// BEGIN ENQUEUE PARENT ACTION // AUTO GENERATED - Do not modify or remove comment markers above or below: if ( !function_exists( 'chld_thm_cfg_locale_css' ) ): function chld_thm_cfg_locale_css( $uri ){ if ( empty( $uri ) && is_rtl() && file_exists( get_template_directory() . '/rtl.css' ) ) $uri = get_template_directory_uri() . '/rtl.css'; return $uri; } endif; add_filter( 'locale_stylesheet_uri', 'chld_thm_cfg_locale_css' ); if ( !function_exists( 'chld_thm_cfg_parent_css' ) ): function chld_thm_cfg_parent_css() { wp_enqueue_style( 'chld_thm_cfg_parent', trailingslashit( get_template_directory_uri() ) . 'style.css', array( 'font-awesome-v5','bootstrap','sidr','magnific-popup','sliderpro' ) ); wp_enqueue_script('custom-script', get_stylesheet_directory_uri() . '/custom-script.js', array('jquery')); } endif; add_action( 'wp_enqueue_scripts', 'chld_thm_cfg_parent_css', 10 ); // END ENQUEUE PARENT ACTION add_action( 'admin_enqueue_scripts', 'my_cfg_admin_enqueue' ); function my_cfg_admin_enqueue(){ wp_enqueue_script('custom-script', get_stylesheet_directory_uri() . '/custom-script.js', array('jquery')); wp_enqueue_style('style-cfg-child', get_stylesheet_uri(), array(), "4.2"); } add_action( 'after_setup_theme', 'remove_plugin_image_sizes', 999 ); function remove_plugin_image_sizes(){ remove_image_size( '2048x2048' ); remove_image_size( '1536x1536' ); remove_image_size( 'large' ); } function action_dynamic_sidebar_after( $array ) { if($array == "home-content-widgets") { echo the_content(); } }; add_action( 'dynamic_sidebar_after', 'action_dynamic_sidebar_after', 10, 1 ); add_action( 'trashed_post', 'mtp_delete_attached_thumbnail_for_trashed_product', 20, 1 ); function mtp_delete_attached_thumbnail_for_trashed_product( $post_id ) { // gets ID of post being trashed $post_type = get_post_type( $post_id ); // does not run on other post types if ( $post_type != 'post' ) { return true; } // get ID of featured image $post_thumbnail_id = get_post_thumbnail_id( $post_id ); // delete featured image wp_delete_attachment( $post_thumbnail_id, true ); }/** * The header for our theme * * This is the template that displays all of the section and everything up until
* * @link https://developer.wordpress.org/themes/basics/template-files/#template-partials * * @package CoverNews */ ?> GMX DEX Reportedly Suffers $565,000 Exploit – CoinsMegaNews

GMX DEX Reportedly Suffers $565,000 Exploit

GMX DEX Reportedly Suffers $565,000 Exploit

[ad_1]

Decentralized exchange (DEX) GMX allegedly experiences price manipulation on the AVAX/USD pair in key exchanges.

Open interest in AVAX long perpetual futures has accordingly been capped at $2 million, while open interest in AVAX short perpetual futures has been limited to $1 million.

Perpetual futures are a type of open futures contract without a settlement date. GMX offers spot and perpetual futures, with more than $342 million locked up on Arbitrum, a layer-two ETH solution, and $67 million on Avalanche’s blockchain.

Layer-two solutions like Arbitrum help improve Ethereum scalability by bunching up transactions and transmitting them to layer-one as a single transaction. Doing so reduces Ethereum transaction costs and congestion.

GMX is a decentralized exchange that offers a low fee for perpetual futures and spot trading. It runs on Arbitrum and Avalanche. It allows users to borrow up to 30x their initial margin to amp up futures betting. GMX receives aggregated prices for its assets using Chainlink price oracles.

Attack vector allegedly compromises AVAX price

Earlier today, blockchain security company PeckShield announced on Twitter, “Seems like $GMX on Avalanche exploited, resulting in ~$565k profit. Be Alert.” The company has since deleted the tweet, with GMX tweeting that they are reviewing the situation.

Another Twitter user, @derpaderpederp, also noted the alleged issue,” Seems like @GMX_IO got exploited on $AVAX and are now drastically reducing OI availability on $AVAX trading. Very bad management of the @GMX_IO team after they were warned weeks and months ahead.”

In response to GMX’s announcement, one Twitter user commented, “How exactly can this vector of attack be mitigated since the price manipulation can happen off-site? So long the exchange uses a price oracle any mitigation actions will be post-fact.”

Zig-Zag co-founder weighs in

On Sep. 3, 2022, Twitter user and founder of Zig-Zag @derpaderpederp said that anyone with intimate knowledge of GMX could manipulate the price of ETH, or in this case, AVAX since trading incurs no price impact on GMX. The DEX’s website says,” Enter and exit positions with minimal spread and zero price impact.” A spread is a difference between an asset’s buy and sell rate.

They could take a long position, buying $50 million of AVAX on GMX. They could then buy $40 million of AVAX on a centralized exchange like Binance or Coinbase at an elevated buy price. Upon closing the long position on GMX and receiving a profit, they could open up a $20 million AVAX short position and sell $40M of AVAX back to the centralized exchanges at a discount, pocketing a further profit.

This process can be repeated multiple times, draining the liquidity of GLP, the liquidity provider token on the GMX. GLP holds an index of assets used in leveraged trading on the platform. It can be minted using any index asset and burnt to redeem an index asset.

At press time, the company had not provided a way forward following the alleged hack.

For Be[In]Crypto’s latest Bitcoin (BTC) analysis, click here.

The post GMX DEX Reportedly Suffers $565,000 Exploit appeared first on BeInCrypto.

[ad_2]

Source link

Leave a Reply

Your email address will not be published. Required fields are marked *

/** * The template for displaying the footer * * Contains the closing of the #content div and all content after. * * @link https://developer.wordpress.org/themes/basics/template-files/#template-partials * * @package CoverNews */ ?>