No, neither of them admitted that this was the result of their audit. LOL
Mixbytes claims they did not audit the part of the contract that was the target of hacking, they only audit other contracts.
Source:
https://twitter.com/MixBytes/status/1330413943148441602HAECHI claims that the contract which is the target of the hack is a new contract that is not subject to the security audit.
Source:
https://twitter.com/haechi_audit/status/1330347468802973698I'm not a coder to ask questions: how the contract that triggers the hack can be said to be not subject to a security audit?
This would put Pickle even more into the corner.
This opens a whole new perspective on the situation.
So it means the Pickle Finance run a new contract (yesterday they tweeted about such update) which wasn't audited for security and putting the funds of contributors at risk.
It happens so frequently. I wonder is it the same exploit used for various defi projects or what?
From what i've heard it's a new exploit (not the same Flash Loan attack that used on DeFi previously)
Pickle Finance is going to publish an official announcement to reponse on the situation soon. I wonder what they'll come up with.