Operation Rescue POSI Token!

Objective

Hello whitehat! We are so thankful for your answer to our cry for help! Time is running out... There is a huge amount of tokens sitting on an address that we can't access. We need your help to rescue them!

For context, we have to transfer a big big amount of these tokens to a very important organization before a deadline. Unfortunately, we made a typo in the destination address (plus we didn't check the checksummed version of the address) and now the tokens are stuck in an address that doesn't belong to anyone.

However, we noticed that the address where our funds are stuck is coincidentally the same address as one of the vaults we develop but in another EVM chain... The address of the vault is 0x70E194050d9c9c949b3061CC7cF89dF9c6782b7F, which was deployed by our vault-factory. The EOA who triggered that deploy, 0x5615dEB798BB3E4dFa0139dFa1b3D433Cc23b72f belongs to an old employee that left the company a long time ago, and we don't have access to the corresponding private key... There is little information left about this employee, we don't even know if he is still alive. The only thing that we know is that he used to work with us in the past, that his birthday was in November and that he was a big fan of the CREATE2 opcode. What a silly guy...

Anyways, please whitehat make use of your skills to rescue the tokens and transfer them to the address of our organization!

📌 Extract the 1000 POSI tokens from the Vault.

📌 Transfer the rescued tokens to the address of the organization.

Initial context

  • You will be in control of the whitehat address.

  • The whitehat address has an initial balance of 10 ether.

🗒️ Concepts you should be familiar with (spoilers!)

The contracts that you will hack are:

Which have interactions with the following contracts:

The test script where you will have to write your solution is:

Writeup

PoC

Last updated