
Detail Analysis

Key Indicators
Platform:
Type:
Category:
Method:
Ethereum
Smart Contract
Contract Vulnerabilities
Extended Method:
Reentrancy attack
Data Sources:
Dogpark’s MemeStake Contract was attacked by what Sanshu Inu believe was a Reentrancy Attack. All pending and future farming & staking rewards were drained from the DogPark MemeStake Contract and sold onto the open market by the attacker. All Keanu staked on the DogPark was exposed to this vulnerability, and this prevented Community Members from unstaking their tokens. The attacker made a profit of about 56 ETH, or $110,881.
DISCLAIMER: While Zero Friction LLC has used the best efforts in aggregating and maintaining this database, Zero Friction LLC makes no representations or warranties with respect to the accuracy or completeness, and specifically disclaim any implied warranties of merchantability or fitness for any particular purpose.
Under no circumstances, shall Zero Friction LLC be liable for any loss of profit or funds, any regulatory or governmental penalties, any legal costs, or any other commercial and non-commercial damages, including but not limited to special, incidental, consequential, or other damages from any or all usage of the dataset or information derived from our database.