Crypto Flexs
  • DIRECTORY
  • CRYPTO
    • ETHEREUM
    • BITCOIN
    • ALTCOIN
  • BLOCKCHAIN
  • EXCHANGE
  • TRADING
  • SUBMIT
Crypto Flexs
  • DIRECTORY
  • CRYPTO
    • ETHEREUM
    • BITCOIN
    • ALTCOIN
  • BLOCKCHAIN
  • EXCHANGE
  • TRADING
  • SUBMIT
Crypto Flexs
Home»HACKING NEWS»Wake ERC-4337 Detector – Ackee Blockchain
HACKING NEWS

Wake ERC-4337 Detector – Ackee Blockchain

By Crypto FlexsMay 15, 20243 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Wake ERC-4337 Detector – Ackee Blockchain
Share
Facebook Twitter LinkedIn Pinterest Email

Ackee is finalizing its ERC-4337 detector to identify prohibited opcode usage and repository access, transforming a very labor-intensive manual review into an automated process that reduces the potential for human error.

Let Wake detect ERC-4337-related vulnerabilities in your code. Want to test your code for free with the Wake ERC-4337 detector? Submit this form!

wake up A Python-based framework for developing and testing Solidity smart contracts. It includes a static analysis engine that detects and reports issues in your Solidity code. Wake was developed and used by Ackee Blockchain Security to perform smart contract audits, helping to discover several with medium, high, and critical levels. weakness.

ERC-4337 Defines a set of restrictions for the user action validation steps that must be followed to protect the user action bundler from denial-of-service attacks. The limitations are detailed below: ERC-7562.

Limitations include:

  • Forbidden opcodes and conditionally prohibited opcodes;
  • Access to contract repositories other than the smart accounts with which they interact is restricted.

Ackee is finalizing an ERC-4337 detector that can detect the ERC-4337 ‘validateUserOp’ function, which serves as the entry point for the validation phase. All functions called thereafter are tested. Use of restricted opcodes is reported as a detection.

Detecting restricted storage access requires a more comprehensive approach. Storage access is only allowed to slot `A` and slot `keccak256(A || x) + offset`. Where `A` is the address of the smart account being interacted with, x is the `bytes32` value, `offset`. is a number up to 128 and ‘||’ indicates a concatenation. While access to slot `A` can only be achieved through assembly (Yul language), the second pattern (with `keccak256`) is common to access Solidity mappings using `A` as the key of the mapping.

Both problems involve evaluating whether certain values ​​(Yul `sload` and `sstore` arguments, mapping keys) are equal to a smart account address. The smart account address is always stored as a member (‘sender’) of the first argument of ‘validateUserOp’. So if a given value depends on the ‘sender’ of another variable defined elsewhere in the code, the problem can be redefined as a check. Dependency paths can include function calls, reassignments to new variables, or type casts.

The Wake ERC-4337 detector uses data dependency graphs, a feature currently in development, to analyze data relationships between different parts of the code. Data dependency graphs are utilized in the ERC-4337 detector to achieve high precision of reported detections.

Wake ERC4337 detector

Thanks to the ERC-4337 detector, it is very easy to detect prohibited opcode usage and storage access. This is very labor intensive to check manually.

Test your code for free with the Wake ERC-4337 detector. Submit this form!

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Balancer StableSwap Analysis and Differential Fuzzing Guide

November 28, 2025

Quantum-secure data storage for app developers with open source Shamir secret sharing for capacitors

November 26, 2025

The Shai Hulud malware has hit NPM as cryptocurrency libraries face a growing security crisis.

November 24, 2025
Add A Comment

Comments are closed.

Recent Posts

UK Begins Tax Crackdown on Resident Cryptocurrency Transactions

November 30, 2025

Bitcoin price recovery is running out of steam and bears are ready to strike.

November 29, 2025

BlackRock acquired $589 million in Bitcoin and Ethereum in just three days.

November 29, 2025

Gala Games Launches ‘Dusk of the Broken’ Event with $GALA Rewards

November 29, 2025

Balancer StableSwap Analysis and Differential Fuzzing Guide

November 28, 2025

Avail Launches Nexus Mainnet, Unifies Liquidity Across Ethereum, Solana, EVMs

November 28, 2025

MEXC Launches Long-Term P2P Incentive Program To Accelerate Global Fiat Market Expansion

November 28, 2025

How are crypto casinos shaping global iGaming?

November 28, 2025

A Retired Italian Couple Earns $998 Per Day Passively Through 8hoursmining Cloud Cryptocurrency Mining.

November 27, 2025

Mantle And Bybit Unite To Bring USDT0, The Omnichain Deployment Of Tether’s USDT Stablecoin, To The Largest Exchange-Related Network

November 27, 2025

A Retired Italian Couple Earns $998 Per Day Passively Through 8hoursmining Cloud Cryptocurrency Mining.

November 27, 2025

Crypto Flexs is a Professional Cryptocurrency News Platform. Here we will provide you only interesting content, which you will like very much. We’re dedicated to providing you the best of Cryptocurrency. We hope you enjoy our Cryptocurrency News as much as we enjoy offering them to you.

Contact Us : Partner(@)Cryptoflexs.com

Top Insights

UK Begins Tax Crackdown on Resident Cryptocurrency Transactions

November 30, 2025

Bitcoin price recovery is running out of steam and bears are ready to strike.

November 29, 2025

BlackRock acquired $589 million in Bitcoin and Ethereum in just three days.

November 29, 2025
Most Popular

Standard Chartered said Bitcoin could hit record highs again before the US election.

October 15, 2024

SOL and BOME received the most attention on cryptocurrency social media due to the price delay of Ether (ETH) and Bitcoin (BTC).

March 18, 2024

Impact of Polygon (MATIC) Nodekit support on the AggLayer chain

June 27, 2024
  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms and Conditions
© 2025 Crypto Flexs

Type above and press Enter to search. Press Esc to cancel.