BlockSec Phalcon identified a missing access control flaw in releaseReward(), enabling GPC token price manipulation on PancakeSwap and causing $130,000 in losses.
BlockSec Phalcon detected a flash loan attack on Dec. 29 against the MSCST smart contract on Binance Smart Chain, resulting in approximately $130,000 in losses. The exploit stemmed from missing access control in the releaseReward() function, which allowed attackers to manipulate GPC token prices in a PancakeSwap liquidity pool. The vulnerability facilitated execution of the exploit within a single transaction, leading to rapid asset drainage.