TechFlow news: On April 28, SlowMist reported that ZetaChain has been exploited. Preliminary analysis indicates the root cause lies in the call function of its GatewayZEVM contract, which lacks access control and input validation—enabling any user to initiate cross-chain calls via GatewayZEVM and execute arbitrary operations on external chains through relayers. Specifically, attackers constructed malicious calls on ZetaChain to trigger cross-chain events; these events were then captured by ZetaChain’s relayer and executed as malicious calls on target chains via Threshold Signature Scheme (TSS), resulting in unauthorized fund transfers.
Navigating Web3 tides with focused insights
Contribute An Article
Media Requests
Risk Disclosure: This website's content is not investment advice and offers no trading guidance or related services. Per regulations from the PBOC and other authorities, users must be aware of virtual currency risks. Contact us / support@techflowpost.com ICP License: 琼ICP备2022009338号




