Curve founder: Setting input restrictions can completely prevent attacks similar to yETH and Balancer.

PANews reported on December 8th that, according to discussions on the X platform, several developers believe that while the yETH attack was attributed to fuzzing, the actual attack path is complex and may have involved gradually amplifying the harm after discovering an exploitable initial vulnerability. Curve founder Michael Egorov stated that fuzzing can reveal the failure of mathematical functions, and that setting input restrictions could completely prevent attacks like yETH and Balancer.

As reported last week, the complexity of the attack on the Yearn:yETH pool was similar to that of the previous Balancer attack .

Share to:

Author: PA一线

This content is for informational purposes only and does not constitute investment advice.

Follow PANews official accounts, navigate bull and bear markets together
Recommended Reading
33 minute ago
1 hour ago
2 hour ago
3 hour ago
5 hour ago
6 hour ago

Popular Articles

Industry News
Market Trends
Curated Readings

Curated Series

App内阅读