
ID:
phyproxy-1430
100 pts
Platform:
Type:
Category:
Method:
Data Sources:
Binance Smart Chain
Assets
Token
Contract Vulnerabilities
Extended Method:
Unverified inputs
Days in Operation:
526
(1.44 Years)





100 pts each
phyProxy on BSC was attacked, resulting in a loss of 1.2K BUSD.
The root cause is a forced investment due to the delegate calls unverified input in the public delegateCallSwap function. The attacker first created a worthless BUSD/FakeToken(0x890a) pair in Pancakeswap, then forced phxProxy to purchase the FakeToken with $BUSD and finally removed all liquidities to profit.
DISCLAIMER: While web3rekt has used the best efforts in aggregating and maintaining this database, this web site makes no representations or warranties with respect to the accuracy or completeness of its information and data herein, and specifically disclaim any implied warranties of merchantability or fitness for any particular purpose.
Under no circumstances, shall web3rekt be liable for any loss of profit or funds, any regulatory or governmental penalties, any legal costs, or any other commercial and non-commercial damages, including but not limited to special, incidental, consequential, or other damages from any or all usage of the data and information derived from this database.