From 0853079b273f3b6a1733e201a108e3cbdaf2679d Mon Sep 17 00:00:00 2001 From: Pascal Marco Caversaccio Date: Thu, 29 Feb 2024 14:15:11 +0100 Subject: [PATCH] =?UTF-8?q?=E2=9E=95=20Add=20The=20Smoofs=20Attack?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Signed-off-by: Pascal Marco Caversaccio --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index a232565..73914a4 100644 --- a/README.md +++ b/README.md @@ -83,6 +83,7 @@ A chronological and (hopefully) complete list of reentrancy attacks to date. - [Barley Finance attack](https://twitter.com/Phalcon_xyz/status/1751788389139992824) – 28 January 2024 | [Victim contract](https://etherscan.io/address/0x04c80Bb477890F3021F03B068238836Ee20aA0b8), [Exploit contract](https://etherscan.io/address/0x356E7481B957bE0165D6751a49b4b7194AEf18D5), [Exploit transaction](https://etherscan.io/tx/0x995e880635f4a7462a420a58527023f946710167ea4c6c093d7d193062a33b01) - [ChainPaint attack](https://twitter.com/0xNickLFranklin/status/1757186636985798842) – 12 February 2024 | [Victim contract](https://etherscan.io/address/0x52d69c67536f55EfEfe02941868e5e762538dBD6), [Exploit contract](https://etherscan.io/address/0x8d4dE2Bc1a566b266bD4B387f62C21e15474D12a), [Exploit transaction](https://etherscan.io/tx/0x0eb8f8d148508e752d9643ccf49ac4cb0c21cbad346b5bbcf2d06974d31bd5c4) - [Rugged Art attack](https://twitter.com/AnciliaInc/status/1760718167582888148) – 19 February 2024 | [Victim contract](https://etherscan.io/address/0x2648f5592c09a260C601ACde44e7f8f2944944Fb), [Exploit contract](https://etherscan.io/address/0x9bB0cA1E54025232E18f3874F972a851A910E9cB), [Exploit transaction](https://etherscan.io/tx/0x5a63da39b5b83fccdd825fed0226f330f802e995b8e49e19fbdd246876c67e1f) +- [The Smoofs attack](https://twitter.com/AnciliaInc/status/1762893563103428783) – 28 February 2024 | [Victim contract](https://polygonscan.com/address/0x757C2d1Ef0942F7a1B9FC1E618Aea3a6F3441A3C), [Exploit contract](https://polygonscan.com/address/0x367120bf791cc03f040e2574aea0ca7790d3d2e5), [Exploit transaction](https://polygonscan.com/tx/0xde51af983193b1be3844934b2937a76c19610ddefcdd3ffcf127db3e68749a50) > Some of the exploits carried out involve multiple separate transactions as well as multiple victim and exploit contracts. For each attack, I have listed the most affected victim contract, the most critical exploit contract, and the most devastating exploit transaction.