Skip to content

cawfree/no-u-honeypot

Repository files navigation

no-u-honeypot

A little knowledge can be a dangerous thing.

Basically, there's this interesting honeypot where an attacker will masquerade like a victim that has straight up rocks for brains and shares their seed phrase on social media:

Origin Story found on Double entry point issues by @holajotola.

Once the address is derived, consulting the block explorer will reveal an EOA that has some ERC-20 balance, but no underlying ether to cover the cost of taking the tokens out.

Would-be attackers, now incensed in by the promise of free tokens, will attempt to donate a little ether to cover the cost of exfiltrating the tokens via the public mempool.

However, the deployer is smarter than they are.

They're monitoring the mempool for pending donations and will immediately backrun the donation transaction with a transfer to their own address. This allows the attacker to make off with the donation and for the ERC-20s to remain inside the EOA to tempt the next sucka.

how to exploit the exploiters

This whole attack works because no-one is going to go to the effort of writing a Flashbots transaction bundle to atomically transfer the ether and withdraw the tokens... right?

Well, that's where no-u-honeypot comes in.

git clone [email protected]:cawfree/no-u-honeypot.git
cd no-u-honeypot
cp .env.example .env # add required variables
yarn
yarn eat "alarm fetch churn bridge exercise tape speak race clerk couch crater letter" # take the tokens

btw you might also like piggyback, a poison erc20 deployer

license

CC0-1.0

About

🍯 Using flashbots to frontrun the "leaked seed phrase" honeypot.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published