Published in


Audios protocol hack analysis

  1. Attackers deploy attack contracts
  2. the attacker evaluates whether the current 84 proposal has passed by the evaluateProposalOutcome method (the 84 proposal is initiated by the attacker, but lacks the conditions for the proposal to pass)
  3. Initiate a new proposal 85 for the transfer of a large amount of funds to 0xbdbb5945f252bc3466a319cdcc3ee8056bf2e569 via the transfer method.

New to trading? Try crypto trading bots or copy trading



Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store

Lunaray takes a leading position in smart contract auditing and consulting service for blockchain security.