Contract vulnerability, bad randomizer
EOS Royale has been attacked by hackers, who have gained around 11,000 EOS. The reason for the break was the vulnerability of the randomizer. The randomizer algorithm for the project generated a random number based on the principle similar to the one here github... using tapos_block_prefix (). Since this information taken from the previous blocks, the hacker was able to calculate the future number and put it on it, winning with a coefficient of 36. Its depleted our balance, causing a total loss of a total size of about 11 thousand EOS.
DISCLAIMER: While Zero Friction LLC has used the best efforts in aggregating and maintaining this database, Zero Friction LLC makes no representations or warranties with respect to the accuracy or completeness, and specifically disclaim any implied warranties of merchantability or fitness for any particular purpose.
Under no circumstances, shall Zero Friction LLC be liable for any loss of profit or funds, any regulatory or governmental penalties, any legal costs, or any other commercial and non-commercial damages, including but not limited to special, incidental, consequential, or other damages from any or all usage of the dataset or information derived from our database.