Inside the Governance Hack of Tornado Cashby@zartaj

Inside the Governance Hack of Tornado Cash

tldt arrow
Read on Terminal Reader
Read this story w/o Javascript

Too Long; Didn't Read

The attacker mainly used CREATE, CREATE2, and selfdestruct to exploit the governance. They proposed a contract identical to the previously passed proposal, but this proposal has a selfdestruct function that went unnoticed. After getting accepted, the hacker deletes the proposal contract and deploys a malicious contract at the same address. As this address was already accepted by the governance, they got full control of the governance contract.
featured image - Inside the Governance Hack of Tornado Cash
Md Zartaj Afser HackerNoon profile picture

@zartaj

Md Zartaj Afser


Receive Stories from @zartaj


Credibility

react to story with heart

RELATED STORIES

L O A D I N G
. . . comments & more!