Home > web3.0 > Four.meme attack event analysis

Four.meme attack event analysis

Mary-Kate Olsen
Release: 2025-03-05 18:48:01
Original
601 people have browsed it

Zero-time Technology Security Team Analysis: Four.meme platform Memecoin was attacked and lost about US$15,000

Binance Academy's incubated memecoin launch platform Four.meme encountered a security incident, and its memecoin project Snowboard (contract address: 0x4abfd9a204344bd81a276c075ef89412c9fd2f64) was attacked and lost about $15,000. Attack transaction hash: 0x2902f93a0e0e32893b6d5c907ee7bb5dabc459093efa6dbc6e6ba49f85c27f61.

Platform mechanism and vulnerability analysis

Four.meme is similar to Pump.Fun. It is a memecoin launch platform running on BNB Smart Chain. Its operating process is roughly divided into three stages:

  1. Creation phase: Users create memecoin on the platform, customize the name, logo, description and other information, and pay the handling fee. The platform contract is responsible for creating and deploying ERC-20 contracts and minting initial tokens. It is worth noting that contract ownership belongs to the Four.meme platform contract, not the memecoin creator, in order to prevent malicious behavior.

Four.meme 攻击事件分析

  1. Trading phase: Users can buy and sell memecoin on the platform. To avoid over-the-counter transactions affecting prices, platform contracts limit the direct transfer function of tokens. When a transaction occurs, the platform contract temporarily lifts the transfer restrictions, and then re-enables the restrictions after completing the transaction.

Four.meme 攻击事件分析

  1. Migration phase: When the market value of memecoin reaches 24 BNB, the platform contract transfers the remaining tokens and BNB to decentralized exchanges such as PancakeSwap (DEX).

Four.meme 攻击事件分析

Attack method

The attacker exploited the vulnerability of Four.meme when migrating memecoin to DEX. The attacker created and initialized a pair on PancakeSwap in advance as Snowboard, but set the sqrtPriceX96 parameter to an exceptionally high value (368058418256012 times higher than the normal value).

Four.meme 攻击事件分析

When the Four.meme contract calls the createAndInitializePoolIfNecessary function to create a trading pair, since the trading pair already exists, the contract adds liquidity using the attacker's preset exception price. This has resulted in the Snowboard price being artificially manipulated to extremely high levels. The attacker then redeems most of the BNBs in the pool using a small number of Snowboard tokens to complete the attack.

Four.meme 攻击事件分析

Safety advice

This attack exposed the logic of the Four.meme contract in handling DEX transaction pair creation. It is recommended that project parties conduct more rigorous testing and audits when designing economic models and contract codes, and consider a variety of abnormal situations to avoid the occurrence of similar vulnerabilities. Multiple rounds of audits, especially cross-audits by multiple audit companies, are crucial to ensuring the safety of the platform.

The above is the detailed content of Four.meme attack event analysis. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Latest Articles by Author
Popular Tutorials
More>
Latest Downloads
More>
Web Effects
Website Source Code
Website Materials
Front End Template