The BSC chain MT token purchase restriction mechanism has a flaw, allowing hackers to arbitrage approximately $242,000.

Gate News, March 10 — According to BlockSec monitoring, a suspicious transaction targeting the MT-WBNB liquidity pool was detected on BSC, with an estimated loss of approximately $242,000. The vulnerability was caused by a flaw in the buyer restriction mechanism: under the deflationary mode, normal buy operations would be reverted, while routers/trading pairs were whitelisted. This allowed attackers to bypass restrictions through router swaps and liquidity removal. The attacker then sold MT to accumulate pendingBurnAmount and called distributeFees() to directly burn MT from the trading pair, artificially inflating the price. They then exchanged MT back to WBNB for profit. Additionally, a recommended rule allowing the first 0.2 MT transfer to bypass buyer restrictions enabled the attacker to initiate the attack.

View Original
Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.
Comment
0/400
No comments