From 5dab3574d4d76f25db54dd12b75c996ad885fc75 Mon Sep 17 00:00:00 2001 From: Pascal Marco Caversaccio Date: Thu, 25 Jan 2024 19:36:41 +0100 Subject: [PATCH] =?UTF-8?q?=E2=9E=95=20Add=20Nebula=20Revelation=20Attack?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Signed-off-by: Pascal Marco Caversaccio --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index 36a4cc3..1996540 100644 --- a/README.md +++ b/README.md @@ -79,6 +79,7 @@ A chronological and (hopefully) complete list of reentrancy attacks to date. - [Peapods Finance attack](https://twitter.com/0xaxxe/status/1735639662687854908) – 13 December 2023 | [Victim contract](https://etherscan.io/address/0xdbB20A979a92ccCcE15229e41c9B082D5b5d7E31), [Exploit contract](https://etherscan.io/address/0x928B2DAe97FC5d40Cb0552815fb5ab071103e20a), [Exploit transaction](https://etherscan.io/tx/0x98d8237027797a51b1251aa239d1a85b7a209d15c9f7895b44b4ee7ee0c754fb) - [NFT Trader attack](https://twitter.com/0xCygaar/status/1736056050816876626) – 16 December 2023 | [Victim contract](https://etherscan.io/address/0x13d8faF4A690f5AE52E2D2C52938d1167057B9af), [Exploit contract](https://etherscan.io/address/0xc446e0A1E22B54e18303022FF8C5c8AB364d6ebb), [Exploit transaction](https://etherscan.io/tx/0x906d06acd236c48a8c8708d7dc50d968b8faad7c7c393e7c01549adf4922b180) - [GoodDollar attack](https://twitter.com/MetaSec_xyz/status/1736428284756607386) – 16 December 2023 | [Victim contract](https://etherscan.io/address/0x0c6C80D2061afA35E160F3799411d83BDEEA0a5A), [Exploit contract](https://etherscan.io/address/0xF06Ab383528F51dA67E2b2407327731770156ED6), [Exploit transaction](https://etherscan.io/tx/0x726459a46839c915ee2fb3d8de7f986e3c7391c605b7a622112161a84c7384d0) +- [Nebula Revelation attack](https://twitter.com/NBLGAME/status/1750540148050391210) – 25 January 2024 | [Victim contract](https://optimistic.etherscan.io/address/0x5499178919C79086fd580d6c5f332a4253244D91), [Exploit contract](https://optimistic.etherscan.io/address/0xE4D41BDD6459198B33Cc795ff280cEE02d91087b), [Exploit transaction](https://optimistic.etherscan.io/tx/0xf4fc3b638f1a377cf22b729199a9aeb27fc62fe2983a65c4d14b99ee5c5b2328) > Some of the exploits carried out involve multiple separate transactions as well as multiple victim and exploit contracts. For each attack, I have listed the most affected victim contract, the most critical exploit contract, and the most devastating exploit transaction.