Author

Topic: ChainSecurity Reveals Ethereum Constantinople Upgrade Activates Reentrancy Attac (Read 98 times)

hero member
Activity: 1470
Merit: 655
unfortunately the Ethereum developers are too caught up into forcing a hard fork as fast as they can on their centralized network that they are blinded to everything else and others have to find their bugs and prevent them from pushing their flaws on top of the mess they have already made in the past couple of years because of their greed for making more money!
sr. member
Activity: 966
Merit: 264
Ethereum’s (ETH) approaching Constantinople upgrade activates vectors for reentrancy attacks, as per ChainSecurity – a smart contract auditing platform, according to a Medium report on January 15, 2019. A reentrancy attack engages a particular function in a smart contract to be called several times before the smart contract is completely performed.

As per ChainSecurity, post-Constantinople upgrade, the functions “address.transfer(….)” & “address.send(….) are susceptible to attack in Solidity smart contracts. Employing these functions, a malicious attacker can call an attack function on his individual smart contract and slip other user’s ETHs out of the contract.

Read the details in the article of Coinidol dot com, the world blockchain news outlet: https://coinidol.com/chainsecurity-reveals-ethereum-constantinople-upgrade/

Jump to: