BlockBeats News, May 8th, cybersecurity firm SlowMist issued a post regarding the potential new risks brought by the Ethereum Pectra upgrade:
For users: Private key protection should always be a top priority. Be aware that the contract code at the same address on different chains may not always be the same. Before taking any action, understand the detailed information of the delegated target.
For wallet providers: Check if the delegated chain matches the current network. Remind users to be cautious of the risk associated with using a delegation signature with chainID 0, as this signature may be replayed on a different chain. Display the target contract when users sign a delegation to reduce the risk of phishing attacks.
For developers: Ensure to perform permission checks during wallet initialization (e.g., verifying the signature address via ecrecover). Follow the namespace formula proposed in ERC-7201 to mitigate storage collisions. Do not assume that tx.origin is always an externally owned account (EOA); using msg.sender == tx.origin as a defense against reentrancy attacks will no longer be effective. Ensure that the target contract delegated by the user has implemented the necessary callback functions to ensure compatibility with mainstream tokens.
For centralized exchanges: Track and inspect deposits to reduce the risk of false deposits from smart contracts.
免责声明:投资有风险,本文并非投资建议,以上内容不应被视为任何金融产品的购买或出售要约、建议或邀请,作者或其他用户的任何相关讨论、评论或帖子也不应被视为此类内容。本文仅供一般参考,不考虑您的个人投资目标、财务状况或需求。TTM对信息的准确性和完整性不承担任何责任或保证,投资者应自行研究并在投资前寻求专业建议。