Skip to content

Commit

Permalink
➕ Add Clober Attack
Browse files Browse the repository at this point in the history
Signed-off-by: Pascal Marco Caversaccio <pascal.caversaccio@hotmail.ch>
  • Loading branch information
pcaversaccio committed Dec 12, 2024
1 parent 7fbd409 commit 2da87dc
Showing 1 changed file with 1 addition and 0 deletions.
1 change: 1 addition & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -93,6 +93,7 @@ A chronological and (hopefully) complete list of reentrancy attacks to date.
- [Pythia attack](https://x.com/quillaudits_ai/status/1830976830607892649) – 3 September 2024 | [Victim contract](https://etherscan.io/address/0xe2910b29252F97bb6F3Cc5E66BfA0551821C7461), [Exploit contract](https://etherscan.io/address/0x542533536e314180E1B9f00b2c046f6282eb3647), [Exploit transaction](https://etherscan.io/tx/0xee5a17a81800a9493e03164673ac0428347d246aa30cdb124b647787faaabbea)
- [Penpie attack](https://blog.penpiexyz.io/penpie-post-mortem-report-1ac9863b663a) – 3 September 2024 | [Victim contract](https://etherscan.io/address/0x6E799758CEE75DAe3d84e09D40dc416eCf713652), [Exploit contract](https://etherscan.io/address/0x4aF4C234B8CB6e060797e87AFB724cfb1d320Bb7), [Exploit transaction](https://etherscan.io/tx/0x56e09abb35ff12271fdb38ff8a23e4d4a7396844426a94c4d3af2e8b7a0a2813)[^10]
- [TrustSwap attack](https://github.com/trustswap/teamfinance-stakingpool/blob/main/audit-reports/Bailsec%20-%20Trustswap%20-%20Post%20Mortem%20-%20Final%20Report%20.pdf) – 30 September 2024 | [Victim contract](https://etherscan.io/address/0xd6A07b8065f9e8386A9a5bBA6A754a10A9CD1074), [Exploit contract](https://etherscan.io/address/0x15716E4ec8BD864eFD6dD0927De7e8b180349198), [Exploit transaction](https://etherscan.io/tx/0x83952d998cc562f40d0a58b76d563a16f3064ddb116e7b1b4e40298ca80499b8)
- [Clober attack](https://x.com/peckshield/status/1866443215186088048) – 10 December 2024 | [Victim contract](https://basescan.org/address/0x6A0b87D6b74F7D5C92722F6a11714DBeDa9F3895), [Exploit contract](https://basescan.org/address/0x32Fb1BedD95BF78ca2c6943aE5AEaEAAFc0d97C1), [Exploit transaction](https://basescan.org/tx/0x8fcdfcded45100437ff94801090355f2f689941dca75de9a702e01670f361c04)

> Some of the exploits carried out involve multiple separate transactions as well as multiple victim and exploit contracts. For each attack, I have listed the most affected victim contract, the most critical exploit contract, and the most devastating exploit transaction.
Expand Down

0 comments on commit 2da87dc

Please sign in to comment.