Pancakeswap LP already got locked until 14. January 2024:
https://bscscan.com/tx/0x7736b7e3f50b9babdbbf78ade53ba4510c740e7598cd401b1c592114b66c116f
We will lock the LP on our Platform within the next 24 hours! 🔥 🔒
https://bscscan.com/tx/0x7736b7e3f50b9babdbbf78ade53ba4510c740e7598cd401b1c592114b66c116f
We will lock the LP on our Platform within the next 24 hours! 🔥 🔒
Screenshot 2022-01-13 at 10.04.51.png
14.9 KB
Crosswise is THE featured project on DexTools.io! 🚀
Jump onboard now
Jump onboard now
Good Morning Crosswise Community
We just wanted to give you an update and re-assure you that we are working on a solution to the situation.
We are as disappointed as you are. We are terribly sorry and will find a way to make it work for our community.
We now know how the attacker exploited our Masterchef contract. What is less clear is why that vulnerability was left unaddressed, and even ironed over. There are some indications that this may have been done with intent, and we will seek legal counsel on whether we need to report the case to law enforcement.
The situation is complex but as a consequence we have had to ask 4 of our developers to leave due to negligence, and perhaps malfeasance.
On a more positive note, not all is lost! We still have some funds left in treasury, innovative code, and a formidable community.
We don't want to overpromise anything so please treat this as provisional information. However we fully intend to get back up and running. Frederic, myself and the rest of the team remain committed to this project, and we're determined to see it to fruition.
What we are doing now is concretely figuring out the steps needed to take a snapshot of user's holdings prior to the exploit, as well as re-evaluating the codebase for further vulnerabilities.
Once we are satisfied with the evaluation, we will finalise the audit with CertiK, and only then redeploy our contracts.
We thank you once again for your understanding and support through these difficult times.
Please read a Statement from Frederic Beeg,
CEO of Crosswise.Finance:
https://crosswise.notion.site/Statement-61e387d65d3f4f02ae2dd0e4b8f10cbf
We just wanted to give you an update and re-assure you that we are working on a solution to the situation.
We are as disappointed as you are. We are terribly sorry and will find a way to make it work for our community.
We now know how the attacker exploited our Masterchef contract. What is less clear is why that vulnerability was left unaddressed, and even ironed over. There are some indications that this may have been done with intent, and we will seek legal counsel on whether we need to report the case to law enforcement.
The situation is complex but as a consequence we have had to ask 4 of our developers to leave due to negligence, and perhaps malfeasance.
On a more positive note, not all is lost! We still have some funds left in treasury, innovative code, and a formidable community.
We don't want to overpromise anything so please treat this as provisional information. However we fully intend to get back up and running. Frederic, myself and the rest of the team remain committed to this project, and we're determined to see it to fruition.
What we are doing now is concretely figuring out the steps needed to take a snapshot of user's holdings prior to the exploit, as well as re-evaluating the codebase for further vulnerabilities.
Once we are satisfied with the evaluation, we will finalise the audit with CertiK, and only then redeploy our contracts.
We thank you once again for your understanding and support through these difficult times.
Please read a Statement from Frederic Beeg,
CEO of Crosswise.Finance:
https://crosswise.notion.site/Statement-61e387d65d3f4f02ae2dd0e4b8f10cbf
The Dapp is under maintenance now.
Don't worry that we need to take it down for some time.
There is no need to worry about it.
Don't worry that we need to take it down for some time.
There is no need to worry about it.
LATEST UPDATE POST EXPLOIT
This was posted in our chats but some of you may have missed it. More updates coming soon:
https://crosswise.medium.com/post-exploit-update-2a24c3370466
Key Points:
- Same Value of LP Tokens stored, Same Price of CRSS, same monetary value in Pools. This will lead to no financial loss for any investor involved and also we will have the exact same status of the DAPP as before the exploit.
- We may also offer some “dip buyers” partial compensation, but we have yet to ascertain the viability of such a scheme.
- Given the nature of the exploit we need to re-evaluate the entire codebase for further vulnerabilities. We will also take this opportunity to further improve the code.
- Once satisfied with the evaluation, we will finalise the audit with CertiK, and only then redeploy our contracts.
- We can’t as yet give you a definitive timeframe, but currently estimate 2–3 months for us to complete these tasks including the Audit.
This includes a complete redesign of the DAPP & the implementation of new, essential features to improve the platform.
This was posted in our chats but some of you may have missed it. More updates coming soon:
https://crosswise.medium.com/post-exploit-update-2a24c3370466
Key Points:
- Same Value of LP Tokens stored, Same Price of CRSS, same monetary value in Pools. This will lead to no financial loss for any investor involved and also we will have the exact same status of the DAPP as before the exploit.
- We may also offer some “dip buyers” partial compensation, but we have yet to ascertain the viability of such a scheme.
- Given the nature of the exploit we need to re-evaluate the entire codebase for further vulnerabilities. We will also take this opportunity to further improve the code.
- Once satisfied with the evaluation, we will finalise the audit with CertiK, and only then redeploy our contracts.
- We can’t as yet give you a definitive timeframe, but currently estimate 2–3 months for us to complete these tasks including the Audit.
This includes a complete redesign of the DAPP & the implementation of new, essential features to improve the platform.
Key Extract from Announcement:
So going forward we will make sure that the snapshot / redeployment coins:
- Same Value of LP Tokens stored, Same Price of CRSS, Same Amounts in Pools. This will lead to no financial loss for any investor involved and also we will have the exact same status of the DAPP as before the exploit.
- We may also offer some “dip buyers” partial compensation, but we have yet to ascertain the viability of such a scheme.
- Given the nature of the exploit we need to re-evaluate the entire codebase for further vulnerabilities. We will also take this opportunity to further improve the code.
- Once satisfied with the evaluation, we will finalise the audit with CertiK, and only then redeploy our contracts.
- We can’t as yet give you a definitive timeframe, but currently estimate 2–3 months for us to complete these tasks including the Audit.
This includes a complete redesign of the DAPP & the implementation of new, essential features to improve the platform.
So going forward we will make sure that the snapshot / redeployment coins:
- Same Value of LP Tokens stored, Same Price of CRSS, Same Amounts in Pools. This will lead to no financial loss for any investor involved and also we will have the exact same status of the DAPP as before the exploit.
- We may also offer some “dip buyers” partial compensation, but we have yet to ascertain the viability of such a scheme.
- Given the nature of the exploit we need to re-evaluate the entire codebase for further vulnerabilities. We will also take this opportunity to further improve the code.
- Once satisfied with the evaluation, we will finalise the audit with CertiK, and only then redeploy our contracts.
- We can’t as yet give you a definitive timeframe, but currently estimate 2–3 months for us to complete these tasks including the Audit.
This includes a complete redesign of the DAPP & the implementation of new, essential features to improve the platform.
COMMUNITY AMA 26TH JAN 11AM UTC
Dear Community, please join us for our first community voice AMA since the exploit. We would like to take this opportunity to reassure everyone, as well as address your questions and share some updates.
Please do keep in mind that a lot of details remain to be defined. Please understand that we need to check the viability of every single thing that we promise. So until that is done, please understand if we cannot commit ourselves to any particular course of action at this stage.
To address as many questions as possible, we would kindly ask you to respond to this announcement with your question. We will try to address as many of them as possible during the AMA and make an audio recording available for those can’t make it to the live event. Please be mindful and ensure your question has not already been addressed.
Dear Community, please join us for our first community voice AMA since the exploit. We would like to take this opportunity to reassure everyone, as well as address your questions and share some updates.
Please do keep in mind that a lot of details remain to be defined. Please understand that we need to check the viability of every single thing that we promise. So until that is done, please understand if we cannot commit ourselves to any particular course of action at this stage.
To address as many questions as possible, we would kindly ask you to respond to this announcement with your question. We will try to address as many of them as possible during the AMA and make an audio recording available for those can’t make it to the live event. Please be mindful and ensure your question has not already been addressed.
Crosswise Community AMA 26th Jan: Recap
For those that missed the live AMA and would like to read a summary, please find it here:
https://crosswise.medium.com/community-voice-ama-26th-jan-recap-112fa8604bd2
For those that missed the live AMA and would like to read a summary, please find it here:
https://crosswise.medium.com/community-voice-ama-26th-jan-recap-112fa8604bd2
Medium
Community Voice AMA 26th Jan: Recap
An abbreviated non-verbatim summary of the Community Voice AMA held in our Telegram on 26th Jan 2022.
Crosswise Relaunch Development Update #1
Dear Community please read our latest update here:
https://crosswise.medium.com/relaunch-development-update-1-23bda639d329
Dear Community please read our latest update here:
https://crosswise.medium.com/relaunch-development-update-1-23bda639d329
Medium
Relaunch Development Update #1
Dear Community, We know everyone is eager to know what we have been working on behind the scenes. Below is quick summary of the most…