A community for the latest discussions about the cutting edge of crypto design, it's culture and significant crypto news. Decentralize everything. Check out our [Community Guidelines](https://relevant.community/crypto/post/6122269e61d1cd005a877277/62427d3ed587ad005b647828)
53383 Members
We'll be adding more communities soon!
© 2020 Relevant Protocols Inc.
A community for the latest discussions about the cutting edge of crypto design, it's culture and significant crypto news. Decentralize everything. Check out our [Community Guidelines](https://relevant.community/crypto/post/6122269e61d1cd005a877277/62427d3ed587ad005b647828)
53383 Members
We'll be adding more communities soon!
© 2020 Relevant Protocols Inc.
Relevant
Hot
New
Spam
Relevant
Hot
New
Spam
0
12.4K
0
12.4K
Sunday morning notifications of a cross-chain protocol losing millions. Just like the good old days. Transit Swap has lost $21M to a vulnerability which allowed an unknown attacker to drain the wallets of users who had approved the protocol's swap contracts. But unfortunately for the hacker, over $1M was lost in transit… not all MEV bots are down 0xbad this week. The team paused the affected contracts before announcing the incident on Twitter. Then came an update that via “the joint efforts of the [@SlowMist_Team](/user/profile/SlowMist_Team) , the [@Bitrace_Team](/user/profile/Bitrace_Team) , the [@peckshield](/user/profile/peckshield) security team,” key info about the hacker, including their “IP, email address, and associated on-chain addresses” had been uncovered. As the attacker’s anonymity began to slip away, it seems they had second thoughts. So far, over 70% of the funds have been returned. Finding a vulnerability in an un
Sunday morning notifications of a cross-chain protocol losing millions. Just like the good old days. Transit Swap has lost $21M to a vulnerability which allowed an unknown attacker to drain the wallets of users who had approved the protocol's swap contracts. But unfortunately for the hacker, over $1M was lost in transit… not all MEV bots are down 0xbad this week. The team paused the affected contracts before announcing the incident on Twitter. Then came an update that via “the joint efforts of the [@SlowMist_Team](/user/profile/SlowMist_Team) , the [@Bitrace_Team](/user/profile/Bitrace_Team) , the [@peckshield](/user/profile/peckshield) security team,” key info about the hacker, including their “IP, email address, and associated on-chain addresses” had been uncovered. As the attacker’s anonymity began to slip away, it seems they had second thoughts. So far, over 70% of the funds have been returned. Finding a vulnerability in an un
Some low-ranking comments may have been hidden.
Some low-ranking comments may have been hidden.