Deep Tide TechFlow News, April 28th, SlowMist states that ZetaChain has been exploited. Preliminary analysis shows that the root cause lies in the call function of its GatewayZEVM contract, which lacks access control and input validation, allowing any user to initiate cross-chain calls via GatewayZEVM and use relayers to perform arbitrary operations on external chains. Specifically, attackers can craft malicious calls on ZetaChain to trigger cross-chain events, which are then captured by ZetaChain relayers and executed as malicious calls on the target chain through TSS, thereby transferring funds.

View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
Add a comment
Add a comment
No comments
  • Pin