handsome
@wizard
🔥 Day 3 of #30daysweb3security @Web3SecurityDAO Today I learnt about the recent hack at @BonqDAO due to oracle price manipulation 🧵
3 replies
0 recast
1 reaction
handsome
@wizard
They should not have used Tellor's no-dispute, instant price -- where an attacker could provide fake data and have BonqDao instantly use it. As an optimistic oracle, time is needed for the system to challenge and reject the false price. This was a known bug reported by Liquity
0 reply
0 recast
0 reaction