March 14, 2023, 6:09 p.m. | Branch Indigo

System Weakness - Medium systemweakness.com

Photo by Shubham Dhage on Unsplash

The recent whitehat attack on Tender. fi’s lending protocol stole $1.59 million funds from the liquidity pools. Let’s trace back the attack step by step on Arbiscan to see how the exploit took place and discover key vulnerabilities.

Context

Tender. fi is a crypto borrowing and lending platform. Tender protocol is designed on top of Compound’s V2 protocols, which allow users to borrow any supported crypto assets given proportional deposits as collaterals. Unlike compounds, …

assets attack back compound crypto cryptocurrency discover exploit funds hacking key lending liquidity photo platform protocol protocols security solidity trace vulnerabilities web3 whitehat

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC