HomeAboutWhat is web3?FAQLicenseTwitterMastodonBlueskyInstagramThreadsRSSLeaderboardGlossaryContributeNewsletterStore

Archived tweet

Back

Tweet thread by CertiK:

#CertiKInsight 

We have seen a flashloan exploit involving CUT token 

BSC: 0x7057F3b0F4D0649B428F0D8378A8a0E7D21d36a7

The CUT contract uses ILPFutureYieldContract(_lpFutureYieldContractAddress) at 0x0917914b0A70ee7F1f2460Fcd487696856E31154 which is unverified and contains hidden functionality 
Tweeted at 11:41 AM · Sep 10, 2024

1/ The attacker used the FutureYield to manipulate CUT and gain ~$1.4m from the BUSD-CUT pancake pair. The funds are currently held at 
Tweeted at Sep 10

2/ The affected pair is   0x83681F67069A154815a0c6C2C97e2dAca6eD3249 which should not be confused with our client sharing the same ticker. 
Tweeted at 22h

Tweet #1

Image #1:

Image

Tweet #2

Links:

  • https://bscscan.com/address/0x5766d1f03378f50c7c981c014ed5e5a8124f38a4

Text is licensed under a Creative Commons Attribution 3.0 Unported License. All attribution can be found on the attribution page.

Source code | Contribute