Sui Blockchain Awards $500,000 CertiK to Blockchain Safety Firm CertiK for Warning of Threats

2
286

  • Sai was awarded CertiK for figuring out a vulnerability referred to as “HamsterWheel” on the Sui blockchain.
  • The “HamsterWheel” vulnerability traps nodes in an infinite loop, very similar to a hamster jogging on a working wheel.
  • The HamsterWheel assault demonstrates the growing sophistication of threats to blockchain networks.

Sui Blockchain has awarded a $500,000 bounty to blockchain safety firm CertiK for figuring out a menace that might convey down your entire Sui Layer 1 blockchain.

The recognized vulnerability known as “HamsterWheel,” and the CertiK workforce defined that this vulnerability is totally different from conventional assaults aimed toward crashing nodes and bringing down blockchains. .

Hamster wheel assault particulars

Much like a hamster working on wheels, the HamsterWheel assault traps a node and permits it to carry out operations with out processing new transactions. This assault has the ability to paralyze the community and render it unusable.

Certick recognized the HamsterWheel vulnerability earlier than Sui’s mainnet launch in early Could 2023. Sui then applied fixes in response to the safety menace to forestall potential injury the assault might trigger to the blockchain.

Sui gave CertiK a $500,000 bounty in appreciation for his or her efforts. Emphasize the worth of bug bounty applications and proactive safety measures.

Blockchain safety

In line with CertiK Chief Safety Officer Kang Li, threats to blockchain networks are always altering. “The invention of the HamsterWheel assault demonstrates the evolution and class of threats to blockchain networks,” Lee mentioned.

See also  Italy plans to lift Bitcoin capital good points tax to 42%

CerticK’s announcement states that extra technical data might be launched and accessible quickly. Moreover, a full report might be made public as soon as all mitigations have been applied and totally examined.

(tags to translate) market

Comments are closed.