当前位置:网站首页>NFT liquidity market security issues occur frequently - Analysis of the black incident of NFT trading platform quixotic
NFT liquidity market security issues occur frequently - Analysis of the black incident of NFT trading platform quixotic
2022-07-04 17:13:00 【SharkTeam】
7 month 1 Japan ,Optimism Ecological maximum NFT trading platform Quixotic There are loopholes in smart contracts , Hackers use this vulnerability to steal a large number of users' assets
In the near future NFT Liquidity market security problems occur frequently .SharkTeam The technical analysis of this event was carried out for the first time , And summarizes the means of safety precautions , I hope that the follow-up projects can take warning , Build a security defense line for the blockchain industry .
One 、 Event analysis
The attacker's address :0x0a0805082ea0fc8bfdcc6218a986efda6704efe5, Short for 0x0a08
Attack contract address :0xbe81eabdbd437cba43e4c1c330c63022772c2520, Short for 0xbe81
The attacked contract address :0x065e8a87b8f11aed6facf9447abe5e8c5d7502b6, Short for 0x065e
After the attacker creates the attack contract , A large number of attack transactions have been launched through attack contracts , Attacked many users , Stolen assets with WETH and Optimism (OP) Mainly . Take the first attack transaction as an example , The analysis is as follows :
txHash: 0xfdee36012cbeb26d37a857a4bb1937ce0b30379a25198735089c75cfd3ea799a
In this transaction , The attacker stole 0.0975 WETH, The functions and parameters called are as follows :
The transaction is addressed by the attacker 0x0a08 launch , Invoked the attacked contract 0x065e Medium fillSellOrder function , The parameter contractAddress Actual attack contract address 0xbe81.
fillSellOrder Function as follows :
validateSellerSignature Function as follows :
here _validateSellerSignature There are no verification parameters sellOrder Medium contractAddress, Therefore, the attacker passed in a custom contract address , Attack the contract address
_fillSellOrder Function as follows :
It's moving here NFT when , The parameter... Was called contractAddress Corresponding NFT Transfer function in contract , The user must be authorized before calling this function , Attackers can completely customize this function to extract all tokens authorized by the user to their own account , Include ERC721、ERC1155、ERC20 Etc . Here the attacker can only extract the token authorized by the user .
in summary , The root cause of this security incident lies in the loopholes in the contract itself , The over authorization of users gives hackers an opportunity .
Two 、 Safety suggestion
The root cause of this security incident is the lack of verification of address type parameters in the contract and the over authorization of users . therefore , We suggest that both the project party and users should improve their safety awareness , Try to avoid contract loopholes . Be careful when authorizing tokens , Try to minimize the type and number of authorized tokens .
3、 ... and 、 About us
SharkTeam Our vision is to fully protect Web3 The security of the world . The team members are located in Beijing 、 nanjing 、 Suzhou 、 Silicon valley , It is composed of experienced security professionals and senior researchers from all over the world , Proficient in the underlying theory of blockchain and smart contract , Provide services including smart contract audit 、 On chain analysis 、 Emergency response and other services . We have worked with key players in various fields of the blockchain ecosystem , Such as Huobi Global、OKC、polygon、Polkadot、imToken、ChainIDE And establish a long-term cooperative relationship .
Telegram:https://t.me/sharkteamorg
Twitter:https://twitter.com/sharkteamorg
Reddit:https://www.reddit.com/r/sharkteamorg
More blockchain security consulting and analysis , Click the link below to view
D Check | Chain risk verification https://m.chainaegis.com
边栏推荐
- 安信证券网上开户安全吗 开户收费吗
- Two methods of MD5 encryption
- 2022年国内云管平台厂商哪家好?为什么?
- Research Report on market supply and demand and strategy of tetramethylpyrazine industry in China
- APOC自定义函数和过程
- Integration of ongdb graph database and spark
- Congratulations to Mr. Zhang Pengfei, chief data scientist of artefact, for winning the campaign Asia tech MVP 2022
- Research Report on market supply and demand and strategy of China's Sodium Tetraphenylborate (cas+143-66-8) industry
- Use and principle of thread pool
- World Environment Day | Chow Tai Fook serves wholeheartedly to promote carbon reduction and environmental protection
猜你喜欢
Difference between redis' memory obsolescence strategy and expiration deletion strategy
2022PMP考试基本情况详情了解
go-micro教程 — 第二章 go-micro v3 使用Gin、Etcd
C# 服务器日志模块
Can you really use MySQL explain?
第十八届IET交直流输电国际会议(ACDC2022)于线上成功举办
PingCode 性能测试之负载测试实践
51 single chip microcomputer temperature alarm based on WiFi control
Which domestic cloud management platform manufacturer is good in 2022? Why?
Chow Tai Fook fulfills the "centenary commitment" and sincerely serves to promote green environmental protection
随机推荐
新的职业已经出现,怎么能够停滞不前 ,人社部公布建筑新职业
System. Currenttimemillis() and system Nanotime (), which is faster? Don't use it wrong!
Is it safe to open an account online
[Acwing] 58周赛 4490. 染色
PingCode 性能测试之负载测试实践
World Environment Day | Chow Tai Fook serves wholeheartedly to promote carbon reduction and environmental protection
Yanwen logistics plans to be listed on Shenzhen Stock Exchange: it is mainly engaged in international express business, and its gross profit margin is far lower than the industry level
MD5加密的两种方式
整理混乱的头文件,我用include what you use
Research Report on market supply and demand and strategy of China's plastics and polymer industry
Research Report on plastic recycling machine industry - market status analysis and development prospect forecast
The test experience "tortured" by the PMP test is worth your review
对人胜率84%,DeepMind AI首次在西洋陆军棋中达到人类专家水平
ECCV 2022放榜了:1629篇论文中选,录用率不到20%
同构图与异构图CYPHER-TASK设计与TASK锁机制
Learn more about the basic situation of 2022pmp examination
Jump table instance
Is it safe for Bank of China Securities to open an account online?
APOC自定义函数和过程
Redis 的内存淘汰策略和过期删除策略的区别