PANews reported on December 8th that, according to discussions on the X platform, several developers believe that while the yETH attack was attributed to fuzzing, the actual attack path is complex and may have involved gradually amplifying the harm after discovering an exploitable initial vulnerability. Curve founder Michael Egorov stated that fuzzing can reveal the failure of mathematical functions, and that setting input restrictions could completely prevent attacks like yETH and Balancer.
As reported last week, the complexity of the attack on the Yearn:yETH pool was similar to that of the previous Balancer attack .
