Foresight News reports that SlowMist Security Team has released an analysis report on the Truebit Protocol security incident. On January 8, Truebit Protocol was attacked due to an integer overflow vulnerability in its Purchase contract. The attacker was able to mint TRU tokens at nearly zero cost and stole 8,535 Ethereum (approximately $26.44 million). The root cause was the lack of overflow protection mechanisms in the contract, leading to incorrect price calculations. The stolen funds were subsequently transferred to Tornado Cash. It is recommended to always use SafeMath to protect all arithmetic operations in contracts compiled with Solidity versions prior to 0.8.0 to prevent overflow-related logical flaws.
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
SlowMist: The security incident with Truebit was caused by the lack of overflow protection mechanisms in the contract
Foresight News reports that SlowMist Security Team has released an analysis report on the Truebit Protocol security incident. On January 8, Truebit Protocol was attacked due to an integer overflow vulnerability in its Purchase contract. The attacker was able to mint TRU tokens at nearly zero cost and stole 8,535 Ethereum (approximately $26.44 million). The root cause was the lack of overflow protection mechanisms in the contract, leading to incorrect price calculations. The stolen funds were subsequently transferred to Tornado Cash. It is recommended to always use SafeMath to protect all arithmetic operations in contracts compiled with Solidity versions prior to 0.8.0 to prevent overflow-related logical flaws.