-

@ Jameson Lopp
2025-02-26 16:58:40
So the ByBit attack was able to happen because:
Gnosis Safe front end is a web app whose JavaScript gets served from an Amazon S3 bucket.
A Gnosis Safe developer had production AWS keys saved on their machine.
The Dev's machine was compromised and the AWS key used to deploy a malicious front end that only targeted ByBit's wallet.
JavaScript web apps have no cryptographic integrity checks to ensure the code being delivered was actually written by the expected author.
Signing complex EVM transactions can't be done securely on airgapped hardware because the hardware simply doesn't have all of the contextual information needed to know the outcome of executing the transaction.