On January 8th, Truebit Protocol suffered a critical exploit through an integer overflow vulnerability in its Purchase contract. The attacker leveraged the flaw to mint TRU tokens at nearly zero cost, subsequently draining approximately 8,535 ETH (roughly $26.44M) from the protocol. Security researchers pinpointed the root cause as improper overflow protection in the contract logic. This incident underscores the importance of rigorous code audits and overflow safeguards in smart contract development, especially for protocols handling substantial value. The affected users and the broader community are monitoring the situation closely as details continue to emerge.
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
On January 8th, Truebit Protocol suffered a critical exploit through an integer overflow vulnerability in its Purchase contract. The attacker leveraged the flaw to mint TRU tokens at nearly zero cost, subsequently draining approximately 8,535 ETH (roughly $26.44M) from the protocol. Security researchers pinpointed the root cause as improper overflow protection in the contract logic. This incident underscores the importance of rigorous code audits and overflow safeguards in smart contract development, especially for protocols handling substantial value. The affected users and the broader community are monitoring the situation closely as details continue to emerge.