Giter Site home page Giter Site logo

hack-challenge-1's Introduction

Rules

This contest is dedicated to finding vulnerabilities in smart-contracts. To be able to participate you need to have a couple of TON, know how to compose arbitrary cells (via fift/tonweb/ton3/ton(whales)/tongo/pytonlib), know how to compose internal messages and send messages to the network. It will be useful to know how to read tl-b notation.

Each contract contains major flow which allows to bypass intended logic and stole all funds.

There will two stages of the contest:

  1. The first 5 contracts are revealed at the same time to hack. After all smart contracts of the first stage will be hacked, there will be a 15-minute break.
  2. The last 3 contracts will be revealed one by one: once a contract is hacked, there will be a 15-minute break and the address and info of the next smart contract will be revealed.

For almost all contracts their funC code will be available on reveal. Some, however, will be closed sourced: you will need to disassemble them via tonwhales.com / tonscan.org / dton.io / ton.cx

Stage 1

Task Address
1. Mutual funds EQBuOFgr-R0W6-guv3B1D2bkiqWu1o5YsUMqjgqVuI3V1ETo
2. Bank EQAcUZubVYakkC5IiW1k9sFroNSfCfXYIgp5t5ba0w-CtBoq
3. DAO EQAio2xuMYJqJZlXG4e1TeKpeWn976tcZTXybVKVIuphuoVy
4. Lottery EQAb7oOzKXG31RD6Ob9O4tEbVebY2zJo5ARggkf-mWSyQb4M
5. Wallet EQBe9ZblcnkpGklcpQni_O4Y1_YD-80FSTxF9kd8R53L2hIi

Stage 2

Task Address
6. Vault EQB7QOtPKxZjgo6jDGTk9ZSvgkgZb8wys1-ptFZB2TXC3V3p
7. Better bank EQD9XPtwX7jn4gSQCchnb9zxpLfxfANes7EkHlWigzi_BHAI
8. Dehasher EQD3BByx0Af1jU-9dKIoK4hX0v4wDQD3sxd-i8jvVJtIrTr9

hack-challenge-1's People

Contributors

emelyanenkok avatar ferdmanlisa avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar

Forkers

armax15 kojhliang

hack-challenge-1's Issues

Violation of the logical construction of the program - 6 task

The database should take data from the smart contract with the status already assigned. Otherwise, when a database smart contract is hacked, the statuses can be modified, modified. It is better, in my opinion, to transfer ready-made parameters to the database, without additional verification, so that there are no discrepancies.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.