BlockSec Phalcon: Detected a suspicious transaction targeting MSCST on BSC, with an estimated loss of around $130,000.
Foresight News reported, according to BlockSec Phalcon monitoring, a suspicious transaction targeting MSCST on BSC has been detected, with an estimated loss of approximately $130,000. The vulnerability stems from the lack of access control (ACL) in MSCST's releaseReward() function, allowing attackers to exploit this flaw to manipulate the price of GPC in PancakeSwap pool 0x12da.
Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.
You may also like
Dragonfly partner Haseeb Qureshi releases 2026 predictions for crypto and AI trends
Semler Scientific Chairman Urges Shareholders to Vote in Favor of Merger with Strive
