Skip to main content

Questions tagged [hack]

The tag has no usage guidance.

Filter by
Sorted by
Tagged with
0 votes
0 answers
4 views

flashbot bundle to claim ico tokens

Does anyone have a flashbot bundle to claim ico tokens from a hacked wallet? Would love an example that has worked for them. Would need eth from third party wallet to fund the bundle. I do have ...
Dave's user avatar
  • 1
0 votes
0 answers
30 views

My prvate key stolen. Potential Disperse.app \ GlobalETH hackathon exploit

My wallet private key was stolen last week. 55,000 USDT and some ETH gas lost. Not TRX or BNB taken. Funds got sold on KuCoin and HTX in 6 transactions. https://etherscan.io/tx/...
new_to_crypto's user avatar
0 votes
1 answer
32 views

What is the point of honeypot?

Please take a look at this example specifically: https://solidity-by-example.org/hacks/honeypot/ Based on my understanding, an ordinary withdraw transaction will also revert. In fact, every withdraw ...
hyunchel's user avatar
1 vote
1 answer
531 views

Contract got hacked, what's wrong with it?

My Contract got hacked, and I cannot figure out why. Happened on Base. Hacker deployed a contract, then called their contract, which called my contract, and extracted tokens from my contract. But ...
0xQuasar's user avatar
0 votes
0 answers
27 views

What if lending pool oracle price different from market?

If Aave DAI oracle price stay at $0.90, but actual DAI price on any exchange market is $1.12 What would happen? Is that mean someone can abuse or exploit Aave because of this price discrepancy?
Ijimai Damemai's user avatar
0 votes
0 answers
34 views

why is my callback function reverting?? please i really need help

I have a challenge to solve, while the pair contract provided was having a swap function which is vuln to reentrance in my own understanding the swap was successful without trying the reentrance but ...
jose celis's user avatar
0 votes
2 answers
149 views

I got hacked on metamask today

Today I got hacked on meta mask: transaction hash 0xed8a4d46550431225fd2aab3bbd79ef9b4d55a31e8d2f4676d77004f658cbb84 somebody sent my eth from my adress ...
Alex's user avatar
  • 11
0 votes
0 answers
295 views

There's an auto withdraw bot activated in my wallet, how can i get my wallet back? [duplicate]

There's an auto withdraw bot activated in my wallet and all my coins are being transferred out automatically, please does anyone know how i can get my wallet back, i can't even deposit gas fee to ...
Olskido's user avatar
1 vote
1 answer
277 views

Seed phrase compromised, ERC20/NFT remaining, what are the options?

This is general Q&A for all the "My wallet is compromised by a sweeper bot, what can I do?" questions, as well as an attempt to combat the "Crypto Theft Recovery Options" ...
Maka's user avatar
  • 1,383
0 votes
1 answer
65 views

FlashLoans contract funds are being wrongly withdrawn without any action, how is this possible?

I'm new with flashloan, I'm using this code to test and everything works, however the tokens that remain in the contract after 30 to 40 minutes are "stolen", "improperly withdrawn",...
CodeLego Blockchain's user avatar
1 vote
2 answers
215 views

How hackers can penetrate our smart contract function calls?

I used this code in a smart contract method on Polygon blockchain: function withdraw() public { iERC20 tether = iERC20(0xc2132D05D31c914a87C6611C10748AEb04B58e8F); tether.transfer(msg.sender, ...
Alireza Zojaji's user avatar
0 votes
1 answer
31 views

Best approach to simplify phantom array logic (ERC721 Enumerable) [HARD]

I wanted to create an ERC721 token vault with arbitrary numbers of NFTs pre-"minted", yet compliant with IERC721Enumerable as a proof-of-concept. For simplicity, the NFT ids are contiguous. ...
Ashraile's user avatar
  • 125
0 votes
1 answer
23 views

How do hackers fund their Ethereum gas for attacking contracts?

I was wondering how do hackers fund their Ethereum balances privately to further execute attacks? What protocols do they usually use?
Mila A's user avatar
  • 1,554
2 votes
1 answer
79 views

Possible way to hack Solidity into executing a function directly from a struct as a method? (v0.8.20)

pragma solidity 0.8.20; contract SolidityLimitTest { mapping (address => Hack) private Hackable; struct Hack { uint amount; function(uint) returns (uint) ten_x; } ...
Ashraile's user avatar
  • 125
0 votes
2 answers
50 views

Can frontrunners modify transaction parameters

I am asking if it's possible to change parameters of a function called, for example: function updatePrice(uint128 price) public onlyOwner{ latestPrice = price; lastPriceUpdate = ...
anonauditor's user avatar
3 votes
2 answers
2k views

How did I get my private key stolen?

Recently i received around 1400 USDC on my Ethereum wallet that I access through Metamask. Today I opened Metamask because I wanted to transfer those USDC, but I found that there were no USDC anymore ...
Andrea's user avatar
  • 31
1 vote
0 answers
37 views

How to transfer nft from compromised wallet (sweeper bot actively looking) to secure address [duplicate]

One of my accounts was compromised and I have a valuable lens profile nft in that... every time I deposit matic for the gas fee to transfer nft someone steeled immediately .....please help.....
Aruna Saragada's user avatar
1 vote
1 answer
467 views

Fake BUSD transcation sent from my wallet (not fake 0 token scam)!

Transaction Hash: 0x7800fb4d9345fc7e8b2794a479f414948eb1a9126e14daff11d1802440996a68 The hackers sent fake busd token (with >0 amount) from multiple victims wallet to another wallet without any ...
ken's user avatar
  • 11
0 votes
1 answer
88 views

My Account is hacked. I send money in and its instantly sent to another address. I need to know how to stop this code from running? any thoughts?

I need to know how to stop a hack algorithm code from running on my meta-mask. As soon as I put any money into this account it is immediately sent to another address. I believe to someone called ...
Twok's user avatar
  • 1
2 votes
2 answers
64 views

How much ETC was stolen in the multiple 51% attacks on Ethereum-Classic?

Ethereum Classic was attacked multiple times back in 2020. How much was stolen and which addresses control these stolen funds now? And have they been sold?
Patoshi パトシ's user avatar
1 vote
0 answers
271 views

My Goerli wallet has been drained

I want to open this question from overflow since it was closed and I experience the same problem. This account "0x87C02eeacB08c11aFBb821798DB2F4cCcd8F9E3d" has been stealing many goerli and ...
ethereal1m's user avatar
2 votes
1 answer
174 views

Have any a16z-backed protocols ever been hacked?

This year, we saw the hack by exploit of a Binance bridge and a Ronin bridge due to weak code written by the protocol creators. a16z Crypto is the most influential DeFi protocol investor in web3, ...
user610620's user avatar
  • 1,568
-4 votes
1 answer
49 views

How can I use a reentrancy attack to permanently freeze funds?

If possible, can you please send me the code with as much details as possible? I would like to understand more about it but didn't find useful content on the internet. Thanks in advance
Joe B's user avatar
  • 3
0 votes
1 answer
51 views

Reentrancy attack question

// SPDX-License-Identifier: MIT pragma solidity ^0.8.0; import "@openzeppelin/contracts/access/Ownable.sol"; interface IBank { function deposit() external payable; function withdraw(...
Joe B's user avatar
  • 3
0 votes
0 answers
189 views

how do I decompile a code that has some bugs inside using bytecode?

i was tried to understand the codes inside a SC on BSC recently and i found some weird codes inside the decompiled section. i know some little solidity programming and tried to use Remix to reverse it ...
SaveHen's user avatar
0 votes
2 answers
1k views

How to ".call" a function of another contract which uses ".call"

So, I'm learning advanced smart contract development. Two days ago, I learned about Reentrancy attacks and then I also created two contracts Protocol.sol (vulnerable contract) + Hacker.sol (attacker ...
DevABDee's user avatar
  • 483
-1 votes
1 answer
2k views

Tracking ip in etherscan

How do you find ip address in an ethereum transaction/etherscan? My ledger wallet was recently compromised and the tokens in my wallet were stolen. Is there anyway i can track the ip address in ...
Tbone03's user avatar
1 vote
0 answers
141 views

Scam wallet token recovery

How to build a code to recover the remaining coins from a hacked wallet Assume a hacker has compromised the wallet and automatically withdraws some funds how do I recover the remaining funds and there ...
Pedro Ezekiel's user avatar
1 vote
1 answer
225 views

How to fix vulnerability in solidity contract

I have recently deployed a contract on the BSC mainnet that got drained of all the funds in it, but I can't seem to find where in my contract the loophole is to know how it got drained so it doesn't ...
Starbody's user avatar
2 votes
1 answer
60 views

How could someone negotiate with the hacker?

I'm reading this article, and quote: After negotiation, one hacker agreed to return 259+63 ETH Since only the hacker can control the ETH funds, and no one can lock the ETH. I'm wondering on what ...
daisy's user avatar
  • 294
1 vote
2 answers
967 views

Just got my contract drained- how?

I just got my contract drained, and am trying to understand how. Obviously I'm a noob, played with fire and got burned bad (shouldn't have big sums of money on contracts). I SHOULD have transferred my ...
master_axe's user avatar
0 votes
1 answer
722 views

Potential signature malleability in Solidity CTF

I am doing a CTF so I don't want to give too much information away. I am pretty sure I can practice signature malleability or otherwise abuse the signer functions to be able to mint tokens given the ...
jforte44's user avatar
0 votes
2 answers
138 views

The Ethernaut King Challenge

I am trying to pass level 9 of Ethernaut challenges known as the King contract. My designed contract for hacking the King contract is as follows: pragma solidity 0.8.0; contract MaliciousKing { ...
Sina Rahimi's user avatar