Hdr_About.jpg

Detail Analysis

link.png

Date:

Status:

Count:

Contributor:

October 26, 2019

info.png

Verified

1

zerofriction.io

Loss Amount:

60,000

info.png

Recovered Amount:

-

Currency:

Dollars, EOS

KYC By:

Audit By:

None

None

info.png

Website:

No data

Twitter:

No data

Discord:

No data

Telegram:

No data

Medium:

No data

Github:

No data

info.png

Key Indicators

Platform:

Type:

Category:

Method:

EOS

Chain Game

Contract Vulnerabilities

Extended Method:

Contract vulnerability, bad randomizer

Data Sources:

info.png

EOS Royale has been attacked by hackers, who have gained around 11,000 EOS. The reason for the break was the vulnerability of the randomizer. The randomizer algorithm for the project generated a random number based on the principle similar to the one here github... using tapos_block_prefix (). Since this information taken from the previous blocks, the hacker was able to calculate the future number and put it on it, winning with a coefficient of 36. Its depleted our balance, causing a total loss of a total size of about 11 thousand EOS.

info.png

DISCLAIMER: While Zero Friction LLC has used the best efforts in aggregating and maintaining this database, Zero Friction LLC makes no representations or warranties with respect to the accuracy or completeness, and specifically disclaim any implied warranties of merchantability or fitness for any particular purpose. 

Under no circumstances, shall Zero Friction LLC be liable for any loss of profit or funds, any regulatory or governmental penalties, any legal costs, or any other commercial and non-commercial damages, including but not limited to special, incidental, consequential, or other damages from any or all usage of the dataset or information derived from our database.