A story about @blast — or how you could’ve been drained to zero. While building on Blast, I stumbled onto something big. The Blast wallet supports transaction batching (EIP‑5792). But here’s the catch: If you batch transactions in a certain order, only the first transaction in the batch is shown to the user. Everything after that? Auto‑signed. Zero visibility. This means a malicious dApp could slip in unlimited token approvals behind an innocent‑looking “mint NFT” click. The user thinks they minted a free NFT (because that’s the only transaction the Blast wallet showed them). In reality, they just gave an attacker the right to drain every ERC‑20 they own. For context, I recently deployed an app on Blast and checked some stats using their API: • 148 installs for unblur in just 4 days • $665,843 sitting in the wallets of just 19 users who interacted Scale that up (think “free mint” for an upcoming hyped project) and you’re staring at a multi‑million dollar risk. Even if users’ funds were staked somewhere, the moment they withdraw, the attacker could sweep everything instantly. I disclosed the bug. Blast patched it in 7 days, labeled it “medium” severity, and sent me a $10k bounty. Here’s the question, though: with the potential to drain $1M+, is a $10k bounty really enough to incentivize reporting vs exploiting?
5,369
0
本页面内容由第三方提供。除非另有说明,欧易不是所引用文章的作者,也不对此类材料主张任何版权。该内容仅供参考,并不代表欧易观点,不作为任何形式的认可,也不应被视为投资建议或购买或出售数字资产的招揽。在使用生成式人工智能提供摘要或其他信息的情况下,此类人工智能生成的内容可能不准确或不一致。请阅读链接文章,了解更多详情和信息。欧易不对第三方网站上的内容负责。包含稳定币、NFTs 等在内的数字资产涉及较高程度的风险,其价值可能会产生较大波动。请根据自身财务状况,仔细考虑交易或持有数字资产是否适合您。