Interesting BSC transactions exploiting EIP-7702’s EOA code delegation.
Here are interesting BSC transactions exploiting EIP-7702’s EOA code delegation. Initial analysis suggested a $350K loss via a suspected force-swap attack, but the hardcoded tx.origin (0xbf073e9eb8a345d2e33e70c6e1f60b0cb6e85f9a) validation in the contract reveals a possible self-orchestrated honeypot. Key steps executed via tx.origin: 1. Initial Price Manipulation: Conducted multiple CSM→USDT swaps across multiple EIP-7702 EOAs (each bypassing single-transaction amount limits) to devalue CSM. 2. CSM Accumulation: Bought CSM using USDT. 3. Reverse Price Manipulation: Conducted multiple USDT→CSM swaps across multiple EIP-7702 EOAs to inflate CSM. 4. Profit Realization: Converted accumulated CSM to USDT for profit. One of the TXs:
1,330
0
本頁面內容由第三方提供。除非另有說明,OKX 不是所引用文章的作者,也不對此類材料主張任何版權。該內容僅供參考,並不代表 OKX 觀點,不作為任何形式的認可,也不應被視為投資建議或購買或出售數字資產的招攬。在使用生成式人工智能提供摘要或其他信息的情況下,此類人工智能生成的內容可能不準確或不一致。請閱讀鏈接文章,瞭解更多詳情和信息。OKX 不對第三方網站上的內容負責。包含穩定幣、NFTs 等在內的數字資產涉及較高程度的風險,其價值可能會產生較大波動。請根據自身財務狀況,仔細考慮交易或持有數字資產是否適合您。