A Full Analysis of the MonoX Attack

Incident analysis

Figure 1 exchange WETH for MONO
Figure 2 _removeLiquidity source code
Figure 3 The details of internal calls to remove liquidity for the first time
Figure 4 Remove all liquidity in the MONO pool in Monoswap
Figure 5 Add liquidity in the attack contract
Figure 6 Source code of swapIn function
Figure 7 Parameter calculation of the exchange process
Figure 8 Price calculation after exchange
Figure 9 Source code of swapOut function
Figure 10 Initial MONO price
Figure 11 Repeated exchanges, raising the price of MONO
Figure 12 MONO exchange details
Figure 13 Final MONO price

Incident review

Blockchian Security · IDE · Beosin-VaaS · Formal Verification · SAS | China leading enterprise in blockchain security field

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

A Simple Guide to Keep an App Window Always on Top in Windows 11

Best practices for OIDC authentication in SPAs

There Were Over 23 Typical Security Incidents In March With An Upward Trend…

dForce Launches Governance Venue on Snapshot

{UPDATE} Jungle Dinosaurs Football Penalty Hack Free Resources Generator

Grand QUBE Liquidity Provider Contest 💚 Distribution Of Rewards 📣

SpotGamma Pro ⋆ 06 Months Warranty

IDOS Games Whitelist for Qube is now open!

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
BEOSIN

BEOSIN

Blockchian Security · IDE · Beosin-VaaS · Formal Verification · SAS | China leading enterprise in blockchain security field

More from Medium

Lobotomy in a nutshell

Antonio Egas Moniz

How are the Average Salaries in Saudi Arabia affected by education level, gender, and nationality?

Remote Design Sprint for capstone project: a review

2021 12/04