Analysis: Arbitrum froze KelpDAO hacker ETH as system-level transactions injected by the Security Council through ArbOS

robot
Abstract generation in progress

BlockBeats News, April 21 — Dragonfly managing partner Haseeb Qureshi issued an analysis regarding the “Arbitrum Security Council freezing KelpDAO hacker’s 30,766 ETH,” stating that this transaction type is an ArbitrumUnsignedTxType (EIP-2718 type 0x65/101), which is a system-level transaction that cannot be signed by a regular EOA and can only be injected by the Arbitrum Security Council through ArbOS. This operation did not perform chain rollback or history rewriting; functionally, it is a state-level recovery: the attacker’s private key can still sign transactions, but the ETH at that address is transferred by the chain itself. This operation also demonstrates the powers of the Security Council described in Arbitrum’s gradual decentralization documentation under “catastrophic emergency” situations.

ETH0,29%
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
Add a comment
Add a comment
No comments
  • Pin