According to the Beosin EagleEye security risk monitoring, early warning and blocking platform monitoring of the blockchain security audit company Beosin, the BSC-WBNB-WOOF transaction pair was attacked, and the transaction hash: 0xea5cf9199d23a9108d84e9204cb13795a480b34a6e4ef448245a1452f69fe781. According to the analysis of Beosin security technicians, the attack is caused by the backdoor code of the WOOF token contract. WOOF’s address (jZKbvD) permission address can use the transferFrom function 0 to authorize the transfer of WOOF tokens from any address. The attacker transferred the WOOF tokens in the BSC-WBNB-WOOF trading pair through the transferFrom function, updated the reserve of the pool, and then used a large amount of WOOF tokens to exchange all WBNB in the trading pair. At present, the funds involved are about 115,000 US dollars, most of which are distributed to other addresses through the attacker's address (0x9b07f0488390a2d9c7af9ae40e0e64f31489006d).