SlowMist has released a preliminary analysis of the recent attack on the GatewayZEVM contract, identifying a critical vulnerability in the contract's call function. This function lacks proper access control and input validation, allowing any user to construct malicious cross-chain calls. These calls can then be executed on the target chain via a relayer, posing significant security risks.
SlowMist Identifies Key Vulnerability in GatewayZEVM Contract Attack
Disclaimer: The content provided on Phemex News is for informational purposes only. We do not guarantee the quality, accuracy, or completeness of the information sourced from third-party articles. The content on this page does not constitute financial or investment advice. We strongly encourage you to conduct you own research and consult with a qualified financial advisor before making any investment decisions.
