CoinWorld reports that, according to SlowMist, the Truebit protocol experienced a security vulnerability attack on January 8. The attacker exploited an integer overflow bug in its Purchase contract to mint $TRU tokens at nearly zero cost and stole 8,535 $ETH (approximately $26.44 million). The root cause of the incident was the lack of overflow protection in integer addition, leading to incorrect price calculations. The SlowMist team recommends that for contracts compiled with Solidity versions below 0.8.0, SafeMath library should always be used to protect all arithmetic operations to prevent overflow-related logical flaws.
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
CoinWorld reports that, according to SlowMist, the Truebit protocol experienced a security vulnerability attack on January 8. The attacker exploited an integer overflow bug in its Purchase contract to mint $TRU tokens at nearly zero cost and stole 8,535 $ETH (approximately $26.44 million). The root cause of the incident was the lack of overflow protection in integer addition, leading to incorrect price calculations. The SlowMist team recommends that for contracts compiled with Solidity versions below 0.8.0, SafeMath library should always be used to protect all arithmetic operations to prevent overflow-related logical flaws.