A story about @blast — or how you could’ve been drained to zero. While building on Blast, I stumbled onto something big. The Blast wallet supports transaction batching (EIP‑5792). But here’s the catch: If you batch transactions in a certain order, only the first transaction in the batch is shown to the user. Everything after that? Auto‑signed. Zero visibility. This means a malicious dApp could slip in unlimited token approvals behind an innocent‑looking “mint NFT” click. The user thinks they minted a free NFT (because that’s the only transaction the Blast wallet showed them). In reality, they just gave an attacker the right to drain every ERC‑20 they own. For context, I recently deployed an app on Blast and checked some stats using their API: • 148 installs for unblur in just 4 days • $665,843 sitting in the wallets of just 19 users who interacted Scale that up (think “free mint” for an upcoming hyped project) and you’re staring at a multi‑million dollar risk. Even if users’ funds were staked somewhere, the moment they withdraw, the attacker could sweep everything instantly. I disclosed the bug. Blast patched it in 7 days, labeled it “medium” severity, and sent me a $10k bounty. Here’s the question, though: with the potential to drain $1M+, is a $10k bounty really enough to incentivize reporting vs exploiting?
5,666
0
本頁面內容由第三方提供。除非另有說明,OKX 不是所引用文章的作者,也不對此類材料主張任何版權。該內容僅供參考,並不代表 OKX 觀點,不作為任何形式的認可,也不應被視為投資建議或購買或出售數字資產的招攬。在使用生成式人工智能提供摘要或其他信息的情況下,此類人工智能生成的內容可能不準確或不一致。請閱讀鏈接文章,瞭解更多詳情和信息。OKX 不對第三方網站上的內容負責。包含穩定幣、NFTs 等在內的數字資產涉及較高程度的風險,其價值可能會產生較大波動。請根據自身財務狀況,仔細考慮交易或持有數字資產是否適合您。