Blockchain Security Science: Witch Attack
Series review:
Blockchain Security Getting Started Notes (1) | Slow Mist Science
Blockchain Security Getting Started Notes (2) | Slow Mist Science
Blockchain Security Getting Started Notes (3) | Slow Mist Science
- Cross-border dialogue | How do Haier, Fast, Sany, Changhong and other well-known companies view the digital economy?
- Bank of England Governor: Libra-like digital currency will be the best option to replace the dollar system
- The undead black swan: from ICO to IEO
Blockchain Security Getting Started Notes (4) | Slow Mist Science
Blockchain Security Getting Started Notes (5) | Slow Mist Science
Blockchain Security Getting Started Notes (6) | Slow Mist Science
Override access attack
Exceed Authority Access Attack
Take the well-known BetDice game on EOS as an example. Because the routing in the game contract (the customizable event forwarder in EOS) does not strictly check the source account, the ordinary user can access it through the push action. The key operation transfer function in the contract directly bet around the transfer process, resulting in an unauthorized attack. Although BetDice officially fixed the code and strictly restricted the source account, the vulnerability has made the attacker almost no cost. Take nearly 50,000 EOS in the BetDice prize pool. Another example is when the Ethereum uses the solidity version of 0.4.x for contract development. Many contract developers write not only the permission check but also the function visibility when writing the key functions. In this case, The default visibility of the function is public, and malicious users can attack the contract through these key functions that are not restricted.
The Slow Mist Security Team recommends that smart contract developers pay attention to the privilege check of key functions during contract development to prevent key functions from being illegally invoked and causing the contract to be attacked.
Transaction-Ordering Attack
The Slow Mist Security Team recommends that smart contract developers pay attention to the impact of the transaction order on the outcome of the contract when developing the contract, and avoid contract attacks due to different transaction sequences.
Sybil Attack
https://github.com/slowmist/papers/blob/master/EOSIO-P2P-Sybil-Attack/zh.md
The slow fog security team recommends that in the case of building a full node, the server needs to monitor the network connection at the system level. Once an IP connection is found to be abnormal, the script is configured to configure the iptables rule to block the abnormal IP, and the chain developer is working. When the public chain is developed, you should add control to the number of single IP node connections in the P2P module.
Fake Onerror Notification Attack
The Slow Mist Security Team recommends that smart contract developers need to verify the onerror source contract when developing smart contracts to ensure that the contract account is an eosio account to prevent false error notification attacks.
We will continue to update Blocking; if you have any questions or suggestions, please contact us!
Was this article helpful?
93 out of 132 found this helpful
Related articles
- The number said that 50 star blockchain projects fell below the issue price, and more than 10 projects were nearly zero.
- QKL123 market analysis | Bitcoin suddenly pulled up, the altcoin weak linkage (0826)
- Research | What is the impact of Brexit on the digital currency market?
- There is not much time left for EOS: BM has repeatedly hinted at making big things about Bitcoin. Is there really a card to be released?
- Jameson Lopp opens his mind: If I am the President of the United States, I will give $1000 per person per month.
- It is said that many people do not buy bitcoin because of them?
- Exploring Ethereum 2.0: Evolution of Blockchain Incentive System