Curve Founder: Setting input limits can completely prevent attacks similar to yETH and Balancer

PANews, December 8—According to discussions on the X platform, several developers believe that although the yETH attack was attributed to fuzz testing, the actual attack path was complex and may have involved gradually amplifying the damage after discovering an exploitable original vulnerability. Curve founder Michael Egorov stated that fuzz testing can reveal mathematical function failures, and similar attacks on yETH and Balancer could be completely avoided by setting input limits. It was reported last week that Yearn: The complexity of the yETH pool attack is similar to the previous Balancer attack.

CRV5.62%
BAL4.44%
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Related Topics
#
ETH
#
以太坊
Comment
0/400
No comments
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate App
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)