The Retrospection of the Poly Network Hack from a Security Researcher perspective

Step 1: Find the attack transaction

Step 2: Analyze the contract code

Step 3: Recover the critical states

Step 4: New clue

Step 5: Locate the source transaction

Step 6: Locate the root cause

Ontology transaction -> Ontology relayer -> Poly chain -> Ethereum relayer -> Ethereum

Lessons

Reference

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store