unhacked is a bi-weekly ctf, giving whitehats the chance to go back in time before real exploits and recover funds before the bad guys get them.
you are a whitehat, right anon?
audius is a streaming music service with a market cap of over $250mm.
in july, they were hacked and their treasury was emptied of all its $AUDIO tokens.
the simple soundbite is that there was a storage slot collision with a proxy contract that allowed reinitialization of existing contracts.
but how can we exploit this vulnerability to drain the treasury?
your job is to use this knowledge, dig into the code, and empty the treasury of over 18mm $AUDIO tokens before the blackhat does.
-
fork this repo and clone it locally.
-
add a mainnet RPC url into
test/AudiusHack.t.sol
so that the tests are able to fork mainnet from block 15201700. -
review the code in the
src/
folder, which contains all the code at the time of the hack. you can explore the state of the contract before the hack using block 15201700. ex:cast call --rpc-url ${ETH_RPC_URL} --block 15201700 0x4DEcA517D6817B6510798b7328F2314d3003AbAC "getGuardianAddress()"
-
when you find an exploit, code it up in
AudiusHack.t.sol
. the test will pass if you succeed. -
post on twitter for bragging rights and tag @unhackedctf. first correct answer gets a spot on the leaderboard. no cheating.
for new weekly challenges and solutions, subscribe to the unhacked newsletter.