sudo rm -rf --no-preserve-root /
sudo rm -rf --no-preserve-root /
FYI @fubuloubu, it doesn't work yet on snekmate: https://github.com/pcaversaccio/snekmate/actions/runs/8651807519/job/23771914522#step:8:1 
Quickly tested it on my Windows machine and boa installation works smoothly. Closing this issue accordingly.
@tintinweb any thoughts on this?
@grandizzy thanks for the heads-up; what's the time plan on the release on this breaking change?
Addressed via https://github.com/pcaversaccio/snekmate/pull/241 in snekmate.
For the sake of history, our recent [Twitter discussion](https://twitter.com/alexroan/status/1648032184425381888) about this issue (check the different threads).
> @pcaversaccio there is a fix in that could help #7595 basically if you use `targetContract` and `targetSender` to mark the contract to be fuzzed / sender's, there should be...
The ~[QiDao Protocol](https://twitter.com/BeosinAlert/status/1584551399941365763)~ [QuickSwap Lend](https://quillaudits.medium.com/decoding-220k-read-only-reentrancy-exploit-quillaudits-30871d728ad5) was exploited via the read-only reentrancy. You can find all the exploit details in my repo [here](https://github.com/pcaversaccio/reentrancy-attacks). For the sake of completeness, I quickly list...
After reviewing again the attack details, we should not call the attack a _QiDAO Protocol attack_ but rather a _QuickSwap Lend attack_. Accordingly, I updated the name here: https://github.com/pcaversaccio/reentrancy-attacks/commit/554cd56e99f25c9fd1f8af27327c90b56edb693d. The...
Another read-only reentrancy exploit happened yesterday: https://twitter.com/AnciliaInc/status/1614705804468424704 Here are the attack details: [Midas Capital attack](https://twitter.com/AnciliaInc/status/1614705804468424704) – January 15, 2023 | [Victim contract](https://polygonscan.com/address/0xe150e792e0a18C9984a0630f051a607dEe3c265d), [Exploit contract](https://polygonscan.com/address/0x757E9F49aCfAB73C25b20D168603d54a66C723A1), [Exploit transaction](https://polygonscan.com/tx/0x0053490215baf541362fc78be0de98e3147f40223238d5b12512b3e26c0a2c2f)