The Ethereum Alarm Clock protocol allows users to plan future Ethereum transactions. Its transaction scheduling logic is implemented in smart contracts.
Peckshield, a blockchain security, and analytics company, disclosed the continuing hack earlier this morning.
The attacker begins the vulnerability by using a cancel() method on the Ethereum Alarm Clock contract with an unusually high transaction fee. The exploit happens in the next phase, when the transaction fee refund is computed incorrectly, resulting in a higher payout than planned.
As a result of the increased transaction charge, the exploiter receives a considerably larger ETH return. Under typical conditions, the user invoking the contract would get just a little more than their transaction charge.
DISCLAIMER: The Information on this website is provided as general market commentary and does not constitute investment advice. We encourage you to do your own research before investing.
Join us to keep track of news: https://linktr.ee/coincu
Website: coincu.com
Harold
CoinCu News
Bitfinex data leak allegedly by FSOCIETY includes 2.5TB of exchange data and 400K users' details.…
According to Parsec, Friend Tech v2's launch disappointed many, with 95% users unable to claim…
The legal debate over Ethereum classification intensifies as Consensys sues SEC for regulatory overreach.
Bitcoin ETF inflow witnessed a significant surge on May 3, signaling a potential shift in…
Friend.tech V2 was unveiled with the airdrop of FRIEND tokens and the Money Club feature.
Grayscale spot Bitcoin ETF sees its first daily increase since January, with a net inflow…
This website uses cookies.