
Detail Analysis
Website:
Twitter:
Discord:
Telegram:
Medium:
No data
Github:
No data
Key Indicators
Platform:
Type:
Category:
Method:
Ethereum
Protocol
Lending
Contract Vulnerabilities
Extended Method:
Reentrancy attack
Data Sources:
This morning someone used reentrancy in the contract to get more bHOME than they should have and took some USDC. Most of the funds for the protocol were already safely lent out against homes. The hack is made possible due to a reentrancy bug in the lend() routine so that the hacker can get more lending credits via re-entering the lend() routine.
The issue was found quickly. The contract has been patched and is being reaudited.
The loss is estimated at $1M.
DISCLAIMER: While Zero Friction LLC has used the best efforts in aggregating and maintaining this database, Zero Friction LLC makes no representations or warranties with respect to the accuracy or completeness, and specifically disclaim any implied warranties of merchantability or fitness for any particular purpose.
Under no circumstances, shall Zero Friction LLC be liable for any loss of profit or funds, any regulatory or governmental penalties, any legal costs, or any other commercial and non-commercial damages, including but not limited to special, incidental, consequential, or other damages from any or all usage of the dataset or information derived from our database.