GMX V1 Cross-Contract Re-Entrancy Flash Loan Attack: Revision history

Jump to navigation Jump to search

Diff selection: Mark the radio buttons of the revisions to compare and hit enter or the button at the bottom.
Legend: (cur) = difference with latest revision, (prev) = difference with preceding revision, m = minor edit.

28 July 2025

  • curprev 17:4217:42, 28 July 2025Azoundria talk contribs 11,296 bytes +11,296 Created page with "{{Imported Case Study With About|source=https://www.quadrigainitiative.com/casestudy/gmxv1crosscontractreentrancyflashloanattack.php}} {{Unattributed Sources}} thumb|GMX.io Logo/HomepageGMX, a decentralized perpetual exchange supporting leveraged crypto trading on Arbitrum and Avalanche, experienced a major exploit in its V1 protocol due to a re-entrancy vulnerability. An attacker bypassed access controls to manipulate the average short price of BTC,..."