{"id":16971,"date":"2023-02-18T04:01:43","date_gmt":"2023-02-18T04:01:43","guid":{"rendered":"https:\/\/nftandcrypto-news.com\/crypto\/platypus-attack-exploited-incorrect-ordering-of-code-auditor-claims\/"},"modified":"2023-02-18T04:01:45","modified_gmt":"2023-02-18T04:01:45","slug":"platypus-attack-exploited-incorrect-ordering-of-code-auditor-claims","status":"publish","type":"post","link":"https:\/\/nftandcrypto-news.com\/crypto\/platypus-attack-exploited-incorrect-ordering-of-code-auditor-claims\/","title":{"rendered":"Platypus attack exploited incorrect ordering of code, auditor claims"},"content":{"rendered":"
The $8m Platypus flash loan attack was made possible because of code that was in the wrong order, according to a post mortem report from Platypus auditor Omniscia. The auditing company claims the problematic code didn\u2019t exist in the version they saw.<\/p>\n
\nIn light of the recent @Platypusdefi<\/a> incident the https:\/\/t.co\/30PzcoIJnt team has prepared a technical post-mortem analysis describing how the exploit unravelled in great details. <\/p>\n
Be sure to follow @Omniscia_sec<\/a> to receive more security updates!https:\/\/t.co\/cf784QtKPK pic.twitter.com\/egHyoYaBhn<\/a><\/p>\n