CertiK: The Base chain's Rebalancer contract was hit by a re-entry attack, with losses exceeding $500,000
On December 10, the CertiK alert system detected a vulnerability exploitation attack on the Rebalancer contract on the Base chain. The attacker profited 133.7 ETH, approximately $501,000 USD, through a re-entry vulnerability. According to analysis, the root cause of this vulnerability is that the open() function in the contract allows any pool.strategy contract address to be entered. The attacker exploited this feature by inputting an attack contract and performed a re-entry operation when calling the burn function, thereby obtaining an additional 50% of ETH.
Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.
You may also like
Benchmark analyst reiterates "Buy" rating on Japanese crypto company Metaplanet

GAIN official: Investigating issues related to abnormal token over-issuance
Data: 10 addresses received a total of 210,000 ETH within 6 hours, worth approximately $863 millions.