A Full Analysis of the MonoX Attack

Incident analysis

Figure 1 exchange WETH for MONO
Figure 2 _removeLiquidity source code
Figure 3 The details of internal calls to remove liquidity for the first time
Figure 4 Remove all liquidity in the MONO pool in Monoswap
Figure 5 Add liquidity in the attack contract
Figure 6 Source code of swapIn function
Figure 7 Parameter calculation of the exchange process
Figure 8 Price calculation after exchange
Figure 9 Source code of swapOut function
Figure 10 Initial MONO price
Figure 11 Repeated exchanges, raising the price of MONO
Figure 12 MONO exchange details
Figure 13 Final MONO price

Incident review

--

--

--

Blockchian Security · IDE · Beosin-VaaS · Formal Verification · SAS | China leading enterprise in blockchain security field

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

The Integrity and Non-repudiation (INR) pair system

GGT Will be Available on CoinTiger on 2 June. 1,200 USDT to Give Away!

Things You Must Know About the Man in the Middle Attack-ARP Spoofing, DNS Spoofing, and SSL…

50 Shades of GDPR

OTP Bypass Account Takeover to Admin Panel — Ft. Header Injection

NOVA Will be Available on CoinTiger on 7 September. 2,500 NOVA to Give Away!

TERA Will be Available on CoinTiger on 1 March.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
BEOSIN

BEOSIN

Blockchian Security · IDE · Beosin-VaaS · Formal Verification · SAS | China leading enterprise in blockchain security field

More from Medium

SAP Central Finance — Reconciliation Approach

Best DirectAdmin VPS Hostings

Team 5- Mood Board & Style Tiles

“ttinolja Co., Ltd.” a hotel supply business agreement with the “WHA(World Hotel associaton)”