Haechi:此前审计的智能合约不包含Pickle Finance攻击事件漏洞代码

This article is not available in the current language yet. Showing the original version.
针对Pickle Finance攻击事件,审计公司Haechi澄清称,我们10月进行了一次审计,但是攻击者利用的漏洞发生在新创建的智能合约中,而不是接受安全审计的智能合约中。与此次漏洞攻击相关的代码是“controller-v4.sol”中的“swapExactJarForJar”;而此前的安全审计是针对“controller-v3.sol”,不包含“swapExactJarForJar”。在不久的将来,Haechi将发表关于Pickle Finance攻击事件的分析文章。
Share to:

Author: PA一线

This content is for market information only and is not investment advice.

Follow PANews official accounts, navigate bull and bear markets together