📢 Gate Square Exclusive: #WXTM Creative Contest# Is Now Live!
Celebrate CandyDrop Round 59 featuring MinoTari (WXTM) — compete for a 70,000 WXTM prize pool!
🎯 About MinoTari (WXTM)
Tari is a Rust-based blockchain protocol centered around digital assets.
It empowers creators to build new types of digital experiences and narratives.
With Tari, digitally scarce assets—like collectibles or in-game items—unlock new business opportunities for creators.
🎨 Event Period:
Aug 7, 2025, 09:00 – Aug 12, 2025, 16:00 (UTC)
📌 How to Participate:
Post original content on Gate Square related to WXTM or its
The transient storage vulnerability led to a $300,000 Hacker attack on the Ethereum project.
An On-Chain Heist Triggered by Transient Storage: The $300,000 Loss Behind It
On March 30, 2025, an Ethereum on-chain leveraged trading project named SIR.trading was attacked, resulting in asset losses exceeding $300,000. The security team conducted an in-depth analysis of the incident, revealing the details and reasons behind the attack.
Event Background
Attackers exploited the transient storage feature introduced in Solidity version 0.8.24. This new data storage location is designed to provide a low-cost, transaction-effective temporary storage method. The main features of transient storage include:
Source of Attack
The root cause of the attack lies in the fact that the values stored transiently using tstore in the function are not cleared after the function call ends. This allows attackers to construct specific malicious addresses to bypass permission checks and transfer tokens out.
Attack Process
The attacker creates two malicious tokens A and B, and creates pools for these two tokens on a certain DEX and injects liquidity.
The attacker calls the initialize function of the Vault contract to create a leveraged trading market using token A as collateral and token B as the debt token.
The attacker calls the mint function of the Vault contract, depositing the debt token B to mint leveraged tokens. During this process, the DEX pool address and the minting amount are temporarily stored.
The attacker creates a malicious contract with an address that matches the previously transiently stored minting amount.
The attacker successfully bypassed the permission check by calling the callback function of the Vault contract through a malicious contract, as the value in the transient storage was not cleared.
Finally, the attacker directly calls the callback function of the Vault contract by attacking the contract, transferring out other tokens (such as WBTC, WETH) to make a profit.
Capital Flow Analysis
According to the data from on-chain analysis tools, the attacker stole approximately $300,000 worth of assets, including:
These assets were then converted to WETH and ultimately transferred to an anonymous tool. The attacker's initial funding source was 0.3 ETH transferred from that tool.
Security Recommendations
To prevent similar attacks, the project party should:
This incident again emphasizes the importance of maintaining a balance between security and the application of new technologies in blockchain project development. As technology continues to evolve, developers and security experts need to remain vigilant and promptly identify and respond to new security challenges.