WinterMute’s $160M Exploit Analysis | QuillAudits

Summary:

Introduction to Wintermute Protocol:

Vulnerability Analysis & Impact:

The Profanity Bug

Attack Steps:

  1. First, the attacker deploys the malicious contract. See here.

After the Exploit :

Status of Funds:

How they could have prevented the Exploit?

Web3 security- Need of the hour

Want more Such Security Blogs & Reports?

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store