#CertiKInsight 🚨
We have seen a flashloan exploit involving CUT token
BSC: 0x7057F3b0F4D0649B428F0D8378A8a0E7D21d36a7
The CUT contract uses ILPFutureYieldContract(_lpFutureYieldContractAddress) at 0x0917914b0A70ee7F1f2460Fcd487696856E31154 which is unverified and contains hidden functionality
1/ The attacker used the FutureYield to manipulate CUT and gain ~$1.4m from the BUSD-CUT pancake pair. The funds are currently held at bscscan.com/address/0x5766d1f0...
2/ The affected pair is 0x83681F67069A154815a0c6C2C97e2dAca6eD3249 which should not be confused with our client sharing the same ticker.
From Twitter
Disclaimer: The content above is only the author's opinion which does not represent any position of Followin, and is not intended as, and shall not be understood or construed as, investment advice from Followin.
Like
Add to Favorites
Comments
Share
Relevant content