Skip to main content

Questions tagged [attacks]

attempts by malicious users or software to subvert/manipulate the behaviour of an application or network

Filter by
Sorted by
Tagged with
0 votes
0 answers
30 views

My prvate key stolen. Potential Disperse.app \ GlobalETH hackathon exploit

My wallet private key was stolen last week. 55,000 USDT and some ETH gas lost. Not TRX or BNB taken. Funds got sold on KuCoin and HTX in 6 transactions. https://etherscan.io/tx/...
new_to_crypto's user avatar
0 votes
1 answer
56 views

Is it possible for two users to receive the same nonce-generated ID in a Solidity smart contract?

I have a smart contract deployed on the Ethereum blockchain where each user who interacts with a specific function is assigned an ID based on a nonce value stored in the contract. The nonce is ...
Nerses Asaturyan's user avatar
1 vote
0 answers
81 views

i created sandwich attack python script using aave flashloan. is it correct? i created whole code

solidity contract function: function executeOperation( address asset, uint256 amount, uint256 premium, address initiator, bytes calldata params ) external override returns (bool) { ...
Bmroxx Roxx's user avatar
0 votes
1 answer
28 views

Is delegatecall to another contract really same as calling the function as if it were the part of calling contract?

When a contract makes a delegatecall, the code at the target address is executed in the context of the calling contract. This means that the storage, state variables, and functions of the calling ...
mohak gupta's user avatar
6 votes
2 answers
108 views

Can the `totalSupply` of a token be different than the sum of all account balances?

If I'm building a rebase token that has a difference of 1 wei sometimes (pre/post rebase) between the totalSupply and the sum of the balances of all holders, does that pose an attack risk within the ...
dNyrM's user avatar
  • 948
0 votes
0 answers
36 views

Failed to demonstrate a Re-entrancy attack due to arithmetic underflow

I try to do re-entrancy on a contract for testing purposes, but I encountered an error when doing so. Here's the targeted contract // SPDX-License-Identifier: MIT pragma solidity ^0.8.20; import {...
elpabl0's user avatar
3 votes
1 answer
883 views

What is a returnbomb attack?

I've read that when making an external call to an unknown contract, if the contract returns a large amount of random or junk byte it will cause some type of bug. But I dont know exact what it is and ...
kumar's user avatar
  • 71
0 votes
1 answer
112 views

Gas griefing in "typed" external calls

I was wondering whether the "insufficient gas griefing attack" is possible in cases when the external call is a typed call rather than an inline call with lower level utility functions (i.e. ...
Mila A's user avatar
  • 1,554
0 votes
1 answer
23 views

How do hackers fund their Ethereum gas for attacking contracts?

I was wondering how do hackers fund their Ethereum balances privately to further execute attacks? What protocols do they usually use?
Mila A's user avatar
  • 1,554
3 votes
2 answers
2k views

How did I get my private key stolen?

Recently i received around 1400 USDC on my Ethereum wallet that I access through Metamask. Today I opened Metamask because I wanted to transfer those USDC, but I found that there were no USDC anymore ...
Andrea's user avatar
  • 31
2 votes
1 answer
185 views

Why Read-only reentrancy needs extra contract?

I need help on this structure. I understand about reentrancy attack but I still figuring out read-only reentrancy why it needs extra 'A' contract.
Wonjae Choi's user avatar
0 votes
1 answer
19 views

Question about Ethernaut Telephone question. Creating attack method instead of using constructor

This is entire contract for the ethernaut Telephone question. I created attack() function, but a youtuber suggests constructor(). Anyone knows why?
Wonjae Choi's user avatar
1 vote
2 answers
346 views

How is the ethereum network protected against bombardment with invalid transactions?

I am wondering what would happen to ethereum's mempool if it was bombarded with tons and tons of invalid transactions. Not even reverting transactions, because they cost gas, but against completely ...
Marlo's user avatar
  • 371
1 vote
0 answers
62 views

What kind of malicious activity could an RPC gateway inflict on the user?

Let's say, a third-party RPC gateway for an Ethereum-like networks decided to turn itself into a malicious one. Apart from the likes of selling users' data, what kind of malicious activity could it ...
Kyell's user avatar
  • 91
2 votes
1 answer
386 views

Questions about selfdestruct

What is the exact signature of selfdestruct? (parameters, return type, ..). I couldn't find it. Where can I find it by my self? Does the address given to selfdestruct is used to send the remaining ...
Stav Alfi's user avatar
  • 216
2 votes
2 answers
64 views

How much ETC was stolen in the multiple 51% attacks on Ethereum-Classic?

Ethereum Classic was attacked multiple times back in 2020. How much was stolen and which addresses control these stolen funds now? And have they been sold?
Patoshi パトシ's user avatar
1 vote
2 answers
146 views

Is ChainLink's VRF susceptible to a 51% attack?

I do not know all of the details of how ChainLink's nodes and oracles work (hence why I am on here) but I did a little research on my own. According to a Gemini blog post by Cryptopedia, chainlink ...
chriscrutt's user avatar
1 vote
1 answer
121 views

Does sandwich attack work if there are TWO attackers?

In this scenerio, could both attackers turn a profit from this attack? I imagine it would work, but I want to be certain. Tx No. Description Tx0 Attacker 1 trades A for B Tx1 Attacker 2 trades A ...
Dani's user avatar
  • 11
1 vote
2 answers
152 views

How does ethereum testnets prevent DoS attack without expensive fees

Gas fees, among other things, make spamming expensive and thus prevent attackers to emit thousands of transactions. Since testnets have no fees (or "free" tokens), what really prevents ...
Makubu's user avatar
  • 75
1 vote
1 answer
149 views

How does proof-of-stake handle a denial-of-service attack?

As I understand it, the current proof-of-stake model works where one validator proposing a new block, and the block is accepted if enough validators approve it. What happens if someone performs a DoS ...
Mark's user avatar
  • 111
2 votes
1 answer
158 views

How do Ethereum nodes defend against DDoS attacks by mass reading?

Suppose a bad actor has large amounts of data stored on a smart contract. Since reading data is free (doesn't need a transaction), what stops one from simply reading that data over and over again, ...
ㅤㅤㅤ's user avatar
  • 195
6 votes
0 answers
239 views

Kademlia: How does Ethereum uses node discovery protocol to avoid sybil/eclipse attacks?

I want to describe a case that's not clear to me. let's say we have 10 peer validator nodes who reach consensus and agree to store some blocks on their chain. Let's say now that a wallet wants to sync ...
Panagiotis Drakatos's user avatar
1 vote
1 answer
40 views

What's stopping me from attacking the network by renting 51% of the stake for a few blocks?

The Ethereum market cap today is about $200bn. Theoretically, buying 51% of it would cost a stunning $100bn. Good luck getting that money hahah. However, I could ideally rent 51% of the staked eth for ...
Nic Szerman's user avatar
0 votes
1 answer
153 views

Why is it called a 51% attack if you need 2/3 of total stake in Proof of Stake?

Validation schemes require 2/3 of total stake to agree on the next block in proof of stake, so, if I'm a bad actor, outpacing honest validators requires 2/3 of total stake. Yet, attacks from malicious ...
shaha's user avatar
  • 11
1 vote
0 answers
29 views

Understand this TX (attack on pancakeswap)

Can someone help me understand how this attack works? https://bscscan.com/tx/0x6781925966f5236c057d425e00378e4d4b8685c49eae9ddf48229ebcba682463 He basically SWAPS 0.000000001 BNB for some otkens, and ...
Sergio's user avatar
  • 11
0 votes
1 answer
52 views

When we say that a 51% control of total computation power could lead to a successful Sybil attack, do we refer to miners or nodes?

As per my understanding of the blockchain so far (Bitcoin and Ethereum) nodes and miners have different jobs to do in a blockchain network. Although the terms are extensively used interchangeably, ...
Manav Kampani's user avatar
0 votes
1 answer
134 views

How do these 2 functions differ in terms of security?

How are these 2 functions different in terms of security, there was a question on a forum and i don't understand function emergencyWithdraw(uint256 _pid) public { PoolInfo storage pool = poolInfo[...
Doug's user avatar
  • 1
0 votes
1 answer
155 views

Security considerations: using events to trigger offchain actions

I need to trigger a sensitive offchain action based on a users interaction with my smart contract. My current approach is to emit and event (Trigger(msg.sender, 123)) and then use a filterQuery with ...
TommyF's user avatar
  • 152
1 vote
1 answer
36 views

can someone explain this line of the whitepaper?

To show how ethereum had made it's language turing-complete Vitalik in his white paper gave this example: "To show the motivation behind our solution(i.e using gas), consider the following ...
Dhanush Sai Baswa's user avatar
1 vote
1 answer
166 views

How can I demonstrate attacks on Quorum-based smart contracts in my local test network?

Currently, I am conducting a research regarding the security and privacy vulnerabilities of Quorum-based smart contracts. However, so far I've been struggling to implement attack vectors in order to ...
Cheyenne Slager's user avatar
0 votes
1 answer
762 views

Flash loan price manipulation

I am quite new to flash loan and I don't fully understand it. I've been reading on flash loan attacks lately and notice often times it involves a huge dump on Uniswap to skew the price of a coin. I am ...
Lagrange S's user avatar
10 votes
3 answers
890 views

Commit-Reveal contract still vulnerable to front running. How can it be improved?

I'm writing a contract and I want to shield it from front-running as best as it can possible be done (obviously, fully preventing front running would be ideal). My implementation is very similar to ...
HQST's user avatar
  • 103
0 votes
1 answer
29 views

How does the oracle judge whether the request has been attacked by a man in the middle

The oracle machine can initiate a request to the data source whose URL is the HTTP link address. How does the oracle machine determine whether the HTTP request has been attacked by a man-in-the-middle,...
wei wang's user avatar
  • 437
2 votes
1 answer
399 views

how do we use `commit/reveal` to count votes?

Let's say we are doing an election and it's easy to note that we need commit/reveal scheme to hide votes. So, we store hashes while users commit their votes. Now, let's say the election is over. How ...
Nika Kurashvili's user avatar
4 votes
3 answers
2k views

how does commit/reveal solve front-running?

I am trying to make sure I understand something correctly, so I will pose a problem with a solution. Problem: Let's say commit has been called. After this, we call the reveal. attacker listens to ...
Nika Kurashvili's user avatar
0 votes
2 answers
1k views

how can we stop front running for `approve` [duplicate]

function approve(address _spender, uint256 _value) returns (bool success) This is the ordinary ERC20 approval method. It's easy to figure out that we have a problem of front-running. Alice gives ...
Nika Kurashvili's user avatar
0 votes
1 answer
52 views

question about smart contract code possible vulnerability

I need help with one of my smart contracts. I wrote a smart contract that have functions that only emit events. The parameters of each event are some of the functions parameters. I want to ask if ...
kathi's user avatar
  • 199
1 vote
1 answer
32 views

can we jam the ETH network with assert/require functions?

If we make for example a smart contract with a require function that is always false and we execute it tons of times (knowing that we will get our gas back cause of the revert function)will we be able ...
Newdude's user avatar
  • 61
1 vote
1 answer
211 views

Flash minting ether security considerations and attacks

Flash loans enable a class of attacks that have not been possible or observed as much in prior systems. Flash minting ether is a concept that is starting to be implemented. See Example of flash ...
eth's user avatar
  • 86.5k
10 votes
3 answers
2k views

Flash loan security considerations and attacks

What do developers need to be aware of to make their contracts and systems safe against flash loans? What do they have to think about and protect against?
eth's user avatar
  • 86.5k
4 votes
0 answers
1k views

Frontrunning Uniswap horror story transactions

From the Ethereum is a Dark Forest post, the rescue plan was: Deploy a Getter contract which, when called by its owner, would make the burn call ONLY if activated, and otherwise revert. Deploy a ...
eth's user avatar
  • 86.5k
2 votes
1 answer
70 views

Is the May 2017 contract creation attack still possible?

In May 2017, an "attacker" created a contract that attempts to create many other contracts(using many JUMPDEST operations in the creation bytecode) until it runs out of gas. I see the gas ...
Bert Kellerman's user avatar
0 votes
1 answer
61 views

DaoAttack not working

I am trying to replicate the famous DAO attack for a cryptocurrencies course. I have the following contract already deployed on the blockchain. pragma solidity ^0.5.4; contract EDao { address ...
DebaSen's user avatar
  • 35
0 votes
1 answer
171 views

Integrity of old blocks in the blockchain

I am learning Ethereum using Geth, and I am testing PoA-Clique networks. Now I have a conceptual doubt about old blocks integrity. Suppose I have a private blockchain network of only one miner node ...
RobertGG's user avatar
0 votes
1 answer
94 views

Transaction Timing Implications for Reentry Attacks

This is the classic reentry attack: function withdrawBalance() public { uint amountToWithdraw = userBalances[msg.sender]; (bool success, ) = msg.sender.call.value(amountToWithdraw)(""); ...
Eric Falkenstein's user avatar
1 vote
1 answer
179 views

Risk of Messages Not Having a Signature

As per my understanding transactions are signed before sending to Ethereum. Else, no transfer of Ether will happen. However, messages sent to Smart Contracts (SC) aren't signed (e.g., using methods....
Dilum Bandara's user avatar
4 votes
1 answer
892 views

What is the "pre-commit" scheme to defeat frontrunning attack?

I am writing to inquire feasible strategies to defeat Transaction Ordering Dependence (TOD) bugs. I learned from the best practice guideline such that we can use a so-called "pre-committed" scheme ...
lllllllllllll's user avatar
1 vote
1 answer
2k views

Griefing Attacks: Are they profitable for the attacker?

The following article explains one of the solutions for indirectly validate a block when cross-sharding transaction between two shards to prevent invalid blocks. The article called one of these ...
Questioner's user avatar
  • 2,700
1 vote
2 answers
199 views

adaptive vs. non-adaptive adversaries? Is there a precise, unique and general definition? (Updated)

In this Ethereum github page (Link to the page: https://github.com/ethereum/wiki/wiki/Sharding-FAQ#what-are-the-security-models-that-we-are-operating-under) there is a very brief definition of the ...
Questioner's user avatar
  • 2,700
2 votes
1 answer
77 views

Would a 51% attack be easier if an attacker can DoS certain nodes?

I am wondering whether a 51% attack would be simplified by being able to remotely crash miner nodes. Consider the following scenario: Malicious mining pool A controls 16% percent of the mining power ...
CryptoFan's user avatar