Scan to download
BTC $78,799.00 +4.58%
ETH $2,395.60 +4.32%
BNB $644.61 +2.57%
XRP $1.45 +1.86%
SOL $87.91 +3.46%
TRX $0.3287 -0.89%
DOGE $0.0971 +2.74%
ADA $0.2526 +2.91%
BCH $463.09 +4.18%
LINK $9.44 +1.60%
HYPE $40.97 +3.27%
AAVE $94.43 +2.73%
SUI $0.9625 +3.30%
XLM $0.1799 +2.06%
ZEC $323.85 +1.83%
BTC $78,799.00 +4.58%
ETH $2,395.60 +4.32%
BNB $644.61 +2.57%
XRP $1.45 +1.86%
SOL $87.91 +3.46%
TRX $0.3287 -0.89%
DOGE $0.0971 +2.74%
ADA $0.2526 +2.91%
BCH $463.09 +4.18%
LINK $9.44 +1.60%
HYPE $40.97 +3.27%
AAVE $94.43 +2.73%
SUI $0.9625 +3.30%
XLM $0.1799 +2.06%
ZEC $323.85 +1.83%

The proposal for the "Comet Vulnerability Bounty Program" by Compound DAO did not pass due to insufficient votes, with a support rate exceeding 70%

2023-12-10 08:37:27
Collection

ChainCatcher news, Compound DAO previously initiated the "Comet Vulnerability Disclosure (Fixed) Bounty Program Reward" proposal to reward a blockchain developer who reported and fixed the vulnerability, but the final voting result fell short by 15,000 votes (not reaching the necessary 400,000 statutory support votes). Over 70% of the votes supported this proposal.

It is reported that the pseudonymous developer "KP" discovered a vulnerability in the Compound COMP -1.33% v3 protocol (also known as Comet). According to KP's estimation, this vulnerability would allow hackers to directly steal user funds, but it would be fundamentally unprofitable (stealing $1 million in funds would cost the attacker billions of dollars in gas fees).

After discovering and verifying the vulnerability, KP reported it to Compound and its security partner OpenZeppelin, providing a code repository that included a proof-of-concept simulation of the attack. After the vulnerability was patched, KP proposed to the Compound DAO for a reward of $125,000. This proposal received support from Kevin Cheng, the head of the Compound Labs protocol, and Michael Lewellen, the head of solutions architecture at OpenZeppelin.

app_icon
ChainCatcher Building the Web3 world with innovations.