Skip to content

Commit

Permalink
📝 Etherscan Link for EraLend Attack
Browse files Browse the repository at this point in the history
Signed-off-by: sudo rm -rf --no-preserve-root / <[email protected]>
  • Loading branch information
pcaversaccio authored Jan 8, 2024
1 parent 9e54518 commit e0c32b7
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -70,7 +70,7 @@ A chronological and (hopefully) complete list of reentrancy attacks to date.
- [Arcadia Finance attack](https://arcadiafinance.medium.com/post-mortem-72e9d24a79b0)[^6] – 10 July 2023 | [Victim contract](https://optimistic.etherscan.io/address/0xD417c28aF20884088F600e724441a3baB38b22cc), [Exploit contract](https://optimistic.etherscan.io/address/0x01a4d9089C243CCaEbE40AA224ad0CaB573B83c6), [Exploit transaction](https://optimistic.etherscan.io/tx/0xca7c1a0fde444e1a68a8c2b8ae3fb76ec384d1f7ae9a50d26f8bfdd37c7a0afe)
- [Libertify attack](https://twitter.com/peckshield/status/1678688731908411393)[^7] – 11 July 2023 | [Victim contract](https://polygonscan.com/address/0x9c80a455ecaca7025A45F5fa3b85Fd6A462a447b), [Exploit contract](https://polygonscan.com/address/0xdFcDB5A86b167B3A418F3909D6f7A2f2873F2969), [Exploit transaction](https://polygonscan.com/tx/0x7320accea0ef1d7abca8100c82223533b624c82d3e8d445954731495d4388483)
- [Conic Finance attack](https://medium.com/@ConicFinance/post-mortem-eth-and-crvusd-omnipool-exploits-c9c7fa213a3d) – 21 July 2023 | [Victim contract](https://etherscan.io/address/0xBb787d6243a8D450659E09ea6fD82F1C859691e9), [Exploit contract](https://etherscan.io/address/0x743599BA5CfA3cE8c59691aF5ef279AaaFA2E4EB), [Exploit transaction](https://etherscan.io/tx/0x8b74995d1d61d3d7547575649136b8765acb22882960f0636941c44ec7bbe146)
- [EraLend attack](https://twitter.com/BeosinAlert/status/1683880646811299853) – 25 July 2023 | [Victim contract](https://explorer.zksync.io/address/0x00A1C271df375660f47293fd84B53572fded0107), [Exploit contract](https://explorer.zksync.io/address/0x7d8772DCe73cDA0332bc47451aB868Ac98F335F0), [Exploit transaction](https://explorer.zksync.io/tx/0x99efebacb3edaa3ac34f7ef462fd8eed85b46be281bd1329abfb215a494ab0ef)
- [EraLend attack](https://twitter.com/BeosinAlert/status/1683880646811299853) – 25 July 2023 | [Victim contract](https://era.zksync.network/address/0x00A1C271df375660f47293fd84B53572fded0107), [Exploit contract](https://era.zksync.network/address/0x7d8772DCe73cDA0332bc47451aB868Ac98F335F0), [Exploit transaction](https://era.zksync.network/tx/0x99efebacb3edaa3ac34f7ef462fd8eed85b46be281bd1329abfb215a494ab0ef)
- [Curve attack](https://hackmd.io/@LlamaRisk/BJzSKHNjn)[^8] – 30 July 2023 | [Victim contract](https://etherscan.io/address/0xC4C319E2D4d66CcA4464C0c2B32c9Bd23ebe784e), [Exploit contract](https://etherscan.io/address/0x30FB95794a2051ABe30A67892B3A1FA73947aEE5), [Exploit transaction](https://etherscan.io/tx/0xb676d789bb8b66a08105c844a49c2bcffb400e5c1cfabd4bc30cca4bff3c9801)
- [Earning.Farm attack](https://twitter.com/BeosinAlert/status/1689205260102094853) – 9 August 2023 | [Victim contract](https://etherscan.io/address/0x12Df0C95D2c549bbBC96cf8FbA02cA4Bc541aFD9), [Exploit contract](https://etherscan.io/address/0xFe141C32E36Ba7601D128F0C39DEdBE0F6aBb983), [Exploit transaction](https://etherscan.io/tx/0x6e6e556a5685980317cb2afdb628ed4a845b3cbd1c98bdaffd0561cb2c4790fa)
- [Defiway attack](https://twitter.com/AnciliaInc/status/1709352941541630049) – 3 October 2023 | [Victim contract](https://bscscan.com/address/0x6705d8196D06DA351371b6E0692fC18504ed4864), [Exploit contract](https://bscscan.com/address/0x0Bb02653ca1C3C4915CAE217aa02c16E68Ae381a), [Exploit transaction](https://bscscan.com/tx/0x6becb186ea8d701b2309da51e3420814036b9324dc56b9fb31bfbf96f7958e60)
Expand Down

0 comments on commit e0c32b7

Please sign in to comment.