Explosive warning! Millions of users were nearly buried alive by private keys, and the behind-the-scenes mastermind was exposed and shocked the insiders!
Late last night, the well-known security researcher @Xuegaogx dropped a "nuclear bomb":
In a very popular t3rn script with over 100,000 visits, a string of "deadly backdoor" code was secretly buried! Once the user enters the private key according to the process, this carefully disguised program immediately starts the data return system and sends your private key in plain text to a mysterious account. It is simply a "spy blockbuster" in the encryption industry!
What's even more outrageous is that the attacker also played a "camouflage technique" - hiding the backdoor in the log module, and marking it as a "configuration record" to induce trust. This is a typical "insider-level" operation: without fancy technology, the robot key is directly written into the code, which is so rough that it makes people's backs cold.
The embarrassing thing is that t3rn just finished the so-called top security audit, but it failed in the ecological script, and it was just like the old drama of "the main network is fine, but the accessories are out of order".
What does this mean? Don't just focus on the security of the main chain, those seemingly insignificant third-party components are the real weak points! Just like when a certain bridge was hacked, the problem was not the main chain at all, but the neglected SDK.
Now, the most bizarre mystery is: who controls the mysterious account that receives the private key? White hat warning? Or did the hacker plan it in advance? The truth is unknown!