress, Therefore, the attacker passed in a custom contract address , Attack the contract address
_fillSellOrder Function as follows :
It's moving here NFT when , The parameter... Was called contractAddress Corresponding NFT Transfer function in contract , The user must be authorized before calling this function , Attackers can completely customize this function to extract all tokens authorized by the user to their own account , Include ERC721、ERC1155、ERC20 Etc . Here the attacker can only extract the token authorized by the user .
in summary , The root cause of this security incident lies in the loopholes in the contract itself , The over authorization of users gives hackers an opportunity .
Two 、 Safety suggestion
The root cause of this security incident is the lack of verification of address type parameters in the contract and the over authorization of users . therefore , We suggest that both the project party and users should improve their safety awareness , Try to avoid contract loopholes . Be careful when authorizing tokens , Try to minimize the type and number of authorized tokens .
3、 ... and 、 About us
SharkTeam Our vision is to fully protect Web3 The security of the world . The team members are located in Beijing 、 nanjing 、 Suzhou 、 Silicon valley , It is composed of experienced security professionals and senior researchers from all over the world , Proficient in the underlying theory of blockchain and smart contract , Provide services including smart contract audit 、 On chain analysis 、 Emergency response and other services . We have worked with key players in various fields of the blockchain ecosystem , Such as Huobi Global、OKC、polygon、Polkadot、imToken、ChainIDE And establish a long-term cooperative relationship .
Telegram:https://t.me/sharkteamorg
Twitter:https://twitter.com/sharkteamorg
Reddit:https://www.reddit.com/r/sharkteamorg
More blockchain security consulting and analysis , Click the link below to view
D Check | Chain risk verification https://m.chainaegis.com
边栏推荐
猜你喜欢
detectron2安装方法
一加10 Pro和iPhone 13怎么选?
~88 running people practice
Blood spitting finishing nanny level series tutorial - play Fiddler bag grabbing tutorial (2) - first meet fiddler, let you have a rational understanding
The winning rate against people is 84%, and deepmind AI has reached the level of human experts in army chess for the first time
电子元器件B2B商城系统开发:赋能企业构建进销存标准化流程实例
~89 deformation translation
NoSQL之readis配置与优化(终章)
Visual studio 2019 (localdb) mssqllocaldb SQL Server 2014 database version is 852 and cannot be opened. This server supports 782
整理混乱的头文件,我用include what you use
随机推荐
Maximum subarray and matrix multiplication
智慧物流園區供應鏈管理系統解决方案:數智化供應鏈賦能物流運輸行業供應鏈新模式
PingCode 性能测试之负载测试实践
Median and order statistics
科普达人丨一文看懂阿里云的秘密武器“神龙架构”
Can you really use MySQL explain?
MVC模式和三层架构
Is it safe for CITIC Securities to open an account online? Is the account opening fee charged
Understand asp Net core - Authentication Based on jwtbearer
[Acwing] 58周赛 4489. 最长子序列
Principle and general steps of SQL injection
Firebird experience summary
[acwing] 58 weeks 4489 Longest subsequence
China's plastic processing machinery market trend report, technological innovation and market forecast
Configuration instance of Oracle listener server and client
Inside and outside: flow chart drawing elementary: six common mistakes
[acwing] 58 weeks 4490 dyeing
Visual Studio 2019 (LocalDB)MSSQLLocalDB SQL Server 2014 数据库版本为852无法打开,此服务器支持782
世界环境日 | 周大福用心服务推动减碳环保
Blood spitting finishing nanny level series tutorial - play Fiddler bag grabbing tutorial (2) - first meet fiddler, let you have a rational understanding