掃碼下載
BTC $76,393.25 -0.54%
ETH $2,291.21 +0.14%
BNB $623.61 -0.01%
XRP $1.38 -0.67%
SOL $83.76 -0.62%
TRX $0.3230 -0.86%
DOGE $0.0994 +1.57%
ADA $0.2475 +0.93%
BCH $451.11 +0.58%
LINK $9.25 +0.25%
HYPE $39.94 -3.48%
AAVE $96.44 -0.10%
SUI $0.9249 +0.06%
XLM $0.1624 -1.55%
ZEC $335.16 -4.68%
BTC $76,393.25 -0.54%
ETH $2,291.21 +0.14%
BNB $623.61 -0.01%
XRP $1.38 -0.67%
SOL $83.76 -0.62%
TRX $0.3230 -0.86%
DOGE $0.0994 +1.57%
ADA $0.2475 +0.93%
BCH $451.11 +0.58%
LINK $9.25 +0.25%
HYPE $39.94 -3.48%
AAVE $96.44 -0.10%
SUI $0.9249 +0.06%
XLM $0.1624 -1.55%
ZEC $335.16 -4.68%

BlockSec:BSC 鏈 MT 代幣買入限制機制存在缺陷,黑客套利約 24.2 萬美元

2026-03-10 12:40:03
收藏

ChainCatcher 消息,据 BlockSec 監測,其系統在 BSC 檢測到一筆針對 MT-WBNB 資金池的可疑交易,預估損失約 24.2 萬美元。原因在於買方限制機制存在缺陷:在通縮模式下,正常買入操作會回退,而路由器 / 交易對則被列入白名單,這使得攻擊者可以通過路由器互換和流動性移除繞過限制,從該交易對獲取 MT。

攻擊者隨後出售 MT 以積累 pendingBurnAmount,並調用 distributeFees()直接從交易對中銷毀 MT,人為拉高價格,然後再將 MT 兌換回 WBNB 以獲利。此外,一條允許前 0.2 MT 轉帳繞過買家限制的推薦規則,使得攻擊者能夠啟動攻擊。

app_icon
ChainCatcher 與創新者共建Web3世界