Balancer V2 Pools Drained Exploiting Faulty Access Control and Precision Error
A critical logic flaw in V2 access control enabled unauthorized internal withdrawals, leveraging a rounding error to siphon over $100M cross-chain.
Protocol Sub-Vault Drained Exploiting Upgradeable Smart Contract Logic
A critical logic flaw in the upgradeable sub-vault contract permitted unauthorized withdrawal of $8.45M in bond tokens, exposing systemic risk in asset-backed DeFi architecture.
Balancer V2 Pools Drained Exploiting Precision Error across Seven Chains
A critical access control flaw in the V2 Composable Stable Pool's `manageUserBalance` function permitted unauthorized internal withdrawals, compromising over $120 million in pooled assets.
Balancer V2 Pools Drained via Faulty Internal Withdrawal Logic
A precision error in Balancer V2's `manageUserBalance` function enabled unauthorized internal withdrawals, compromising $128M in cross-chain liquidity.
Balancer V2 Exploit Exposes Systemic Risk across 27 Forked DeFi Protocols
The $128M Balancer V2 exploit exposes the systemic risk of code composability, necessitating a fundamental re-evaluation of security and upgradeability in DeFi's application layer.
Radiant Capital Developers Compromised, $50 Million Drained via Malware
A sophisticated malware injection targeting core developers bypassed multi-signature security, enabling unauthorized transfer of protocol ownership and asset exfiltration.
Hyperdrive Protocol Suffers Router Contract Exploit, $773k Drained
A critical router contract vulnerability allowed unauthorized arbitrary function calls, compromising user funds within Hyperdrive's Treasury Bill market.
GMX V1 Suffers Reentrancy Exploit, Draining $42 Million
A reentrancy vulnerability in GMX V1's smart contracts allowed an attacker to manipulate asset valuations, leading to significant liquidity drain.
Moby Protocol Suffers $1.1 Million Private Key Compromise
A compromised private key enabled unauthorized contract upgrades, allowing an attacker to drain assets and exposing critical vulnerabilities in key management systems.
