📢 Gate Square Exclusive: #WXTM Creative Contest# Is Now Live!
Celebrate CandyDrop Round 59 featuring MinoTari (WXTM) — compete for a 70,000 WXTM prize pool!
🎯 About MinoTari (WXTM)
Tari is a Rust-based blockchain protocol centered around digital assets.
It empowers creators to build new types of digital experiences and narratives.
With Tari, digitally scarce assets—like collectibles or in-game items—unlock new business opportunities for creators.
🎨 Event Period:
Aug 7, 2025, 09:00 – Aug 12, 2025, 16:00 (UTC)
📌 How to Participate:
Post original content on Gate Square related to WXTM or its
Poolz was attacked by a Hacker, resulting in a loss of $665,000 across multiple chains.
Poolz was attacked, resulting in a loss of approximately $665,000
Recently, the Poolz platform experienced a serious security incident, resulting in a loss of approximately $665,000. This attack involved multiple blockchains, including Ethereum, BNB Smart Chain, and Polygon.
The attacker exploited an arithmetic overflow vulnerability in the Poolz contract. Specifically, the issue occurs in the getArraySum function within the CreateMassPools function. This function fails to properly handle large numbers when calculating the token amount, leading to an overflow that allows the attacker to acquire a large number of tokens at a very low cost.
The attack process is roughly as follows:
The attacker first exchanged a small amount of MNZ tokens on a certain DEX.
Then called the vulnerable CreateMassPools function. This function was supposed to allow users to create liquidity pools in bulk and provide initial liquidity.
By carefully crafted parameters, the attacker triggered an integer overflow in the getArraySum function. This caused the system to erroneously believe that the attacker had provided a large amount of tokens, while in fact only a very small amount was transferred.
Finally, the attacker withdrew tokens that did not belong to them through the withdraw function, completing the attack.
This incident involves multiple tokens, including MEE, ESNC, DON, ASW, KMON, POOLZ, and others. The attacker has converted some of the profits into BNB, but as of the time of reporting, the funds have not yet been withdrawn.
To prevent similar issues, security experts recommend that developers use newer versions of the Solidity programming language, which automatically perform overflow checks during compilation. For projects using older versions of Solidity, it may be worth considering the use of OpenZeppelin's SafeMath library to prevent integer overflow.
This incident underscores the importance of conducting rigorous security audits in smart contract development, especially when dealing with functions that involve significant computations. It also reminds investors and users to be cautious with emerging DeFi projects and to constantly monitor the security status of these projects.