vulnerabilities
-
What to Enter for SC Mining Address (How to Mine SCDS Now)
What to enter for SC mining address? Many project teams have started giving mini
-
DeFi Project FilDA (ESC) Suffers Hack Attack: What We Know So Far
On April 23rd, the cross chain lending DeFi project FilDA (ESC) tweeted that the project had been attacked today, and the team had suspended ESC operations and was tracking hacker
-
Ethereum Client Prysm Releases Version 4.0.3 with Multiple Fixes
On April 21st, according to official Twitter, the Ethereum client Prysm has released version 4.0.3, which includes multiple important fixes. It is recommended that all users upgrad
-
Filecoin Launches $500,000 Bounty Program on Immunefi to Enhance Security
According to reports, Filecoin has launched a $500000 bounty program on Immunefi to help identify potential risks and issues that may exist in the code base after FVM is launched.
-
The SushiSwap Hack: Understanding the Recent ETH Losses
On April 9th, Twitter user Trust tweeted that they had just obtained 100ETH from Frog Nation\’s former CFO 0xSifu as a white hat hacker and planned to return these funds. Previously
-
Security team: Sentient loan agreement stolen $1 million on the Arbitrum network
On April 5th, according to PeckShield monitoring, Sentient, an unlicensed partial mortgage loan agreement, was stolen about $1 million on the Arbitrum network early this morning. T
-
THORChain Takes Decisive Action to Address Vulnerabilities
According to reports, THORChain, a decentralized cross chain transaction protocol, has officially stated that developers and security teams have determined that the report of poten
-
Gala Games to Sue pNetwork on Behalf of pGala Victims
On March 20th, the blockchain game platform Gala Games announced that it would sue pNetwork on behalf of pGala victims. Gala Games stated that due to its negligence, pNetwork cause
-
AI and Smart Contract Security
On March 15th, Yu Xianfa, the founder of Slow Fog, tweeted, “The smart contract codes of hyenas are generally simple, and I believe that GPT-4 can probably provide correct security advice. However, complex smart contract codes, especially those with human sophistry, and vulnerabilities that require other scenarios (or broader contexts), GPT-4 cannot handle them, but it can be used as an audit aid (if used well).” 。 In addition, AI can deceive people. “It seems that security audit companies can not only use GPT well in the future, but also audit whether GPT is’ doing evil ‘.” Founder of Slow Fog: GPT-4 cannot handle complex smart contract codes, but can be used as an audit aid Analysis based on this information:On March 15th, Yu Xianfa, the founder of Slow Fog, tweeted about the relationship between smart contracts and artificial intelligence (AI). Xianfa suggested that while AI, specifically GPT-4, may be able to provide correct security advice for simple smart contract…
-
CFTC Technical Advisory Committee to Review Technical Priorities in DeFi
It is reported that the Technical Advisory Committee of the United States Commodity Futures Trading Commission (CFTC) will discuss the issue of DeFi at its ope…
-
PeckShield Reports Massive Security Breaches and Cryptocurrency Thefts
According to reports, PeckShield, the security team, reported that more than 200 vulnerabilities were detected in February and stole US $35.3 million, of which…
-
Mango Markets Takes Preemptive Measures to Address Direct Security Threats
On February 24, Mango Markets, a loan and transaction agreement based on Solana, announced two new features before its v4 release, focusing on mitigating direc…
-
Zero-Day Vulnerability in Passwordless Login Method Could Pose Risks to Global Economy
It is reported that Dfns, a startup of encrypted wallets, said that there are serious vulnerabilities in the passwordless login method Magic Links used by more…