🎉 Share Your 2025 Year-End Summary & Win $10,000 Sharing Rewards!
Reflect on your year with Gate and share your report on Square for a chance to win $10,000!
👇 How to Join:
1️⃣ Click to check your Year-End Summary: https://www.gate.com/competition/your-year-in-review-2025
2️⃣ After viewing, share it on social media or Gate Square using the "Share" button
3️⃣ Invite friends to like, comment, and share. More interactions, higher chances of winning!
🎁 Generous Prizes:
1️⃣ Daily Lucky Winner: 1 winner per day gets $30 GT, a branded hoodie, and a Gate × Red Bull tumbler
2️⃣ Lucky Share Draw: 10
EIP-7702 vulnerability exploited, attacker siphons off 95 ETH into a mixer
【BitPush】Just reported a contract security incident. An attacker exploited an uninitialized EIP-7702 delegate contract vulnerability, successfully gaining owner permissions of the contract, and then directly withdrew all funds from the delegate address. On-chain monitoring data shows that the attacker has transferred 95 ETH (approximately $280,000) to Tornado Cash for mixing.
The key issue in this incident is the initialization flaw in the EIP-7702 delegate contract—because the contract was not properly initialized during deployment, the attacker was able to seize the owner role at a very low cost. Once controlling the owner permissions, withdrawing funds became a trivial task. After the funds were transferred to Tornado Cash, tracking them became significantly more difficult.
This serves as a reminder for developers to ensure the completeness of the initialization process when deploying delegate contracts, to prevent attackers from exploiting vulnerabilities. For ordinary users, it’s advisable to check whether new contracts have undergone security audits before interacting with them.