header-langage
简体中文
繁體中文
English
Tiếng Việt
한국어
日本語
ภาษาไทย
Türkçe
Scan to Download the APP

SlowMist YuXuan: Beware of sandwich attacks similar to MEV in Lightning Network's replacement loop attacks.

2023-10-22 11:29
BlockBeats News, October 22nd. SlowMist founder, Yu Xian, posted on social media that there has been a substitution loop attack on the Lightning Network, which is similar to the sandwich attack in MEV, using the front and back channels to extract the target's funds. The implementation of this attack is not easy and requires the following conditions: - Open two channels on the victim. - Route payments through one of these two channels. - Successfully replace the victim's HTLC-timeouts in Δ blocks within the loop. - At the same time, ensure that the victim does not discover the HTLC pre-image transaction. Before this risk is fixed, project parties using the Lightning Network should be cautious when establishing channels with upstream and downstream partners, preferably with reputable ones to reduce the risk of being sandwiched. Further testing and verification are needed for specific situations.
举报 Correction/Report
This platform has fully integrated the Farcaster protocol. If you have a Farcaster account, you canLogin to comment
Correction/Report
Submit
Add Library
Visible to myself only
Public
Save
Choose Library
Add Library
Cancel
Finish