ordian on ao-github-actions
initial github actions (compare)
s3krit on mp-de-parityify
sed magic find . -type f -exec… (compare)
ordian on perf
ordian on master
Faster kill_garbage (#11514) *… (compare)
ordian on na-engine-signer-dont-use-msg-only-zeroes
ordian on master
[EngineSigner]: don't sign mess… (compare)
niklasad1 on na-engine-signer-dont-use-msg-only-zeroes
forgot formatting change (compare)
a()is never called externally (neither from a external address nor from a smart contract external call, even if itself)
Functions can be specified as being external, public, internal or private, where the default is public
Note: The White Hat Group were made aware of a vulnerability in a specific version of a commonly used multisig contract. This vulnerability was trivial to execute, so they took the necessary action to drain every vulnerable multisig they could find as quickly as possible. Thank you to the greater Ethereum Community that helped finding these vulnerable contracts.
The White Hat account currently holding the rescued funds is https://etherscan.io/address/0x1dba1131000664b884a1ba238464159892252d3a.
If you hold a multisig contract that was drained, please be patient. They will be creating another multisig for you that has the same settings as your old multisig but with the vulnerability removed and will return your funds to you there.
there is an effort by the foundation underway to secure funds in other wallets to prevent any further compromises; they will make an announcement in their own time.
That previous statement by Gav is inaccurate. The Ethereum Foundation is not associated with the White Hat Group and was not involved in securing funds. That is the White Hat Group.
Yup - saw 1600 ether in one - went here