tldr; Unattainable has introduced that its v2 swap was attacked by way of a flash mortgage and a malicious ERC20 token. The attacker borrowed capital with a customized token to name swap on the pair stage after getAmountsOut performs the x*y=ok verify. After which, cheapSwap calls swap which doesn’t have the verify. This is able to make each consumer cheaper by roughly 20%.
This abstract is auto generated by a bot and never meant to interchange studying the unique article. As at all times, DYOR.