Trendaavat aiheet
#
Bonk Eco continues to show strength amid $USELESS rally
#
Pump.fun to raise $1B token sale, traders speculating on airdrop
#
Boop.Fun leading the way with a new launchpad on Solana.

wavey
this is 2025’s most fascinating security find imo:
a "zero‑day" that hackers were quietly positioning upon, betting it'd stay hidden while the future payoff grew.
thankfully caught just in time by the good guys.
outstanding work by @deeberiroz @pcaversaccio @dedaub

sudo rm -rf --no-preserve-root /10.7. klo 22.13
It gets even more fancy: the way Etherscan was tricked showing the wrong implementation contract is based on setting 2 different proxy slots in the same frontrunning tx. So Etherscan uses a certain heuristic that incorporates different storage slots to retrieve the implementation contract.
There is an old proxy by OpenZeppelin who used the following slot: `keccak256("org.zeppelinos.proxy.implementation")` = `0x7050c9e0f4ca769c69bd3a8ef740bc37934f8e2c036e5a723fd8ee048ed3f8c3`
We now also have the standard EIP-1967 slot `bytes32(uint256(keccak256('eip1967.proxy.implementation')) - 1)` = `0x360894a13ba1a3210667c828492db98dca3e2076cc3735a920a3ca505d382bbc`
So what happened is that the old OpenZeppelin proxy slot was written to with the benign implementation address _and_ the standard EIP-1967 slot was also written to with the malicious implementation address. Since Etherscan queries first the old proxy slot, it retrieved the benign looking one first and thus displayed it.

5,79K
this is 2025’s most fascinating security find imo:
a "zero‑day" that hackers were quietly positioning upon, betting it'd stay hidden while the future payoff grew.
thankfully caught just in time by the good guys.
outstanding work by @deeberiroz @pcaversaccio @deeberiroz

sudo rm -rf --no-preserve-root /10.7. klo 22.13
It gets even more fancy: the way Etherscan was tricked showing the wrong implementation contract is based on setting 2 different proxy slots in the same frontrunning tx. So Etherscan uses a certain heuristic that incorporates different storage slots to retrieve the implementation contract.
There is an old proxy by OpenZeppelin who used the following slot: `keccak256("org.zeppelinos.proxy.implementation")` = `0x7050c9e0f4ca769c69bd3a8ef740bc37934f8e2c036e5a723fd8ee048ed3f8c3`
We now also have the standard EIP-1967 slot `bytes32(uint256(keccak256('eip1967.proxy.implementation')) - 1)` = `0x360894a13ba1a3210667c828492db98dca3e2076cc3735a920a3ca505d382bbc`
So what happened is that the old OpenZeppelin proxy slot was written to with the benign implementation address _and_ the standard EIP-1967 slot was also written to with the malicious implementation address. Since Etherscan queries first the old proxy slot, it retrieved the benign looking one first and thus displayed it.

109
wavey kirjasi uudelleen
Two New Resupply Proposals
1. Savings reUSD ($sreUSD) a new DEFI building block
Introduce savings reUSD, a new ERC-4626 staking vault which aims to grow $reUSD demand, reward long-term holders, and improve peg stability through a dynamic fee mechanism based on reUSD’s peg.
Link:
1/2
7,81K
pretty neat weekly report + insights by @CurveFinance

Curve Finance4.7. klo 02.38
Good yields?
5,5K
Johtavat
Rankkaus
Suosikit
Ketjussa trendaava
Trendaa X:ssä
Viimeisimmät suosituimmat rahoitukset
Merkittävin