https://www.canonicalllc.com/post/psa-do-this-and-prevent-your-dapp-from-getting-hacked
If you do not understand the nature of the attack, there is a high likelihood you have it in your code. Additionally, mitigating the attack has ramifications around the design and efficiency of smart contracts, which can lead to considerable amounts of redesign if you are not aware of the design constraints early on.
Since Mid-October, every Cardano dApp with publicly accessible smart contract code, has had a similar exploit in their initial smart contract.
Privately, Canonical has reached out to SundaeSwap, MLabs, Well-Typed and IOHK to raise awareness of the issue, and to attempt to prevent new dApps from including it.
A full in-depth description is coming. Additionally, Canonical has been building consensus privately among the Plutus developer community on how to prevent this exploit, initially through best practices, and ultimately via design changes to the Plutus smart contract system.
Edit: bold emphasis added to the words the Cardano cult is most likely to ignore.
[link] [comments]
You can get bonuses upto $100 FREE BONUS when you:
π° Install these recommended apps:
π² SocialGood - 100% Crypto Back on Everyday Shopping
π² xPortal - The DeFi For The Next Billion
π² CryptoTab Browser - Lightweight, fast, and ready to mine!
π° Register on these recommended exchanges:
π‘ Binanceπ‘ Bitfinexπ‘ Bitmartπ‘ Bittrexπ‘ Bitget
π‘ CoinExπ‘ Crypto.comπ‘ Gate.ioπ‘ Huobiπ‘ Kucoin.
Comments