April 9 (Cointime) - Cybersecurity firm SlowMist's Security Team reported an exploit in SushiSwap RouteProcessor2, a smart contract used for token swapping.
"The root cause is that ProcessRoute does not perform any checks on the user-provided route parameter, allowing the attacker to exploit this issue by constructing a malicious route parameter that causes the contract to read a Pool created by the attacker," SlowMist explained in a tweet.
All Comments