According to Beosin's Beosin EagleEye security risk monitoring, early warning and blocking platform monitoring, the TIME token was attacked and the hacker made approximately US$188,000. Beosin security team analysis found that hackers used contract vulnerabilities to destroy the TIME tokens in the TIME-ETH trading pair to make profits. The reason is that the _msgSender() of the TIME token returns not msg.sender, but is selected according to the caller. If the caller is a Forwarder contract, the address specified by the caller is returned.
At the same time, the Forwarder contract has any external calling function. The attacker calls the TIME contract burn function through the Forwarder contract and passes in the pair address, ultimately destroying the TIME tokens in the pair.