🚨 DAI Security PSA for wallet providers, block explorers, and users. The L2 DAI deployer (0x075da589886BA445d7c7e81c472059dE7AE65250) for the DAI vanity address (0xDA10009cBd5D07dd0CeCc66161FC93D7c9000da1) has been compromised. (1/7)
1 reply
0 recasts
0 reactions
Anyone use @basename to register an IPFS hash have some example code or documentation on how to read the IPFS hash off that name? All the SDKs and APIs appear to be geared towards name/address resolution.
0 replies
0 recasts
0 reactions
Top casts
Anyone use @basename to register an IPFS hash have some example code or documentation on how to read the IPFS hash off that name? All the SDKs and APIs appear to be geared towards name/address resolution.
0 replies
0 recasts
0 reactions
🚨 DAI Security PSA for wallet providers, block explorers, and users. The L2 DAI deployer (0x075da589886BA445d7c7e81c472059dE7AE65250) for the DAI vanity address (0xDA10009cBd5D07dd0CeCc66161FC93D7c9000da1) has been compromised. (1/7)
1 reply
0 recasts
0 reactions
If you're using DAI on Optimism or Arbitrum, your funds are SAFU, and the attacker cannot touch your DAI https://x.com/godsflaw/status/1415424173695016964. However, this is not the case for other networks. (2/7)
1 reply
0 recasts
0 reactions
The DAI address was originally generated with the Profanity vanity address tool, later found to have a vulnerability documented here: https://blog.1inch.io/a-vulnerability-disclosed-in-profanity-an-ethereum-vanity-address-tool/. (3/7)