SlowMist YuXuan: Beware of sandwich attacks similar to MEV in Lightning Network's replacement loop attacks.
BlockBeats News, October 22nd. SlowMist founder, Yu Xian, posted on social media that there has been a substitution loop attack on the Lightning Network, which is similar to the sandwich attack in MEV, using the front and back channels to extract the target's funds.
The implementation of this attack is not easy and requires the following conditions:
- Open two channels on the victim.
- Route payments through one of these two channels.
- Successfully replace the victim's HTLC-timeouts in Δ blocks within the loop.
- At the same time, ensure that the victim does not discover the HTLC pre-image transaction.
Before this risk is fixed, project parties using the Lightning Network should be cautious when establishing channels with upstream and downstream partners, preferably with reputable ones to reduce the risk of being sandwiched. Further testing and verification are needed for specific situations.
This platform has fully integrated the Farcaster protocol. If you have a Farcaster account, you canLogin
to comment