PANews December 29 News, according to BlockSec Phalcon monitoring, an unknown smart contract MSCST on the BSC chain was subjected to a flash loan attack, with an estimated loss of approximately $130,000. The vulnerability stems from the lack of access control (ACL) in the releaseReward() function of the MSCST contract, allowing attackers to manipulate the price of GPC tokens in the PancakeSwap liquidity pool (0x12da).
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
MSCST project on the BSC chain suffers flash loan attack, loss approximately $130,000
PANews December 29 News, according to BlockSec Phalcon monitoring, an unknown smart contract MSCST on the BSC chain was subjected to a flash loan attack, with an estimated loss of approximately $130,000. The vulnerability stems from the lack of access control (ACL) in the releaseReward() function of the MSCST contract, allowing attackers to manipulate the price of GPC tokens in the PancakeSwap liquidity pool (0x12da).