Resource Bank to more front running examples
This page is a open resource where any examples of front running found in bug bounties, audit reports or live attacks are to be added here.
Last updated
This page is a open resource where any examples of front running found in bug bounties, audit reports or live attacks are to be added here.
Last updated
1) contains multiple front-run vulnerabilities
2) where Malicious actors can avoid penalty: A DAO member may be able to predict when they will be penalized if they monitor the mempool for events related to the penalize function on the contract. This member can then avoid penalization by transferring their balance to another address and sending it back to the original account after the next block. Since the penalty transaction will revert if the amount is greater than the balance, an attacker could potentially frontrun the penalty by calling the exit function with a miniscule amount of ETH. They could also exit the DAO completely. This loophole provides potential incentive for malicious actors to exploit the DAO.
3)
4)
5)
6)
7)
8)
9)
10)
Any questions so far?