Phalcon: The TrustPad protocol was attacked due to several design flaws in the staking logic
Phalcon, a trading browser, claimed on social media X (formerly Twitter) that the TrustPad protocol was attacked due to several design flaws in the staking logic, namely manipulating the locking period through external calls from untrusted sources to obtain pending rewards. In the receiveUpPool function of the LaunchpadLockableStake contract, if an account is not locked, the depositLockStart time will be set. Then the attacker manipulates it to immediately deposit (through the receiveUpPool function) and withdraw to accumulate pending rewards. In addition, another function, stakePendingRewards, allows attackers to convert accumulated pending rewards into staked amounts, allowing them to extract staking rewards in the form of TPAD tokens in future transactions and sell tokens for profit.
Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.
You may also like
MicroStrategy acquires another 55,500 bitcoin for $5.4 billion, taking holdings to 386,700 BTC
MicroStrategy has purchased another 55,500 BTC for approximately $5.4 billion at an average price of $97,862 per bitcoin.The latest acquisitions follow MicroStrategy’s completion of a $3 billion debt offering and sale of 5,597,849 shares for $2.46 billion.
MicroStrategy expands Bitcoin holdings with $5.4B purchase
Solana DEX volume hits record high: Is SOL price headed to $300?