According to CertiK Alert monitoring, a Flash Loans attack that affected @JPulsepot was detected by Jinse Finance. The attacker used the exchange logic of the public function swapProfitFees() in the contract, which is responsible for processing the contract’s own Tokens, thereby creating an Arbitrage opportunity and earning $21,500.
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
CertiK Alert: Detected a flash loan attack, with a loss of $21,500
According to CertiK Alert monitoring, a Flash Loans attack that affected @JPulsepot was detected by Jinse Finance. The attacker used the exchange logic of the public function swapProfitFees() in the contract, which is responsible for processing the contract’s own Tokens, thereby creating an Arbitrage opportunity and earning $21,500.