Legacy Yearn Vault Drained Exploiting Infinite Token Minting Logic Flaw
A logic flaw in a legacy stable-swap pool enabled the minting of near-infinite tokens, leading to an immediate, systemic drain of underlying liquid staking assets.
Single Wallet Drained of ARB Tokens via Sophisticated Phishing Scam
Malicious token approval from a phishing vector bypassed cold storage security, leading to a swift $350K asset drain.
Centralized Exchange Hot Wallet Compromise Drains Thirty-Seven Million Solana Assets
A critical failure in key management or access control allowed unauthorized transfers, exposing the systemic risk of CEX hot wallet custody.
UXLINK Multisig Wallet Compromised by Critical Delegate Call Vulnerability
A delegate call flaw in the multisig contract granted admin-level access, enabling unauthorized token minting and severe asset devaluation.
DeFi Automated Market Maker Drained via Protocol Precision Manipulation
A subtle, systemic flaw in complex pool mathematics allowed for precision rounding manipulation, enabling unauthorized asset draining and immediate liquidity shock across multiple chains.
Curve Finance Pools Drained by Compiler-Level Smart Contract Reentrancy Flaw
A critical compiler-level reentrancy vulnerability in Vyper 0.2.15-0.3.0 allowed attackers to bypass non-reentrant guards, enabling multi-million dollar asset theft.
New Delegation Flaw Exploited by Wallet Drainers to Steal User Assets
EIP-7702-style delegation is weaponized to bypass traditional `approve` checks, granting malicious contracts persistent, batch execution authority over user assets.
Blockchain Designated Verifier Proof Restores ZKP Non-Transferability on Public Ledgers
Blockchain Designated Verifier Proof (BDVP) uses verifier-side forgery to enforce non-transferability, securing prover privacy on public ledgers.
Balancer V2 Pools Drained by Multi-Chain Precision Rounding Exploit
A critical precision loss vulnerability in the Balancer V2 `batchSwap` function allowed attackers to systematically drain $128M across six chains.
