🎉 #Gate xStocks Trading Share# Posting Event Is Ongoing!
📝 Share your trading experience on Gate Square to unlock $1,000 rewards!
🎁 5 top Square creators * $100 Futures Voucher
🎉 Share your post on X – Top 10 posts by views * extra $50
How to Participate:
1️⃣ Follow Gate_Square
2️⃣ Make an original post (at least 20 words) with #Gate xStocks Trading Share#
3️⃣ If you share on Twitter, submit post link here: https://www.gate.com/questionnaire/6854
Note: You may submit the form multiple times. More posts, higher chances to win!
📅 End at: July 9, 16:00 UTC
Show off your trading on Gate Squ
EIP-7702 vulnerability leads to nearly one million dollars loss for DeFi projects, security agency issues protection recommendations.
[Coin World] News on July 9, according to security agencies, recent multiple contract attack cases have utilized the features of EIP-7702 to bypass on-chain security checks, including msg.sender == tx.origin and msg.sender == _owner, leading to issues such as flash loan attacks and price manipulation, with losses reaching nearly one million dollars. Case analysis shows that attackers implemented attacks through malicious delegator authorization, affecting well-known DeFi projects including QuickConverter and multiple CSM liquidity pools.
The implementation of EIP-7702 enables EOA addresses to possess smart contract capabilities, rendering traditional security logic ineffective. Security agencies recommend that project teams enhance protection against flash loan attacks and reentrancy attacks, restructure EOA checks and permission management logic, and continuously monitor the delegator authorization status of administrator addresses to prevent potential risks.