🎉 [Gate 30 Million Milestone] Share Your Gate Moment & Win Exclusive Gifts!
Gate has surpassed 30M users worldwide — not just a number, but a journey we've built together.
Remember the thrill of opening your first account, or the Gate merch that’s been part of your daily life?
📸 Join the #MyGateMoment# campaign!
Share your story on Gate Square, and embrace the next 30 million together!
✅ How to Participate:
1️⃣ Post a photo or video with Gate elements
2️⃣ Add #MyGateMoment# and share your story, wishes, or thoughts
3️⃣ Share your post on Twitter (X) — top 10 views will get extra rewards!
👉
Uniswap Permit2 Signature Phishing New Eyewash Asset Security Risk Upgrade
Unveiling the Uniswap Permit2 Signature Eyewash
Hackers are a frightening presence in the Web3 ecosystem. For project teams, open-source code brings immense security pressure. For individual users, every on-chain interaction may carry risks. Recently, a new phishing method has become active, where just signing could lead to theft; the method is subtle and hard to defend against, and addresses that have used Uniswap may be exposed to risks.
Incident Details
Recently, a friend of mine ( Xiao A ) had his wallet assets stolen, but he did not disclose his private key or interact with any suspicious contracts. The investigation found that Xiao A's USDT was transferred using the Transfer From function, which means that a third party operated to transfer the assets.
Transaction Details:
The key question is: how did the address ending in fd51 obtain asset permissions? Why is it related to Uniswap?
Introduction to Uniswap Permit2 Contract
Uniswap Permit2 is a token approval contract that allows sharing and management of authorizations across different applications, providing a more unified, efficient, and secure user experience. It can reduce transaction costs, improve user experience, and enhance the security of smart contracts.
Permit2 acts as an intermediary between the user and the Dapp. Users only need to authorize the Permit2 contract, and all Dapps integrated with Permit2 can share this authorization limit. This reduces user interaction costs, but may also introduce new risks.
Fishing Technique Analysis
The key lies in the Permit function of the Permit2 contract. In simple terms, this function uses the user's signature to transfer the token allowance granted to Permit2 to another address. A hacker only needs to obtain the signature to transfer the user's assets.
Specific steps:
preventive measures
As the application of Permit2 expands, such phishing attacks may become more frequent. Users need to be vigilant and enhance their security awareness to protect their asset safety.