PANews reported on March 21 that according to the latest smart contract security audit series of articles released by SlowMist, an attack method that uses CREATE and CREATE2 to achieve "different contracts at the same address" deployment has attracted attention. The attacker first deploys a security contract to obtain authorization, then self-destructs and rebuilds the malicious contract with the same deployment path, inducing the contract to execute malicious logic through delegatecall , which may lead to the hijacking of DAO governance rights. SlowMist recommends that developers record and verify code hashes, use delegatecall prudently, and be wary of the risk of deployment address reuse caused by contract self-destruction.
SlowMist reveals CREATE/CREATE2 redeployment attack and defense strategy
- 2025-03-23
In the past 24 hours, the total network contract liquidation was 106 million US dollars, both long and short positions were liquidated
- 2025-03-23
Bounce Brand: The team did not participate in any AUCTION price manipulation and voluntarily locked approximately 1.5 million tokens from funds and team allocations
- 2025-03-23
Two Bounce Finance multi-signature addresses deposited 1.55 million AUCTION into Team Finance and locked it
- 2025-03-23
SlowMist Cosine: Coinbase was attacked by the GitHub Actions CI/CD mechanism supply chain
- 2025-03-23
ZetaChain has reached cooperation with many companies including Google Cloud, Deutsche Telekom, Alibaba Cloud, etc.
- 2025-03-22
In the past 24 hours, the total network contract liquidation was 116 million US dollars, mainly short orders