October 21, 2022
A kind of add-on, the Ethereum blockchain, Polygon, was created to increase the flexibility, scalability, and autonomy of projects on the blockchain. As of June 2022, Polygon is running over 7,000 DeFi, Metaverse, Gaming, and NFT dApps.
The key mission of the mentioned development is to provide an environment for the interaction of various blockchains. Let’s consider its features, what improvements have already been achieved and what else might need to be worked on.
Significant improvement work has made it possible to claim the following advantages of the protocol:
In the crypto world, the issue of asset security is always kept under special control. However, “hacker science” does not stand still, and attackers find more and more vulnerabilities in any protocol. In the case of Polygon, the main features that provoked large-scale hacker attacks were:
The presence in the protocol of a key smart contract, which stores the liquidity of all blockchains connected to the ecosystem.
According to portal cnbc.com, the hacker managed to exploit a vulnerability in one of the protocol’s smart contracts. This smart contract, which allows users to move tokens from the Binance Smart Chain, Ethereum, and Polygon blockchains, had access to a large amount of liquidity, as it allowed the assets of these networks to be exchanged efficiently. The hacker was able to rewrite the smart contract instructions for each of the three blockchains and send funds from them to their crypto wallet addresses. As a result, more than $600 mln. in crypto was stolen.
Holes in the protocol of individual projects (e.g., Sushiswap).
According to the information of the portal beincrypto.com, a vulnerability in the system was found on the DIGG token of the Badger DAO protocol. The attacker used transactions that converted 0.05% of the DIGG/WBTC exchange fees. In total, he managed to steal 81 ETH in this way (about $103,842).
One more case of vulnerability was described by the securitylab portal. According to the resource, a hacker exploited a vulnerability that puts nearly $24 billion worth of digital assets at risk.
The issue was discovered by two ethical hackers who made their discovery known to Immunefi, a bug-finding platform related to decentralized finance (DeFi). However, despite the prompt adoption of measures to eliminate the error, the attacker managed to exploit the vulnerability of the Polygon network and steal 801,601 MATIC tokens (more than $ 2 million).
The problem concerning vulnerability was solved without public notice for security purposes. Ethical hackers who discovered the vulnerability received $2.2 million and $1.27 million in crypto as a reward.
By creating a new trading pair, he formed a DIGG/ETH pool with low liquidity. Due to the lack of a link to send rewards to stakers, the hacker took all the commissions.
While the risk of crypto scams and attacks remains high for successful crypto projects, most of them have shown that they are working hard to protect the platforms.
Rate the article
We reserve the right to change this policy at any given time, of which you will be promptly updated. If you want to make sure that you are up to date with the latest changes, we advise you to frequently visit this page.
What User Data We Collect
When you visit the website, we may collect the following data:
Why We Collect Your Data
We are collecting your data for several reasons:
Safeguarding and Securing the Data
Global Digital Consulting LLC is committed to securing your data and keeping it confidential. Global Digital Consulting LLC has done all in its power to prevent data theft, unauthorized access, and disclosure by implementing the latest technologies and software, which help us safeguard all the information we collect online.
The data we collect by using cookies is used to customize our website to your needs. After we use the data for statistical analysis, the data is completely removed from our systems.
Please note that cookies don't allow us to gain control of your computer in any way. They are strictly used to monitor which pages you find useful and which you do not so that we can provide a better experience for you.
Restricting the Collection of your Personal Data
At some point, you might wish to restrict the use and collection of your personal data. You can achieve this by doing the following:
Terms and Conditions
Please read these Terms and Conditions ("Terms", "Terms and Conditions") carefully before using the https://icoda.io website (the "Service") operated by Global Digital Consulting LLC.
Your access to and use of the Service is conditioned on your acceptance of and compliance with these Terms. These Terms apply to all visitors, users and others who access or use the Service.
Links To Other Web Sites
Our Service may contain links to third-party web sites or services that are not owned or controlled by Global Digital Consulting LLC.
Global Digital Consulting LLC has no control over, and assumes no responsibility for, the content, privacy policies, or practices of any third party web sites or services. You further acknowledge and agree that Global Digital Consulting LLC shall not be responsible or liable, directly or indirectly, for any damage or loss caused or alleged to be caused by or in connection with use of or reliance on any such content, goods or services available on or through any such web sites or services.
We reserve the right, at our sole discretion, to modify or replace these Terms at any time. If a revision is material we will try to provide at least 30 days' notice prior to any new terms taking effect. What constitutes a material change will be determined at our sole discretion.
If you have any questions about these Terms, please contact us.