A bug in the smart contract code for the Ethereum Alarm Clock service has reportedly been exploited, with nearly $260,000 said to have been swiped from the protocol so far. The Ethereum Alarm Clock enables users to schedule future transactions by pre-determining the receiver address, sent amount, and desired time of transaction. Users must have the required Ether (ETH) on hand to complete the transaction and need to pay the gas fees upfront. According to an Oct. 19 Twitter post from blockchain security and data analytics firm PeckShield, hackers managed to exploit a loophole in the schedule ...
Continue reading the above news article, by clicking here.
Administration and Moderation NOTE: A Reminder, the above news is provided for free, through a RSS Feed. The above quote does NOT include the full story. In order to continue to read more past what is quoted, please click through to the article, by clicking on the link provided above through the "continue reading" text.
Please be sensible and follow our terms of service and rules, when replying and debating the news article.