Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I don't know. I analyzed the code from below the video with GPT[0] and it flagged a bunch of stuff it considered shady.

[0] Every time I mention using AI my posts get downvoted to infinity, so take the above with a grain of salt :)

I don't know anything about coding crypto, but it looks to me like it has a bunch of functions which each return a little hex string which it merges together into a wallet address which it then transfers all your funds to. I could be totally wrong and it's all above board.

Here's the code from the video:

https://hastebin.com/share/paxisehuki.php



You can see that most functions deal with converting hex strings to bytes or parsing utf-8 despite their name. For example, checkLiquidity seems to just convert hex representation to binary and not what its name says.


The contract is payable, i.e. will accept ether as payment but doesn't actually do anything. From a glance looks like the withdrawal function is setup to generate the address of the scammer - through all of those obfuscated functions that have hex string slices - so ultimately only they can remove the funds.


It also looks like the contract requires the user to deposit 0.4 ETH for it to work.


The first wallet address in that file has a balance equivalent to $8m USD - dang.

https://etherscan.io/address/0xc02aaa39b223fe8d0a0e5c4f27ead...


I think this might be not an address belonging to the scammer, but an address of an exchange or something like that. Why would he write his address in clear text.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: