After SushiSwap was compromised, the head chef stated, “revoke all chains”
SushiSwap has been compromised by an exploit, resulting in the loss of more than $3.3 million from at least one user known on Twitter as 0xSifu.
The exploit entails an approve-related flaw in the RouterProcessor2 contract, which PeckShield and Jared Grey, head chef at SushiSwap, recommend rescinding on all chains.
According to Ancilia, Inc. and in technical terms, the fundamental cause is because the internal swap() function will execute swapUniV3() to set the “lastCalledPool” variable, which is located at storage slot 0x00.” The cybersecurity report adds that “the permission check is bypassed later in the swap3callback function.”
“The initial attacker utilised the “yoink” function due to a flaw in the “approve” mechanism of the sushi swap router contract,” explains The Block Research Analyst Brad Kay.
Only those who have swapped on SushiSwap within the last four days should be affected, according to @0xngmi of DeFi Llama. They also published a list of contracts that should be revoked across all networks and developed a tool to determine if any of your addresses were affected.
According to The Block’s Research Associate Kevin Peng, 190 Ethereum addresses have validated the faulty contract. However, more than 2000 Layer 2 Arbitrum addresses appear to have approved the flawed contract.
In the hour since the news emerged, the price of Sushi’s governance token dropped by only 0.6%. Sushi is “working with security teams to mitigate the issue,” per Grey’s tweet.
Also Read: Arkansas Senate And House Approve Protections For Bitcoin Mining Rights