link.png

ID:

royale-563

Date:

Status:

Incident Count:

October 26, 2019

Verified

1

info.png
target.png
REKT

Contributor:

chain.png

zerofriction.io

KYC By:

KYC:

None

info.png

Audit By:

Audits:

None

Loss Amount:

60,000

info.png

Recovered:

-

Rewards:

Currency:

USD, EOS

info.png

Key Indicators

Platform:

Type:

Category:

Method:

Data Sources:

EOS

Chain Game

Contract Vulnerabilities

Extended Method:

Contract vulnerability, bad randomizer

info.png

Days in Operation:

0

chain.png
chain.png
chain.png
chain.png
datasource.png

EOS Royale has been attacked by hackers, who have gained around 11,000 EOS. The reason for the break was the vulnerability of the randomizer. The randomizer algorithm for the project generated a random number based on the principle similar to the one here github... using tapos_block_prefix (). Since this information taken from the previous blocks, the hacker was able to calculate the future number and put it on it, winning with a coefficient of 36. Its depleted our balance, causing a total loss of a total size of about 11 thousand EOS.

info.png

DISCLAIMER: While web3rekt has used the best efforts in aggregating and maintaining this database, this web site makes no representations or warranties with respect to the accuracy or completeness of its information and data herein, and specifically disclaim any implied warranties of merchantability or fitness for any particular purpose. 

Under no circumstances, shall web3rekt be liable for any loss of profit or funds, any regulatory or governmental penalties, any legal costs, or any other commercial and non-commercial damages, including but not limited to special, incidental, consequential, or other damages from any or all usage of the data and information derived from this database.