热门话题
#
Bonk 生态迷因币展现强韧势头
#
有消息称 Pump.fun 计划 40 亿估值发币,引发市场猜测
#
Solana 新代币发射平台 Boop.Fun 风头正劲


7月10日 11:39
thoughts on @GMX_IO 's exploit. Spending 20 minutes on this might save you from an exploit.
- A reentrancy attack is common in solidity-based smart contract and root cause of @GMX_IO 's hack. it's not new neither easy to avoid in evm based smart contract
- Sui move the language itself was designed in an object-centric model - this prevents sui move-based smart contract from suffering such risks
heartfelt to see what happened to @GMX_IO as it has inspired lots of new ideas' initiations.
Operating Defi is risky and I would seriously recommend that new defi builders to run in more robust language, or at least spend hours researching what a reentrancy attack.
I also wrote this and hopefully this helps:
What is Reentrancy Attack and why it does not happen in Sui Move:
4.63K
热门
排行
收藏