sherlockdefi Profile Banner
SHERLOCK Profile
SHERLOCK

@sherlockdefi

Followers
24K
Following
7K
Media
1K
Statuses
6K

The Global Leader in Blockchain Security

Joined February 2021
Don't wanna be here? Send us removal request.
@sherlockdefi
SHERLOCK
26 days
We are proud to announce that Sherlock will be hosting an audit contest for the @ethereum Fusaka Upgrade!. We love collaborating with the @ethereumfndn, which always puts security first. Stay tuned for more details to come!
21
38
418
@sherlockdefi
SHERLOCK
22 hours
The @centrifuge Audit Contest coming on October 20th will now have $100k in guaranteed rewards. Don't miss it.
Tweet media one
3
0
42
@grok
Grok
2 days
Generate videos in just a few seconds. Try Grok Imagine, free for a limited time.
697
3K
9K
@sherlockdefi
SHERLOCK
2 days
We are proud to have helped secure @zetablockchain through this discovery. When it absolutely needs to be secure, Sherlock is the right choice.
0
0
1
@sherlockdefi
SHERLOCK
2 days
The Mitigation:. In the Solana Observer's inbound tracker processing, check if the transaction is successful before voting on it.
Tweet media one
1
0
2
@sherlockdefi
SHERLOCK
2 days
What's the impact?. All lamports and SPL tokens deposited in the Solana bridge can be stolen, given that deposits can be forged for any amount (they are processed despite the Gateway program causing the transactions to revert).
1
0
0
@sherlockdefi
SHERLOCK
2 days
The Attack Path:. 1) Any party sends a failing transaction to the gateway with a deposit instruction (or deposit and call). 2) A malicious or negligent observer adds a failing Solana tx that contains Gateway instructions to the inbound tracker using MsgAddInboundTracker,.
1
0
0
@sherlockdefi
SHERLOCK
2 days
External Pre-conditions:. Any party sends a failing transaction to the gateway with a deposit instruction (or deposit and call). The recipient of the ZRC20 Sol on Zetachain withdraws it and receives lamports on Solana.
1
0
0
@sherlockdefi
SHERLOCK
2 days
Internal Pre-conditions:. A malicious or negligent observer adds a failing Solana tx that contains Gateway instructions to the inbound tracker using MsgAddInboundTracker, resulting in all validators processing and voting to mint ZRC20 Sol on Zetachain. The CCTX receives.
1
0
1
@sherlockdefi
SHERLOCK
2 days
The root cause of this vulnerability:. The ProcessInboundEvents function does not require a transaction to have succeeded, unlike the EVM inbound observer, which does this correctly here. Since the instruction is decoded as if it succeeded, a malicious observer can spoof a.
1
0
0
@sherlockdefi
SHERLOCK
2 days
Normally, observers don't process failing transactions, but this code path fails to perform the same validation as its EVM counterpart. While this requires a "privileged" role, every validator is an observer, and BFT consensus is supposed to be byzantine tolerant, i.e., tolerate.
1
0
0
@sherlockdefi
SHERLOCK
2 days
Here is @bernd_eth's summary of the vulnerability:. 1. ZetaChain’s observers monitor transactions on external chains (e.g., Ethereum, Solana) and add them to a centralized inbound tracker to process them as deposits and withdrawals, assuming transaction success. 2. Unlike the.
1
0
1
@sherlockdefi
SHERLOCK
2 days
Welcome back to Sherlock's Vulnerability Spotlight, where we highlight an impactful vulnerability uncovered during a Sherlock audit. This week, we have Deposit Spoofing. It was uncovered by @0xalpharush & @bernd_eth on the @zetablockchain Cross-Chain Contest. 🧵
Tweet media one
2
1
17
@sherlockdefi
SHERLOCK
5 days
Sherlock is excited to announce that another smart contract security assessment is complete for @1inch. Over time, @1inch has demonstrated their unwavering commitment to security, and we are honored to work alongside them.
Tweet media one
0
0
8
@sherlockdefi
SHERLOCK
7 days
RT @BMXDeFi: We're livestreaming w/ @ImmutableAlpha from @SherlockDeFi, a leader in blockchain security!
0
7
0
@sherlockdefi
SHERLOCK
8 days
A clear, comprehensive focus on security - exactly what users should expect as @getaxal prepares to launch Axal Yield.
@getaxal
Axal
8 days
.@SherlockDeFi has been with us every single step of our extremely rigorous audit. They’ve worked with @Ethereum, @Arbitrum, and now us for maximum safety of our users' funds. Our complete audit report will be available online. Safe, transparent, and trustable: that’s Axal
Tweet media one
2
2
19
@sherlockdefi
SHERLOCK
9 days
‼️ @dhedgeorg dHEDGE Update contest is live!! ‼️.
1
1
13
@sherlockdefi
SHERLOCK
9 days
We are proud to have helped secure @symbioticfi through this discovery. When it absolutely needs to be secure, Sherlock is the right choice.
0
0
1
@sherlockdefi
SHERLOCK
9 days
The Mitigation:. The voting power of such operators ( X=0, Y=0, and isNonSigner set to false) should not be added to the total aggregated power, and additionally, the aggregated key should not contain the keys.
1
0
1
@sherlockdefi
SHERLOCK
9 days
What's the impact?. The network is compromised, and the attacker can do whatever they want. The Operator role is permissionless for some networks (depending on extensions), and even if it wasn't, they would still be able to completely bypass the quorum, which is a high-severity.
1
0
0
@sherlockdefi
SHERLOCK
9 days
The Attack Path:. An operator with 1 voting power (or any minimal amount) calls Settlement::commitValSetHeader() with a malicious header for the next epoch to compromise the network. They send a proof with only them as signer, all other operators are non-signers, and add at the.
1
0
1
@sherlockdefi
SHERLOCK
9 days
This effectively means that any operator with any minimal voting power can add this (0,0) operator with a voting power that exceeds the quorum and let the message go through. As a result, they can manipulate whatever data they want and take full control of the network, more.
1
0
1