Z123 Smart Contract Vulnerability: Revision history

Jump to navigation Jump to search

Diff selection: Mark the radio buttons of the revisions to compare and hit enter or the button at the bottom.
Legend: (cur) = difference with latest revision, (prev) = difference with preceding revision, m = minor edit.

14 May 2024

  • curprev 10:4810:48, 14 May 2024Azoundria talk contribs 9,386 bytes +1,587 COMPLETE 30 minutes. Added many additional sources from Twitter. Inquiring to get more information from security researchers. Attempted to better integrate technical analysis from Nick. Tag: Visual edit

13 May 2024

  • curprev 15:2215:22, 13 May 2024Azoundria talk contribs 7,799 bytes +7,799 Created page with "{{Imported Case Study|source=https://www.quadrigainitiative.com/casestudy/z123smartcontractvulnerability.php}} {{Unattributed Sources}} thumb|Generic ImageZ123 was a popular token with over 3,000 holders. Unfortunately the smart contract was vulnerable to price manipulation, which allowed an attacker to take $136k from the liquidity pools. This is a global/international case not involving a specific country.<ref name="slowmisthackedarchive-..."