Exploit update from the Core team. We are deeply sorry for the inconvenience caused, this is an update about the case.
04 Feb 2023, 15:09
Exploit update from the Core team
We are deeply sorry for the inconvenience caused, this is an update about the case.
🔵 The Core team has identified the attacker’s CEX credentials and has reached out to the attacker to return the funds.
🔵 The team will be fixing the issue with an upgrade to prevent any future attacks.
Same news in other sources
2SperaxSPA #905
04 Feb 2023, 21:53
Exploit update.
A community member has posted the analysis of the exploit. The Sperax team has made its own analysis and we are aligned on the findings with the Twitter thread author. The team is working on a more detailed report on this issue and fixing it. Before it is finalized we share this thread with Sperax Community.
Exploit update. A community member has posted the analysis of the exploit.
Exploit update.
A community member has posted the analysis of the exploit. The Sperax team has made its own analysis and we are aligned on the findings with the Twitter thread author. The team is working on a more detailed report on this issue and fixing it. Before it is finalized we share this thread with Sperax Community.
https://twitter.com/danielvf/status/1621965412832350208
SperaxSPA #905
04 Feb 2023, 15:37
Exploit update:
🔵 The core team has figured out the issue and it will be resolved with a contract upgrade.
🔵 A detailed doc explaining the exploit and the fix will be prepared.
Exploit update:. The core team has figured out the issue and it will be resolved with a contract upgrade.
Exploit update:
🔵 The core team has figured out the issue and it will be resolved with a contract upgrade.
🔵 A detailed doc explaining the exploit and the fix will be prepared.