Token Batch Authorization Query
Last updated
Last updated
The blockchain is becoming more and more mature in the decentralized field, and more and more decentralized applications are developed on the blockchain. For example, the DeFi field has become popular in recent years. The main DeFi applications include ERC20 token lending, pledge and trade. If you want to use ERC20 on DeFi protocols such as Uniswap, Aave and Yearn Tokens, you need to authorize the dApp to use these tokens. This is called ERC20 Authorization. These authorizations are essential to the functioning of DeFi platforms, but can be very dangerous if left unchecked.
First of all, let's take a look at a picture, what is the authorization process like. User A authorizes USDT tokens to another contract (unsafe) or personal address when accessing the dApp. At this time, it is equivalent to authorizing U to the target with a certain amount to operate your U. This is a very dangerous situation. In the recent period, there have been many incidents similar to stealing U. Similar to using this method, many users lack blockchain knowledge and think that it is just an authorized operation.
The attacker forges an empty activity page and distributes information through multiple channels such as the media
The user clicks the button to receive short positions through the page, and at this time the contract approve
is called to authorize, the authorized object is the attacker's address, and the authorized amount is unlimited
The attacker transfers the USDT in the user's wallet through transferFrom
.
In the picture we can see the call authorization information(use your USDT)
0x095ea7b3000000000000000000000000 (call authorization function
57ce3d5cd8685bed28ae71f3a5cfd3b42464fe0b (authorized to attacker address
0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
After the current authorization is confirmed, 57ce3d5cd8685bed28ae71f3a5cfd3b42464fe0b
attacker can transfer all your USDT away, as long as you have U, he can transfer away. If the address does not cancel the authorization in time, it will bring more losses. The following will teach you how to check which contracts and addresses are authorized by the wallet address, and regularly cancel the expired contracts.
Use Token Tool https://TokenTools.App or https://TokenTools.App/approve/eth to query Address authorization information.
Link the wallet, scan the wallet address (If you have not authorized the contract, prompt: you have not authorized tokens to the contract, great!
Scan out the authorized contract information (⚠️The scanned address is not the current user wallet address, and the authorization cannot be canceled
Original link: https://docs.tokentools.app/learn/batch-approve
Citing reference knowledge
https://medium.com/zengo/unicats-go-phishing-eaf39ff9da64 UniCats Phishing Analysis
https://www.lianzixun.cn/news/9562620.html Transfer authorization phishing to control your wallet