BlockSec Phalcon: Detected a suspicious transaction targeting MSCST on BSC, with an estimated loss of around $130,000.
Foresight News reported, according to BlockSec Phalcon monitoring, a suspicious transaction targeting MSCST on BSC has been detected, with an estimated loss of approximately $130,000. The vulnerability stems from the lack of access control (ACL) in MSCST's releaseReward() function, allowing attackers to exploit this flaw to manipulate the price of GPC in PancakeSwap pool 0x12da.
Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.
You may also like
Crypto AI Agent protocol HeyElsa announces ELSA tokenomics, with airdrops and incentives accounting for 40%
Trump Says He Will Sue JPMorgan, Accusing It of Improper Conduct on "Debanking" Issues
