updating cu used by attack

This commit is contained in:
Godmode Galactus 2023-03-30 11:17:10 +02:00
parent ed2d1f7908
commit 884653dc09
No known key found for this signature in database
GPG Key ID: A04142C71ABB0DEA
1 changed files with 1 additions and 1 deletions

View File

@ -68,7 +68,7 @@ through a transaction. This attack involves carrying out intensive calculations
that consume a large number of computational units, thereby blocking competitors from performing MEV
during that particular block, and giving the attacker an unfair advantage. We have identified specific
transactions that perpetrate this attack and waste valuable block space. The malicious transaction write
locks multiple token accounts and consumes 10 million CU i.e around 1/4 the block space. As a result, such
locks multiple token accounts and consumes 11.7 million CU i.e around 1/4 the block space. As a result, such
attacks can prevent users from using their own token accounts, vote accounts, or stake accounts, and
dapps from utilizing the required accounts. With the proposed solution, every program, such as the
token program, stake program, and vote program, can include instructions to employ the application fees