From 2da87dcb69e8ebea0057ef3c63468e1f491ebde7 Mon Sep 17 00:00:00 2001 From: Pascal Marco Caversaccio Date: Thu, 12 Dec 2024 15:35:47 +0100 Subject: [PATCH] =?UTF-8?q?=E2=9E=95=20Add=20Clober=20Attack?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Signed-off-by: Pascal Marco Caversaccio --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index 29db8aa..f089288 100644 --- a/README.md +++ b/README.md @@ -93,6 +93,7 @@ A chronological and (hopefully) complete list of reentrancy attacks to date. - [Pythia attack](https://x.com/quillaudits_ai/status/1830976830607892649) – 3 September 2024 | [Victim contract](https://etherscan.io/address/0xe2910b29252F97bb6F3Cc5E66BfA0551821C7461), [Exploit contract](https://etherscan.io/address/0x542533536e314180E1B9f00b2c046f6282eb3647), [Exploit transaction](https://etherscan.io/tx/0xee5a17a81800a9493e03164673ac0428347d246aa30cdb124b647787faaabbea) - [Penpie attack](https://blog.penpiexyz.io/penpie-post-mortem-report-1ac9863b663a) – 3 September 2024 | [Victim contract](https://etherscan.io/address/0x6E799758CEE75DAe3d84e09D40dc416eCf713652), [Exploit contract](https://etherscan.io/address/0x4aF4C234B8CB6e060797e87AFB724cfb1d320Bb7), [Exploit transaction](https://etherscan.io/tx/0x56e09abb35ff12271fdb38ff8a23e4d4a7396844426a94c4d3af2e8b7a0a2813)[^10] - [TrustSwap attack](https://github.com/trustswap/teamfinance-stakingpool/blob/main/audit-reports/Bailsec%20-%20Trustswap%20-%20Post%20Mortem%20-%20Final%20Report%20.pdf) – 30 September 2024 | [Victim contract](https://etherscan.io/address/0xd6A07b8065f9e8386A9a5bBA6A754a10A9CD1074), [Exploit contract](https://etherscan.io/address/0x15716E4ec8BD864eFD6dD0927De7e8b180349198), [Exploit transaction](https://etherscan.io/tx/0x83952d998cc562f40d0a58b76d563a16f3064ddb116e7b1b4e40298ca80499b8) +- [Clober attack](https://x.com/peckshield/status/1866443215186088048) – 10 December 2024 | [Victim contract](https://basescan.org/address/0x6A0b87D6b74F7D5C92722F6a11714DBeDa9F3895), [Exploit contract](https://basescan.org/address/0x32Fb1BedD95BF78ca2c6943aE5AEaEAAFc0d97C1), [Exploit transaction](https://basescan.org/tx/0x8fcdfcded45100437ff94801090355f2f689941dca75de9a702e01670f361c04) > Some of the exploits carried out involve multiple separate transactions as well as multiple victim and exploit contracts. For each attack, I have listed the most affected victim contract, the most critical exploit contract, and the most devastating exploit transaction.