Loading video player...
I lost 100 fake eth in a bunch of milliseconds. Well, my AI did. In this video, I run an experiment: Can I build a Smart Contract using one AI Agent (The Victim), and then use a second AI Agent (The Attacker) to drain it completely? The result was terrifyingly fast. š RESOURCES & HACK HISTORY: Get the repo with the Vulnerable Reentrancy Attack: š https://github.com/pcaversaccio/reentrancy-attacks and the full history of Reentrancy hacks here: š https://github.com/Cyfrin/sc-exploits-minimized/tree/main/src/reentrancy š THE "REENTRANCY" HALL OF FAME The bug you see in this video is the exact same logic error that has stolen over $200 Million in real life. The DAO (2016): 3.6 Million ETH stolen ($60M at the time). This hack was so bad it split Ethereum in two. Fei Protocol / Rari (2022): $80 Million stolen. A simple reentrancy bug in the Fuse pools. Curve Finance (2023): $70 Million stolen. Even the "safe" Vyper language wasn't safe. š ļø TOOLS USED IDE: Google Antigravity Framework: Foundry (Forge/Cast/Anvil) Network: Local Anvil Node #Solidity #AI #Coding #Crypto #Foundry