skip to Main Content
bitcoin
Bitcoin (BTC) $ 98,806.47 0.37%
ethereum
Ethereum (ETH) $ 3,315.53 1.79%
tether
Tether (USDT) $ 1.00 0.01%
solana
Solana (SOL) $ 256.11 0.30%
bnb
BNB (BNB) $ 627.19 0.47%
xrp
XRP (XRP) $ 1.47 21.95%
dogecoin
Dogecoin (DOGE) $ 0.414994 7.50%
usd-coin
USDC (USDC) $ 1.00 0.07%
cardano
Cardano (ADA) $ 1.02 24.98%
staked-ether
Lido Staked Ether (STETH) $ 3,316.00 1.75%

zkSync DEX Merlin Exploited for Over $1.8M After Code Audit

Ethereum-based decentralized exchange (DEX) Merlin, which uses zero-knowledge sync (zkSync), has lost more than $1.8 million in a liquidity pool exploit hours after smart contract security firm CertiK audited its code.

The hack occurred on Wednesday morning during the public sale of Merlin’s native token, MAGE, with the attacker siphoning several assets, including USD Coin (USDC), Ether (ETH), and other illiquid tokens.

Merlin’s LP Drained After Code Audit

A few hours after the exploit, CertiK tweeted that it was investigating the incident and working to understand its impact on the community. The security firm disclosed that its initial findings suggested that a private key management issue may have led to the hack and not an exploit, as widely believed.

CertiK said it pointed out the centralization risk in the recent audit report for Merlin under the “Decentralization Efforts” section. The firm insisted that while audits could not prevent private key issues, they always ensured to highlight better practices for projects.

As claimed in the audit dated April 24, 2023, CertiK recommended that Merlin improve its centralized roles to a decentralized mechanism like multi-signature wallets to enhance security practices. The firm also asked the protocol to implement a timelock feature with a latency of at least 48 hours to avoid a single point of key management failure. CertiK has also promised to work with appropriate authorities if any foul play is discovered.

“We encourage all community members to review this information and all audits fully. As we navigate this challenging situation, we want to assure you that we are taking all necessary measures to protect our community’s interests,” CertiK said.

Malicious Code Detected

Interestingly, eZKalibur, another zkSync DEX and launchpad, revealed it had identified the malicious code that enabled the hackers to drain Merlin’s funds. The DEX said it found two lines of code in the initialize function that gave the feeTo address approval to transfer an unlimited amount of tokens from the contract’s address.

Meanwhile, the Merlin team has asked users to revoke access to the connected site on their wallets as they analyze the cause of the exploit.

The post zkSync DEX Merlin Exploited for Over $1.8M After Code Audit appeared first on CryptoPotato.

Loading data ...
Comparison
View chart compare
View table compare
Back To Top