3 Comments

I wanted to learn more about the mechanics of this exploit, and this article delivered. Thank you. Testing in production when we are talking about people’s money leaves a bitter taste in the mouth.

Expand full comment

Great breakdown. What's stopping others from running similar attacks?

Expand full comment

Yearn developers will likely modify the code to prevent similar attacks (tho unclear since they still haven't published a post mortem). Other protocols should also learn from this.

Expand full comment