Scan to download
BTC $77,216.66 +0.41%
ETH $2,324.59 +1.53%
BNB $627.15 +0.22%
XRP $1.39 +0.05%
SOL $84.85 +0.73%
TRX $0.3222 -0.53%
DOGE $0.1016 +1.52%
ADA $0.2493 +0.47%
BCH $453.98 +1.25%
LINK $9.36 +0.83%
HYPE $40.63 -1.38%
AAVE $98.28 +0.62%
SUI $0.9337 +0.01%
XLM $0.1633 -1.07%
ZEC $338.31 -0.56%
BTC $77,216.66 +0.41%
ETH $2,324.59 +1.53%
BNB $627.15 +0.22%
XRP $1.39 +0.05%
SOL $84.85 +0.73%
TRX $0.3222 -0.53%
DOGE $0.1016 +1.52%
ADA $0.2493 +0.47%
BCH $453.98 +1.25%
LINK $9.36 +0.83%
HYPE $40.63 -1.38%
AAVE $98.28 +0.62%
SUI $0.9337 +0.01%
XLM $0.1633 -1.07%
ZEC $338.31 -0.56%

Slow Mist: EIP-7702 account vulnerability exploited, 1,988.5 QNT stolen

2026-04-29 12:10:45
Collection

According to market news, attackers exploited a flawed EIP-7702 account to steal 1,988.5 QNT (approximately 54.93 ETH) from the QNT reserve pool. The root cause is that the reserve pool administrator EOA delegated the code to the BatchExecutor contract via EIP-7702, and this contract set the permissionless BatchCall contract as the authorized caller.

Since the BatchCall.batch() function did not have any permission checks set, any external caller could invoke it, ultimately leading to the depletion of the reserve pool assets.

app_icon
ChainCatcher Building the Web3 world with innovations.