Core issue: Under some smart contract usercases IF you don't wait for enough confirmations before funding a address a third party can redirect your funding transaction to an attacker controlled address stealing your $$$. Works even when your smart contract is 100% correct, /2
-
-
Prikaži ovu nit
-
The standard way of solving this is: 1. use create2, 2. OR to wait a sufficient number of confirmations before sending funds to the smart contract. Under some designs, such as Arwen, this doubles the number confirmations a user must wait. We choose to move to create2. /3
Prikaži ovu nit -
None of this impacts Arwen users. While we are getting close Arwen ETH support hasn't launched yet. I choose to publish this because it is technically interesting and may help others. /4
Prikaži ovu nit -
While I wrote this blog entry, Arwen's ETH smart contracts were a team effort. See: https://github.com/cwcrypto/arwen-eth-contracts/graphs/contributors … /5
Prikaži ovu nit
Kraj razgovora
Novi razgovor -
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.