扫码下载
BTC $78,947.44 +4.70%
ETH $2,398.91 +4.08%
BNB $645.67 +2.59%
XRP $1.45 +2.18%
SOL $88.17 +3.79%
TRX $0.3286 -1.22%
DOGE $0.0972 +3.29%
ADA $0.2535 +3.18%
BCH $464.08 +3.98%
LINK $9.47 +1.63%
HYPE $41.11 +4.28%
AAVE $95.19 +4.33%
SUI $0.9693 +3.53%
XLM $0.1791 +0.88%
ZEC $324.22 +3.16%
BTC $78,947.44 +4.70%
ETH $2,398.91 +4.08%
BNB $645.67 +2.59%
XRP $1.45 +2.18%
SOL $88.17 +3.79%
TRX $0.3286 -1.22%
DOGE $0.0972 +3.29%
ADA $0.2535 +3.18%
BCH $464.08 +3.98%
LINK $9.47 +1.63%
HYPE $41.11 +4.28%
AAVE $95.19 +4.33%
SUI $0.9693 +3.53%
XLM $0.1791 +0.88%
ZEC $324.22 +3.16%

BlockSec:BSC 链 MT 代币买入限制机制存在缺陷,黑客套利约 24.2 万美元

2026-03-10 12:40:03
收藏

ChainCatcher 消息,据 BlockSec 监测,其系统在 BSC 检测到一笔针对 MT-WBNB 资金池的可疑交易,预估损失约 24.2 万美元。原因在于买方限制机制存在缺陷:在通缩模式下,正常买入操作会回退,而路由器 / 交易对则被列入白名单,这使得攻击者可以通过路由器互换和流动性移除绕过限制,从该交易对获取 MT。

攻击者随后出售 MT 以积累 pendingBurnAmount,并调用 distributeFees()直接从交易对中销毁 MT,人为拉高价格,然后再将 MT 兑换回 WBNB 以获利。此外,一条允许前 0.2 MT 转账绕过买家限制的推荐规则,使得攻击者能够启动攻击。

app_icon
ChainCatcher 与创新者共建Web3世界