How the Mirror Protocol got Exploited

1 Attack

1.1 Preparation

1.2. Attack

2. Bug Fix

3. Conclusion




A Blockchain Security and Data Company.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

IDOR vulnerability on invoice and weak password reset leads to account take over

Press release: Legal judgment finds successive foreign secretaries unlawfully gave GCHQ free rein…

How JavaScript Injection Helps In Building A Comprehensive Bot Detection Solution for Web…

Haven Protocol listed!

A review of CRTP and the Attacking and Defending Active Directory Course

Rechnungshof: Disclosure of income of employees and EU right to privacy

OAuth 2.0 Building Blocks

Dark Web: The Frankenstein of Internet

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store


A Blockchain Security and Data Company.

More from Medium

c | Delegatecall (I)

The Foundry EVM Development Environment

Implementing Zero Knowledge Lottery’s Circom circuits Part 1 / 2

The Inside Scoop: Meet Our Team🍦