Officer's Blog

Posted on Apr 13, 2023Read on Mirror.xyz

Spotter Digest №5

In the upcoming digest piece, we’ll go over more specifics and gradually increase the capabilities of our Pessimistic Spotter on-chain monitoring & defense service!

Photo by David Cenciotti + Photomosh | Kopp–Etchells effect Explained | Another Explanation

So today, in the following digest piece, we’ll talk about the most recent news, how it affects (and will affect) industry and our Spotter project, and, of course, we’ll explain our Pessimistic Spotter on-chain monitoring & defense service functionality in a more detailed way!

According to the questions, the audience has several points that need to be discussed further. That’s exactly what we’ll do next!

Follow:

Check out:

https://blog.pessimistic.io/spotter-digest-4-9dd72c75d32f

https://blog.pessimistic.io/spotter-digest-3-ad8c5c09210b

https://blog.pessimistic.io/spotter-digest-2-5e4efb2c0340

https://blog.pessimistic.io/spotter-digest-1-2f01afca88e0

https://blog.pessimistic.io/how-to-defend-your-castle-innovative-trio-in-smart-contract-security-monitoring-prevention-c8885304035a


Yearn Security Incident: 13.04.2023

It is important to note — AAVE was not hacked, this incident only affected Yearn. To understand the details — read about Flash Loan attacks here and here!

The system successfully operated and took action very quickly (it recognized an attack and thus performed the first step — detection), demonstrating once more that it is possible to then pause contracts, launch counterattacks, and take other actions when connecting the experimental part of the Spotter to the supported project…

https://twitter.com/urbittesweet/status/1646398065757265920?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E1646398065757265920%7Ctwgr%5E14a7542466a90bc78032de3a06a94999e00565f0%7Ctwcon%5Es1_&ref_url=https%3A%2F%2Fcdn.embedly.com%2Fwidgets%2Fmedia.html%3Ftype%3Dtext2Fhtmlkey%3Da19fcc184b9711e1b4764040d3dc5c07schema%3Dtwitterurl%3Dhttps3A%2F%2Ftwitter.com%2Furbittesweet%2Fstatus%2F1646398065757265920image%3Dhttps3A%2F%2Fi.embed.ly%2F1%2Fimage3Furl3Dhttps253A252F252Fabs.twimg.com252Ferrors252Flogo46x38.png26key3Da19fcc184b9711e1b4764040d3dc5c07

It is important to note — AAVE was not hacked, this incident only affected Yearn. To understand the details — read about Flash Loan attacks here and here!

To put it another way, our system operates in an experimental mode, and the test indicated that we (as well as the Yearn team!) would have sufficient time (15 minutes ❗️) to respond:

t.me/pessimistic_spotter_public/65

There were at least three different approaches that we actually could take in order to counteract this attack, presuming that it would occur to the supported protocol in the same manner that it occurred to AAVE & Yearn (attacker used a public pool):

https://twitter.com/urbittesweet/status/1646391151900114944?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E1646391151900114944%7Ctwgr%5E47fbdc246e3848bc4c046107f5fea468d3ca3de0%7Ctwcon%5Es1_&ref_url=https%3A%2F%2Fcdn.embedly.com%2Fwidgets%2Fmedia.html%3Ftype%3Dtext2Fhtmlkey%3Da19fcc184b9711e1b4764040d3dc5c07schema%3Dtwitterurl%3Dhttps3A%2F%2Ftwitter.com%2Furbittesweet%2Fstatus%2F1646391151900114944image%3Dhttps3A%2F%2Fi.embed.ly%2F1%2Fimage3Furl3Dhttps253A252F252Fabs.twimg.com252Ferrors252Flogo46x38.png26key3Da19fcc184b9711e1b4764040d3dc5c07

It is important to mention that currently our system does not counter-attack (and currently does monitoring only) as we first need to sign a contract with the protocol!

https://library.dedaub.com/ethereum/address/0x8102ae88c617deb2a5471cac90418da4ccd0579e/overview

Btw, a “fun” fact of the happened exploit is that any AAVE USDT debt on v1 got repaid:

https://twitter.com/osec_io/status/1646411672175939585?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E1646411672175939585%7Ctwgr%5E0e38158dfb01b8bf46a9e7c7cc270e6d1282894d%7Ctwcon%5Es1_&ref_url=https%3A%2F%2Fcdn.embedly.com%2Fwidgets%2Fmedia.html%3Ftype%3Dtext2Fhtmlkey%3Da19fcc184b9711e1b4764040d3dc5c07schema%3Dtwitterurl%3Dhttps3A%2F%2Ftwitter.com%2Fosec_io%2Fstatus%2F1646411672175939585image%3Dhttps3A%2F%2Fi.embed.ly%2F1%2Fimage3Furl3Dhttps253A252F252Fabs.twimg.com252Ferrors252Flogo46x38.png26key3Da19fcc184b9711e1b4764040d3dc5c07

Nevertheless, we have confirmed the theoretical possibility of active protection and will continue our research in this direction!

Here is the technology that I described in 2020, and it is similar to the implementation of roughly the same web2-origin thing but in blockchain. This is exactly the idea we want to convey — there are already working bundles, you just need to properly adapt them to the data-layer.

There are more specific things in our distant plans: for example, if the Health Factor of the certain collateral changes (for lending protocolsexamples), or if the protocol you are using is hacked (that’s a custom thing), it can alert the active protection system located either on your own or on our server (and built under our control), which will then make an emergency withdrawal and save your position/assets.

Attack TLDR:

https://decrypt.co/126194/older-versions-of-aave-yearn-finance-exploited-11-6m

Simultaneously, we intend to make it the most convenient for both projects & average users and will adhere to this paradigm!


Pessimistic News

Some news from our ‘‘parent’’ auditing company that we think is important enough to mention!

https://officercia.mirror.xyz/TU9__AcmdWlGuXfN8FQlKvh42gs6V1VbS7vOt0iz3kA


We also hope for your support because we think this market is crucial, first and foremost for the overall security of our industry! You can subscribe to our blog to make sure you don’t miss any of the regular news and updates we plan to publish on the project in a special digest!

In the following articles we will gradually expand the functionality of our service and provide an opportunity to test it on your system. We’ll let you know the release date soon, stay tuned! 🙂

Photo by David Cenciotti + Photomosh | Kopp–Etchells effect Explained | Another Explanation

Thank you very much for your attention!


Support is very important to me, with it I can do what I love — educating users!

If you want to support my work, please consider donating me to the address:

https://github.com/OffcierCia/support

Stay Safe!