Monday, August 4, 2025
Social icon element need JNews Essential plugin to be activated.
No Result
View All Result
Crypto now 24
  • HOME
  • BITCOIN
  • CRYPTO UPDATES
    • GENERAL
    • ALTCOINS
    • ETHEREUM
    • CRYPTO EXCHANGES
    • CRYPTO MINING
  • BLOCKCHAIN
  • NFT
  • DEFI
  • METAVERSE
  • WEB3
  • REGULATIONS
  • SCAMS
  • ANALYSIS
  • VIDEOS
MARKETCAP
  • HOME
  • BITCOIN
  • CRYPTO UPDATES
    • GENERAL
    • ALTCOINS
    • ETHEREUM
    • CRYPTO EXCHANGES
    • CRYPTO MINING
  • BLOCKCHAIN
  • NFT
  • DEFI
  • METAVERSE
  • WEB3
  • REGULATIONS
  • SCAMS
  • ANALYSIS
  • VIDEOS
No Result
View All Result
Crypto now 24
No Result
View All Result

Curve Finance and the Vyper Vulnerability: A Technical Post-Mortem Report

August 6, 2023
in Blockchain
Reading Time: 4 mins read
A A
0

[ad_1]

On July 30, 2023, a number of Curve.Fi liquidity swimming pools had been exploited attributable to a latent vulnerability within the Vyper compiler, particularly in variations 0.2.15, 0.2.16, and 0.3.0, leading to roughly $70 million in losses. This brought on panic inside the DeFi neighborhood.

The hacks led to a 5% decline in CRV, Curve’s native token, and triggered fears of contagion results for some DeFi protocols. The lending protocol AAVE gave the impression to be in danger due to an enormous borrow place secured by CRV token collateral.

This report offers a deep-dive into the Vyper compiler’s vulnerability, its root trigger, and the teachings discovered from the incident.

What’s Vyper?

Vyper is a contract-oriented, domain-specific, pythonic programming language focusing on the Ethereum Digital Machine (EVM). Its primary targets embrace simplicity, pythonicity, safety, and auditability.

Re-Entrancy: A Widespread Internet 3.0 Downside

Re-entrancy is a typical downside in blockchain applications. It happens when the management circulate of a contract is relinquished to a different invoked program, permitting the invoked contract to re-enter the unique caller whereas it’s frozen.

Options

The ecosystem has developed two methods to fight re-entrancy assaults: the Checks-Results-Interactions (CEI) sample and re-entrancy guards. Vyper launched a re-entrancy guard on the language stage by way of the particular `@nonreentrant` operate decorator.

Vyper Vulnerability Historic Timeline

The @nonreentrant` decorators had been launched within the v0.1.0-beta.9 launch of Vyper, providing flexibility by permitting a key to be set.

Starting in 2018, the Vyper compiler began a multi-year effort to refactor its structure. This culminated in 2023 with PR#3390.

PR#2308 and PR#2379 had been a part of efforts to make storage allocation smarter and keep away from corruption. Nevertheless, these updates launched bugs, resulting in the “yanking” of v0.2.13 and v0.2.14 releases.

Concern #2393 revealed that re-entrancy guard checks had been failing in v0.2.14, resulting in an overlap in storage.

The v0.2.15 launch tried to repair the corruption however launched a vulnerability the place all `@nonreentrant` decorators inside a Vyper contract would make the most of a singular storage offset no matter their key.

The vulnerability went undetected for a 4-month interval between July 21, 2021, and November 30, 2021.

The v0.3.1 launch resolved the vulnerability by way of two completely different PRs, PR#2439 and PR#2514.

Vulnerability Abstract

Variations Affected: v0.2.15, v0.2.16, v0.3.0

Root Trigger: Improper remediations to re-entrancy guard information corruption points launched in v0.2.13

Vulnerability in Transient:** Cross-function re-entrancy is feasible on all contracts compiled with the inclined variations.

The Vyper workforce has outlined a number of sensible steps to enhance the correctness of sensible contracts compiled with Vyper, together with improved testing, offering builders with higher instruments, tighter suggestions with protocols, and specializing in securing previous releases.

New security-related initiatives inside and past the Vyper workforce embrace:

1. A brief-term, aggressive audit in partnership with Codehawks

2. Bug bounty applications in partnership with Immunefi

3. The Vyper Safety Alliance

4. Collaboration with a number of audit companies

5. Enlargement of the workforce, together with a devoted safety engineering position

6. Collaboration with current safety toolkits

7. Design of a language specification

The Vyper workforce’s dedication to studying from this incident and implementing these initiatives displays their dedication to creating Vyper a rock-solid and safe sensible contract language and compiler challenge.

Picture supply: Shutterstock

[ad_2]

Source link

Tags: curveFinancePostMortemReporttechnicalvulnerabilityVyper
Previous Post

Will Doge’s Price Dip Push Investors Toward Promising Shibie Coin?

Next Post

PoS layer 1 protocols must make 3 ESG changes to improve the user experience

Next Post
PoS layer 1 protocols must make 3 ESG changes to improve the user experience

PoS layer 1 protocols must make 3 ESG changes to improve the user experience

China Targets Overseas Telecom Fraud Leveraging Blockchain, Crypto, Metaverse, and AI

China Targets Overseas Telecom Fraud Leveraging Blockchain, Crypto, Metaverse, and AI

OPNX submits bid to takeover troubled Singapore-based crypto lender Hodlnaut

OPNX submits bid to takeover troubled Singapore-based crypto lender Hodlnaut

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Social icon element need JNews Essential plugin to be activated.

CATEGORIES

  • Altcoin
  • Analysis
  • Bitcoin
  • Blockchain
  • Crypto Exchanges
  • Crypto Mining
  • Crypto Updates
  • DeFi
  • Ethereum
  • Metaverse
  • NFT
  • Regulations
  • Scam Alert
  • Uncategorized
  • Videos
  • Web3

SITE MAP

  • Disclaimer
  • Privacy Policy
  • DMCA
  • Cookie Privacy Policy
  • Terms and Conditions
  • Contact us

Copyright © 2023 Crypto Now 24.
Crypto Now 24 is not responsible for the content of external sites.

No Result
View All Result
  • HOME
  • BITCOIN
  • CRYPTO UPDATES
    • GENERAL
    • ALTCOINS
    • ETHEREUM
    • CRYPTO EXCHANGES
    • CRYPTO MINING
  • BLOCKCHAIN
  • NFT
  • DEFI
  • METAVERSE
  • WEB3
  • REGULATIONS
  • SCAMS
  • ANALYSIS
  • VIDEOS

Copyright © 2023 Crypto Now 24.
Crypto Now 24 is not responsible for the content of external sites.