Charts
DataOn-chain
VIP
Market Cap
API
Rankings
CoinOSNew
CoinClaw🦞
Language
  • 简体中文
  • 繁体中文
  • English
Leader in global market data applications, committed to providing valuable information more efficiently.

Features

  • Real-time Data
  • Special Features
  • AI Grid

Services

  • News
  • Open Data(API)
  • Institutional Services

Downloads

  • Desktop
  • Android
  • iOS

Contact Us

  • Chat Room
  • Business Email
  • Official Email
  • Official Verification

Join Community

  • Telegram
  • Twitter
  • Discord

© Copyright 2013-2026. All rights reserved.

简体繁體English
|Legacy
BTCBTC
💲73421.94
+
2.58%
ETHETH
💲2253.86
+
6.89%
SOLSOL
💲93.46
+
5.78%
USDCUSDC
💲0.9998
-
0.01%
XRPXRP
💲1.48
+
4.96%
DOGEDOGE
💲0.1017
+
5.78%

SlowMist
SlowMist|Apr 15, 2025 03:55
The root cause of the @KiloEx_perp exploit is the lack of access control checks in the top-level contract(MinimalForwarder), which leads to the manipulation of oracle prices. The attack path is as follows: 1. The setPrices function in the KiloPriceFeed contract, which can modify oracle prices, needs to be called by the Keeper contract. 2. The 0x7a498a61 function in the Keeper contract, which executes price modifications and opening positions, needs to be called by the PositionKeeper contract. 3. The 0xac9fd279 function in the PositionKeeper contract, which executes calls to the Keeper contract, needs to be called by the MinimalForwarder contract. 4. The MinimalForwarder requires users to call the execute function to complete the function call to the PositionKeeper contract. However, within the execute function of the MinimalForwarder contract, users can pass any specified from address and a constructed signature to pass the signature check. Furthermore, there is no check on the data of the external call. This ultimately allows for a step-by-step call to the setPrices function in the KiloPriceFeed contract to tamper with the price. 5. Consequently, the attacker first modified the price to a very low value and used this price to open a long position, then immediately closed the position for profit after adjusting the price to a very high value. MinimalForwarder: BASE 0x3274b668aed85479e2a8511e74d7db7240ebe7c8 BSC 0xad37c86c06be706466ee70cbbf58f20655e7efb1 PositionKeeper: BASE 0xfdc7bc3a9fde88e7bcfb69c8b9ca7fda483627ed BSC 0xaf457b72fff6712641c5f1843515a6e114b2ecde Keeper: BASE 0x796f1793599d7b6aca6a87516546ddf8e5f3aa9d BSC 0x298e94d5494e7c461a05903dcf41910e0125d019 KiloPriceFeed: BASE 0x22c40b883b5976f13c78ee45ead6b0cdc192dae5 BSC 0x1b64eb04f9e62e1f3d1599d65fcfa8cc2dc44024 As always, stay vigilant!
+4
Mentioned
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

Timeline

May 13, 01:20【Gemini AI's free RCS chat provides vulnerabilities】
May 12, 09:28【Solana Smart Contract Security Best Practices Major Update】
May 11, 08:56【Mobius Token smart contract has vulnerabilities】
May 09, 07:52【New vulnerabilities in TON virtual machines may cause abnormal contract execution】
May 08, 14:16【LockBit vulnerability exposes 60000 Bitcoin addresses】
May 07, 16:58【User successfully breaks through the defense of artificial intelligence】
May 06, 23:50【ElizaOS vulnerability reveals losses caused by artificial intelligence】
May 06, 07:32【Solana fixing vulnerability raises governance concerns】
May 05, 20:25【Validator fixes major bugs to avoid catastrophic vulnerabilities】
May 05, 09:08【Solana validator fixes token casting vulnerability】

HotFlash

|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

APP
Windows
Mac

X

Telegram

Facebook

Reddit

CopyLink

Hot Reads