<oembed><type>rich</type><version>1.0</version><title>Jameson Lopp wrote</title><author_name>Jameson Lopp (npub17u…wt4tp)</author_name><author_url>https://yabu.me/npub17u5dneh8qjp43ecfxr6u5e9sjamsmxyuekrg2nlxrrk6nj9rsyrqywt4tp</author_url><provider_name>njump</provider_name><provider_url>https://yabu.me</provider_url><html>So the ByBit attack was able to happen because:&#xA;&#xA;Gnosis Safe front end is a web app whose JavaScript gets served from an Amazon S3 bucket.&#xA;&#xA;A Gnosis Safe developer had production AWS keys saved on their machine.&#xA;&#xA;The Dev&#39;s machine was compromised and the AWS key used to deploy a malicious front end that only targeted ByBit&#39;s wallet.&#xA;&#xA;JavaScript web apps have no cryptographic integrity checks to ensure the code being delivered was actually written by the expected author.&#xA;&#xA;Signing complex EVM transactions can&#39;t be done securely on airgapped hardware because the hardware simply doesn&#39;t have all of the contextual information needed to know the outcome of executing the transaction.</html></oembed>