ranger.degen.eth 🥷
@just-nath
To make it simpler : A malicious actor creates a fake token contract like fake RAIL with a backdoored permit function that allows them to forge signatures and steal tokens from users. How It Works: 1. permit is supposed to use ecrecover to verify user signatures before allowing token approvals. 2. The scam contract removes ecrecover and uses custom assembly code to bypass signature checks. 3. This lets the attacker generate fake approvals and drain tokens from any user who interacted with the contract. Red Flags: I. permit function with weird inline assembly II. No ecrecover in signature logic III. Recently deployed or unverified token contracts IV. Token name copies a real project If a token has a permit function with custom assembly and no ecrecover, it’s likely malicious. Don’t interact with it , you could lose your tokens.
3 replies
3 recasts
3 reactions
Smokerings
@smokerings
So many bad actors
0 reply
0 recast
0 reaction