RigoBlock Missing Access Controls: Revision history

Jump to navigation Jump to search

Diff selection: Mark the radio buttons of the revisions to compare and hit enter or the button at the bottom.
Legend: (cur) = difference with latest revision, (prev) = difference with preceding revision, m = minor edit.

11 July 2023

5 March 2023

28 January 2023

  • curprev 10:4910:49, 28 January 2023Azoundria talk contribs 7,272 bytes +7,272 Created page with "{{Imported Case Study|source=https://www.quadrigainitiative.com/casestudy/rigoblockmissingaccesscontrols.php}} thumb|RigoBlockRigoBlock had an exploit on their smart contract hot wallet, where the access controls had not been set up properly. The protocol was exploited and 160.86 ETH was taken. The attacker later returned 90% of the funds, keeping the remaining 10% as a bounty. The returned funds are anticipated to be redistributed to affected use..."