This article was first published on Stories by TRON Foundation on Medium
This small class will discuss the disappearing internal transfer transactions, giving an example of using this phenomenon for honeypot attacks. At the same time, everyone is welcome to pay attention to @tron official twitter, and actively submit the contract code.
This is the contract revealed at https://troneye.com (hereafter referred to as TRON-Eye). TRON-Eye is a wave-based verification platform from the community. The previous small class has introduced the TRON-Eye verification platform in detail. This contract is DisappearedTransfer (https://troneye.com/reveal?address=TFVE66w23Azoa31YEXP5z6XPszUkNLDWTv).
Figure 1 DisappearedTransfer contract source code
As the contract shows, this is an very simple contract with only two withdraw functions. All we need to do is call these two methods to take the TRX out of the contract. Of course, the facts are not as simple as we think.
1. contract DisappearedTransaction
3. function withdraw()
7. if (msg.value >= address(this).balance)
9. msg.sender.transfer(address(this).balance + msg.value);
To keep reading, please go to the original article at:
Stories by TRON Foundation on Medium