ID:
bzx-571
100 pts
Platform:
Type:
Category:
Method:
Data Sources:
Multi-Chain
Protocol
Lending
Scams
Extended Method:
Sandwich attack, oracle price manipulation
Days in Operation:
774
(2.12 Years)





100 pts each
On Tuesday September 3rd, samczun, the security researcher who found the critical bug in 0x, alerted us to an exploit leveraging our implementation of Kyber’s price feeds. We have confirmed that the exploit exists and has never been used. The exploit was immediately patched. The premise of the attack involved manipulating the price feed with a sandwich attack at the time of taking out the loan. This was an attack vector that both ourselves and our auditors did not detect. Despite the fact that great pains had been taken to protect against price feed manipulation, most of that effort was spent focused on the liquidation process.
DISCLAIMER: While web3rekt has used the best efforts in aggregating and maintaining this database, this web site makes no representations or warranties with respect to the accuracy or completeness of its information and data herein, and specifically disclaim any implied warranties of merchantability or fitness for any particular purpose.
Under no circumstances, shall web3rekt be liable for any loss of profit or funds, any regulatory or governmental penalties, any legal costs, or any other commercial and non-commercial damages, including but not limited to special, incidental, consequential, or other damages from any or all usage of the data and information derived from this database.