@Dooggies, @DeMemeTree and the Evil Hacker
The wallet address that created Dooggies collection on Opensea got compromised. Opensea was able to transfer the collection ownership over to a new wallet address. However, Dooggies were “stuck” in the compromised wallet address. The way Opensea’s compromised flag works is purely UI. It simply prevents their javascript code from interacting with the blockchain.
The team was faced with a problem, if the wallet was unlocked the hacker could begin to manually steal NFTs or accept bids.
This is where the magic is involved. To help get the team out of the situation, a program was created that allowed us to take back those NFTs regardless the UI allowed or not. This program was run by Nico in order to bring the Dooggies home for a safe rescue.
Ideally we wanted to send the Dooggies home with batch transfers. So we tested it on Rinkeby.
Activity can be seen here
When the code was delivered, Nico had the genius idea to test on another collection on mainnet. This was crucial because the batch transfer didn’t work on mainnet :( Seen here
@DeMemeTree was unable to determine why it had failed and so the team reverted to transferring the NFTs one at a time instead of batches.
The script was tested locally and sent to Nico. Nico then ran the script on his day off from school :)
We <3 the Dooggies and will go to great lengths to keep them safe