According to BlockSec monitoring, the multi-chain protocol DBXen was hacked, with estimated losses of approximately $150,000. The root cause of the vulnerability lies in the protocol's inconsistent verification of the sender's identity when handling ERC-2771 meta-transactions. This inconsistency caused the system to incorrectly record the user's destruction batch but failed to properly update their active cycle. The attacker exploited this logical flaw to manipulate the reward calculation logic, causing the contract to mistakenly identify unprocessed destruction records, thereby illegally extracting excess fees and rewards during calls.

View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
0/400
No comments
  • Pin