The vulnerability incident analysis report for the Ethereum programming language Vyper has been released, and the vulnerability has been fixed and tested in v0.3.1
ChainCatcher message, the Ethereum programming language Vyper released a post-mortem analysis report regarding last week's vulnerability incident. The report indicated that on July 30, multiple Curve liquidity pools were exploited due to a potential vulnerability in the Vyper compiler, which was an improperly implemented reentrancy guard. The affected Vyper versions included v0.2.15, v0.2.16, and v0.3.0.Vyper stated that the vulnerability has been fixed and tested in version v0.3.1, and that v0.3.1 and later versions are safe. However, at the time, it was not realized that protocols using the vulnerable versions of the compiler would be affected, nor were downstream protocols notified in a timely manner.