Scan to download
BTC $65,472.90 -3.05%
ETH $1,921.24 -5.35%
BNB $610.88 -2.04%
XRP $1.42 -4.56%
SOL $81.67 -4.53%
TRX $0.2795 -0.47%
DOGE $0.0974 -3.83%
ADA $0.2735 -4.22%
BCH $462.98 -3.99%
LINK $8.64 -2.97%
HYPE $28.98 -1.81%
AAVE $122.61 -3.42%
SUI $0.9138 -6.63%
XLM $0.1605 -4.62%
ZEC $260.31 -8.86%
BTC $65,472.90 -3.05%
ETH $1,921.24 -5.35%
BNB $610.88 -2.04%
XRP $1.42 -4.56%
SOL $81.67 -4.53%
TRX $0.2795 -0.47%
DOGE $0.0974 -3.83%
ADA $0.2735 -4.22%
BCH $462.98 -3.99%
LINK $8.64 -2.97%
HYPE $28.98 -1.81%
AAVE $122.61 -3.42%
SUI $0.9138 -6.63%
XLM $0.1605 -4.62%
ZEC $260.31 -8.86%

The proposal for the "Comet Vulnerability Bounty Program" by Compound DAO did not pass due to insufficient votes, with a support rate exceeding 70%

2023-12-10 08:37:27
Collection

ChainCatcher news, Compound DAO previously initiated the "Comet Vulnerability Disclosure (Fixed) Bounty Program Reward" proposal to reward a blockchain developer who reported and fixed the vulnerability, but the final voting result fell short by 15,000 votes (not reaching the necessary 400,000 statutory support votes). Over 70% of the votes supported this proposal.

It is reported that the pseudonymous developer "KP" discovered a vulnerability in the Compound COMP -1.33% v3 protocol (also known as Comet). According to KP's estimation, this vulnerability would allow hackers to directly steal user funds, but it would be fundamentally unprofitable (stealing $1 million in funds would cost the attacker billions of dollars in gas fees).

After discovering and verifying the vulnerability, KP reported it to Compound and its security partner OpenZeppelin, providing a code repository that included a proof-of-concept simulation of the attack. After the vulnerability was patched, KP proposed to the Compound DAO for a reward of $125,000. This proposal received support from Kevin Cheng, the head of the Compound Labs protocol, and Michael Lewellen, the head of solutions architecture at OpenZeppelin.

app_icon
ChainCatcher Building the Web3 world with innovations.