Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Collapse
Brand Logo
UDS UDS: $1.5971
24h: 0.53%
Trade UDS
Gate.io
Gate.io
UDS / USDT
KuCoin
KuCoin
UDS / USDT
MEXC
MEXC
UDS / USDT
BingX
BingX
UDS / USDT
BitMart
BitMart
UDS / USDT
LBank
LBank
UDS / USDT
XT.COM
XT.COM
UDS / USDT
Uniswap v3
Uniswap v3
UDS / USDT
Biconomy.com
Biconomy.com
UDS / USDT
WEEX
WEEX
UDS / USDT
PancakeSwap v3
PancakeSwap v3
UDS / USDT
Pionex
Pionex
UDS / USDT
COINSTORE
COINSTORE
UDS / USDT
Sushiswap v3
Sushiswap v3
UDS / USDT
Picol
Picol
UDS / USDT

Earn up to 50 UDS per post

Post in Forum to earn rewards!

Learn more
UDS Right

Spin your Wheel of Fortune!

Earn or purchase spins to test your luck. Spin the Wheel of Fortune and win amazing prizes!

Spin now
Wheel of Fortune
selector
wheel
Spin

Paired Staking

Stake $UDS
APR icon Earn up to 50% APR
NFT icon Boost earnings with NFTs
Earn icon Play, HODL & earn more
Stake $UDS
Stake $UDS
UDS Left

Buy UDS!

Buy UDS with popular exchanges! Make purchases and claim rewards!

Buy UDS
UDS Right

INFLUENCER LEVEL

Based on the number of subscribers

MULTIPLIER

up to 10k

x1.1

10-25k

x1.25

25-100k

x1.5

100k-250k

x2

250k-1m

x3

1m+

x5

Post links to Undeads Forum messages or Undeads products to receive additional rewards

Post limits and staking coefficients applied similar to Forum posts

Discord, Telegram, Twiter

Post in Forum to earn rewards!

UDS Rewards
  1. Home
  2. Crypto-Detective
  3. ZetaChain Exploit Was Preventable: The Bug Was Reported and Dismissed Before the Attack

ZetaChain Exploit Was Preventable: The Bug Was Reported and Dismissed Before the Attack

Scheduled Pinned Locked Moved Crypto-Detective
2 Posts 2 Posters 11 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
This topic has been deleted. Only users with topic management privileges can see it.
  • nihalsariN Offline
    nihalsariN Offline
    nihalsari
    wrote last edited by
    #1

    59013371-f1dd-4d03-9955-9597d71250f4-image.png

    ZetaChain's post-mortem of its $334,000 exploit has revealed an uncomfortable detail: the vulnerability that enabled the attack had already been flagged through the protocol's own bug bounty program before it was used against the network. The team acknowledged in its post-mortem that the submission was dismissed as intended behavior rather than investigated as a genuine risk, a decision that directly contributed to the exploit occurring. The admission has drawn sharp criticism from the security research community, with one researcher noting that bug bounty programs at many DeFi protocols effectively create a perverse incentive structure by failing to compensate researchers for real discoveries while leaving vulnerabilities in place for attackers to exploit.The attack itself was not opportunistic. ZetaChain's post-mortem reveals the attacker funded their wallet through Tornado Cash three days before the exploit, deployed a purpose-built drainer contract on ZetaChain, and ran an address poisoning campaign before executing the attack across nine transactions on four chains including Ethereum, Arbitrum, Base, and BSC.

    The exploit combined three individually minor design flaws: the gateway allowed unrestricted arbitrary cross-chain instructions, the receiving end would execute almost any command on any contract with a blocklist too narrow to catch basic token transfer functions, and wallets that had previously used the gateway had left unlimited spending permissions in place that were never cleaned up. By chaining all three, the attacker instructed the gateway to transfer tokens from victim wallets to their own address, and the gateway complied. No user funds were affected, but the incident has prompted ZetaChain to review how it handles bug bounty submissions involving chained attack vectors that appear harmless in isolation but dangerous in combination.

    1 Reply Last reply
    0
    • madmaxM Offline
      madmaxM Offline
      madmax
      wrote last edited by
      #2

      ZetaChain: "we dismissed the bug report as intended behavior" the attacker: "thank you, intended behavior enjoyer"

      1 Reply Last reply
      0


      • Login or register to search.
      Powered by NodeBB Contributors
      • First post
        Last post
      0
      • Categories
      • Recent
      • Tags
      • Popular
      • World
      • Users
      • Groups