Platypus attack exploited incorrect ordering of code, auditor claims

Share This Post

The misordered lines caused a solvency check to be performed before the user’s amount, factor, and rewardDebt had been set to zero

The $8m Platypus flash loan attack was made possible because of code that was in the wrong order, according to a post mortem report from Platypus auditor Omniscia. The auditing company claims the problematic code didn’t exist in the version they saw.

According to the report, the Platypus MasterPlatypusV4 contract “contained a fatal misconception in its emergencyWithdraw mechanism” which made it perform “its solvency check before updating the LP tokens associated with the stake position.”

The report emphasized that the code for the emergencyWithdraw function had all of the necessary elements to prevent an attack, but these elements were simply written in the wrong order, as Omniscia explained:

“The issue could have been prevented by re-ordering the MasterPlatypusV4::emergencyWithdraw statements and performing the solvency check after the user’s amount entry has been set to 0 which would have prohibited the attack from taking place.”

Omnisia admitted that they audited a version of the MasterPlatypusV4 contract from Nov. 21 to Dec. 5, 2021. However, this version “contained no integration points with an external platypusTreasure system” and therefore did not contain the misordered lines of code. From Omniscia’s point of view, this implies that the developers must have deployed a new version of the contract at some point after the audit was made.

Related: Raydium announces details of hack, proposes compensation for victims

The auditor claims that the contract implementation at Avalanche (AVAX) C-Chain address 0xc007f27b757a782c833c568f5851ae1dfe0e6ec7 is the one that was exploited. Lines 582-584 of this contract appear to call a function called “isSolvent” on the PlatypusTreasure contract, and lines 599-601 appear to set the user’s amount, factor, and rewardDebt to zero. However, these amounts are set to zero after the “isSolvent” function has already been called.

The Platypus team confirmed on Feb. 16 that the attacker exploited a “flaw in [the] USP solvency check mechanism,” but the team did not initially provide further detail. This new report from the auditor sheds further light on how the attacker may have been able to accomplish the exploit.

The Platypus team announced on Feb. 16 that the attack had occurred. It has attempted to contact the hacker and get the funds returned in exchange for a bug bounty. The attacker used flashed loans to perform the exploit, which is similar to the strategy used in the Defrost Finance exploit of Dec. 25.

Read Entire Article
spot_img
- Advertisement -spot_img

Related Posts

SEC and DOJ Strike Crypto Firm With Millions in Penalties Over Corruption

A crypto mining firm faces a $14 million penalty after admitting to a $25 million bribery scheme to secure a Japanese casino contract, which ultimately failed A Mining Empire’s Downfall: Bribery

Whale Accumulation Points to Bitcoin Gains, But Here’s Why Investors Should Stay Alert

Bitcoin price movements often correlate with large-scale investors’ actions, commonly called “whales” These individuals or entities hold between 1,000 and 10,000 BTC, and their trading

XRP Price Signals Downside Correction: Is a Pullback Coming?

XRP price is correcting gains from the $1185 resistance zone The price might revisit the $100 support before the bulls appear XRP price started a downside correction below the $1120 level The price

Rumble Eyes Bitcoin Adoption, (RUM) Share Price Rise By 9%

The post Rumble Eyes Bitcoin Adoption, (RUM) Share Price Rise By 9% appeared first on Coinpedia Fintech News Rumble Inc, a YouTube alternative known for its appeal to far-right audiences, is

Coinbase to Delist Wrapped Bitcoin (WBTC) by December 19

The post Coinbase to Delist Wrapped Bitcoin (WBTC) by December 19 appeared first on Coinpedia Fintech News Coinbase has announced plans to delist Wrapped Bitcoin (WBTC) from its platform by December

Bitcoin Whale Accumulated $269M in BTC Again: Currently Holds 24,660 BTC.

The post Bitcoin Whale Accumulated $269M in BTC Again: Currently Holds 24,660 BTC appeared first on Coinpedia Fintech News A Bitcoin whale made significant moves on November 19, withdrawing 2,189 BTC