Charts
DataOn-chain
VIP
Market Cap
API
Rankings
CoinOSNew
CoinClaw🦞
Language
  • 简体中文
  • 繁体中文
  • English
Leader in global market data applications, committed to providing valuable information more efficiently.

Features

  • Real-time Data
  • Special Features
  • AI Grid

Services

  • News
  • Open Data(API)
  • Institutional Services

Downloads

  • Desktop
  • Android
  • iOS

Contact Us

  • Chat Room
  • Business Email
  • Official Email
  • Official Verification

Join Community

  • Telegram
  • Twitter
  • Discord

© Copyright 2013-2026. All rights reserved.

简体繁體English
|Legacy
BTCBTC
💲66871.69
-
0.66%
ETHETH
💲2047.99
-
0.95%
SOLSOL
💲80.13
+
0.68%
WLDWLD
💲0.2714
+
0.78%
USDCUSDC
💲1.00
-
0%
XRPXRP
💲1.32
+
0.76%

SlowMist
SlowMist|May 24, 2025 09:15
🚨On May 22, LP protocol @CetusProtocol was exploited, with losses exceeding 230M. The attacker crafted a call that caused an overflow—yet still bypassed the check—allowing them to swap a tiny amount of tokens for a massive amount of liquidity assets. How? 🧐The core issue lies in the get_delta_a function. Its checked_shlw logic failed to properly detect an overflow, leading to a critical miscalculation of required haSUI. ➡️As a result, the protocol drastically underestimated how much haSUI the attacker needed to add—letting them drain assets at virtually no cost. ➕Using our on-chain AML & tracing tool @MistTrack_io, we also analyzed the EVM address receiving cross-chain funds: 0x890...4919b. 🔗Full post here: https://slowmist.medium.com/slowmist-analysis-of-the-230-million-cetus-hack-ee569af040f2 #SUI #Cetus #Exploit #Web3Security #MistTrack
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

HotFlash

|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

APP
Windows
Mac

X

Telegram

Facebook

Reddit

CopyLink

Hot Reads