熱門話題
#
Bonk 生態迷因幣展現強韌勢頭
#
有消息稱 Pump.fun 計劃 40 億估值發幣,引發市場猜測
#
Solana 新代幣發射平臺 Boop.Fun 風頭正勁


7月10日 11:39
thoughts on @GMX_IO 's exploit. Spending 20 minutes on this might save you from an exploit.
- A reentrancy attack is common in solidity-based smart contract and root cause of @GMX_IO 's hack. it's not new neither easy to avoid in evm based smart contract
- Sui move the language itself was designed in an object-centric model - this prevents sui move-based smart contract from suffering such risks
heartfelt to see what happened to @GMX_IO as it has inspired lots of new ideas' initiations.
Operating Defi is risky and I would seriously recommend that new defi builders to run in more robust language, or at least spend hours researching what a reentrancy attack.
I also wrote this and hopefully this helps:
What is Reentrancy Attack and why it does not happen in Sui Move:
4.63K
熱門
排行
收藏