Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feat: add Wintermute attack #3

Open
nine-december opened this issue Nov 18, 2022 · 2 comments
Open

Feat: add Wintermute attack #3

nine-december opened this issue Nov 18, 2022 · 2 comments
Labels
to-reproduce Attacks pending to be reproduced waiting-for-foundry-feature

Comments

@nine-december
Copy link
Collaborator

On Sept 20, 2022 an attacker stole 160MM USD in OP tokens from Wintermute.

Attack Overview
Total Lost: 160MM USD (20 MM OP)

Key Info Sources
Writeup: https://rekt.news/wintermute-rekt-2/
Reproduction: https://github.com/SunWeb3Sec/DeFiHackLabs#20220608-optimism---wintermute

Principle: Business Logic - Vanity Address Generator Vuln?

@nine-december nine-december added to-reproduce Attacks pending to be reproduced waiting-for-foundry-feature labels Nov 18, 2022
@nine-december
Copy link
Collaborator Author

To reproduce this attack, it is needed that the receiver contract to have a specific address. Feature currently under development.

@joaquinlpereyra
Copy link
Collaborator

I propose removing this from master until the attack can be reproduced.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
to-reproduce Attacks pending to be reproduced waiting-for-foundry-feature
Projects
None yet
Development

No branches or pull requests

2 participants