A web3 project contract may have been implanted with malicious code by employees, resulting in a loss of hundreds of thousands of dollars

This article is machine translated
Show original

According to ChainCatcher, a crypto community member Cat (@0xCat_Crypto) revealed that a Web3 startup project lost hundreds of thousands of USDT due to a hardcoded authorization wallet address in the smart contract code.

In the incident, a suspicious contract code was submitted by an employee who denied writing the code, claiming that the malicious code was automatically generated by an AI programming assistant without thorough review. Currently, the ownership of the involved wallet cannot be confirmed, and the source of the code writing is difficult to determine.

Slow Fog's Cosine stated that after preliminary investigation, under environments using Cursor and Claude 3.7 models, the AI auto-completed addresses did not match the malicious address, ruling out the possibility of AI code generation causing harm. The malicious address possessed smart contract owner permissions, resulting in the complete transfer of project funds.

Source
Disclaimer: The content above is only the author's opinion which does not represent any position of Followin, and is not intended as, and shall not be understood or construed as, investment advice from Followin.
Like
Add to Favorites
Comments