From 9e5a07b2a8b83f5429b4dc56a514416045b17f63 Mon Sep 17 00:00:00 2001 From: Pascal Marco Caversaccio Date: Tue, 16 Jul 2024 09:54:21 +0200 Subject: [PATCH] =?UTF-8?q?=E2=9E=95=20Add=20Minterest=20Attack?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Signed-off-by: Pascal Marco Caversaccio --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index ffcf255..54a5a02 100644 --- a/README.md +++ b/README.md @@ -87,6 +87,7 @@ A chronological and (hopefully) complete list of reentrancy attacks to date. - [Sumer Money attack](https://x.com/0xNickLFranklin/status/1778986926705672698) – 12 April 2024 | [Victim contract](https://basescan.org/address/0x142017b52c99d3dFe55E49d79Df0bAF7F4478c0c), [Exploit contract](https://basescan.org/address/0x13D27a2D66eA33A4bC581d5fEFB0b2A8dEfe9fE7), [Exploit transaction](https://basescan.org/tx/0x619c44af9fedb8f5feea2dcae1da94b6d7e5e0e7f4f4a99352b6c4f5e43a4661) - [Predy Finance attack](https://predyfinance.medium.com/postmortem-report-on-the-details-of-the-events-of-may-14-2024-8690508c820b) – 14 May 2024 | [Victim contract](https://arbiscan.io/address/0x9215748657319B17fecb2b5D086A3147BFBC8613), [Exploit contract](https://arbiscan.io/address/0x8afFdD350eb754b4652D9EA5070579394280CaD9), [Exploit transaction](https://arbiscan.io/tx/0xbe163f651d23f0c9e4d4a443c0cc163134a31a1c2761b60188adcfd33178f50f) - [Mint Raises Prices attack](https://x.com/0xNickLFranklin/status/1808309614443733005) – 2 July 2024 | [Victim contract](https://bscscan.com/address/0x35F5cEf517317694DF8c50C894080caA8c92AF7D), [Exploit contract](https://bscscan.com/address/0x9485c2950d6C27Fa3f9e87EAda17815a8224A69b), [Exploit transaction](https://bscscan.com/tx/0x1fec78f6433fe230086b673c1f19cc39e32422e80dfabbc7b4b154c3e768d111) +- [Minterest attack](https://minterest.com/blog/minterest-security-incident-post-mortem-report) – 14 July 2024 | [Victim contract](https://mantlescan.xyz/address/0xfa1444aC7917d6B96Cac8307E97ED9c862E387Be), [Exploit contract](https://mantlescan.xyz/address/0x9B506584a0F2176494D5F9C858437b54DF97Bc06), [Exploit transaction](https://mantlescan.xyz/tx/0xb3c4c313a8d3e2843c9e6e313b199d7339211cdc70c2eca9f4d88b1e155fd6bd) > Some of the exploits carried out involve multiple separate transactions as well as multiple victim and exploit contracts. For each attack, I have listed the most affected victim contract, the most critical exploit contract, and the most devastating exploit transaction.