Trendaavat aiheet
#
Bonk Eco continues to show strength amid $USELESS rally
#
Pump.fun to raise $1B token sale, traders speculating on airdrop
#
Boop.Fun leading the way with a new launchpad on Solana.
How did attackers drain $42M from @GMX_IO?
Through cross-contract reentrancy that bypassed every safety check.
We reproduced the attack using @WakeFramework.
Let's break it down ↓

2/ Each GMX contract had reentrancy guards. The attack succeeded anyway. How?
The exploit occurred AFTER one contract's guard had already exited, creating a window to manipulate GLP token prices.
3/ The attack exploited fragmented data responsibility:
• Vault handles positions, ShortsTracker tracks prices
• Attacker re-enters after reentrancy guard resets
• Bypasses ShortsTracker update → inflates GLP price
• Drains value at manipulated prices
4/ Read the detailed analysis and reproduce the scenario. Full walkthrough and forked environment available.
Understanding these attacks is the first step to preventing them in your project.
7,41K
Johtavat
Rankkaus
Suosikit