Web3 firm detects major security flaw in common smart contracts

5 December 2023

Cointelegraph by Martin Young

A security vulnerability potentially affecting hundreds of smart contracts that were pre-built using a commonly used open-source library has been reported by Web3 firm Thirdweb.

1573 Total views
15 Total shares
Listen to article

News

Join us on social networks

Smart contract development firm Thirdweb reported a security vulnerability that potentially “impacts a variety of smart contracts across the Web3 ecosystem.”

On Dec. 4, Thirdweb reported a vulnerability in a commonly used open-source library that could impact specific pre-built smart contracts, including some of its own. However, Thirdweb’s investigations concluded that the smart contract vulnerability has not yet been exploited, allowing a small window of opportunity for Web3 firms to avoid a possible hack.

Highlighting the vulnerability’s potential to cause massive damage if not rectified immediately, Thirdweb stated:

“The impacted pre-built contracts include but are not limited to DropERC20, ERC721, ERC1155 (all versions), and AirdropERC20.”

Following the proactive warning to Web3 ecosystem, the firm cautioned users who deployed its contracts before Nov. 22 to “take mitigation steps” independently or by using a company-provided tool.

IMPORTANT

On November 20th, 2023 6pm PST, we became aware of a security vulnerability in a commonly used open-source library in the web3 industry.

This impacts a variety of smart contracts across the web3 ecosystem, including some of thirdweb’s pre-built smart contracts.…

— thirdweb (@thirdweb)

December 5, 2023

Thirdweb also advised developers to help users revoke approvals on all affected contracts using revoke.cash, “which will protect your users if you choose not to mitigate the contract,” DefiLlama developer “0xngmi” commented on the request to revoke approvals.

btw this seems important, theyre asking to revoke all approvals to third web contracts (you might have interacted with them without knowing as theyre white-labelled, especially if you do stuff around nfts) https://t.co/T1YU9xnIRb

— 0xngmi (@0xngmi)

December 5, 2023

Thirdweb has contacted the maintainers of the open-source library at the root of the vulnerability and contacted other teams potentially impacted by the issue.

It also pledged to increase investment in security measures and double bug bounty payouts from $25,000 to $50,000 while implementing a more rigorous auditing process. The firm also offered a grant to cover contract mitigations.

“We understand that this will cause disruption, and we are treating the mitigation of the issue with the utmost seriousness. We will be offering a retroactive gas grant to cover fees for contract mitigations.”

Full details of the vulnerability were not disclosed for security purposes, and Cointelegraph contacted Thirdweb for further updates but was redirected to the blog post.

Related: 5 smart contract vulnerabilities: How to identify and mitigate them

The firm raised $24 million in a Series A funding round with Haun Ventures, Coinbase, Shopify and Polygon in August 2022.

The Web3 company, which provides multichain smart contract deployment tools for gaming, minting, marketplaces and wallets, claims to have more than 70,000 developers using its services monthly.

Magazine: Real AI use cases in crypto: Crypto-based AI markets, and AI financial analysis

  

You might also like

Open chat
1
BlockFo Chat
Hello 👋, How can we help you?
📱 When you've pressed the BlockFo button, we automatically transfer to WhatsApp 🔝🔐
🖥️ Or, if you use a PC or Mac, then we'll open a new window to load your desktop app.