Stablecoin Protocol Compromised via Clandestine Proxy Initialization Flaw during Deployment
A sophisticated "Clandestine Proxy" attack subverted the protocol's upgradeability logic during initial deployment, enabling a stealthy $1M asset drain.
Legacy Yearn Pool Drained Exploiting Infinite Token Minting Flaw
A logic flaw in the legacy stableswap mint function enabled infinite token issuance, creating a systemic risk for all integrated liquidity pools.
Advanced AI Models Prove Autonomous Smart Contract Exploitation Feasible
The rapid evolution of large language models enables autonomous, low-cost vulnerability discovery and exploitation, accelerating the systemic risk to unaudited DeFi logic.
Yearn Finance Legacy Contract Exploited by Infinite Token Minting Flaw
Unchecked arithmetic in a legacy yETH contract allowed an attacker to mint infinite tokens, creating a systemic risk for all dependent liquidity pools.
AI Agents Autonomously Exploit Smart Contracts Discovering Zero-Days
Frontier AI models, including GPT-5 and Claude, now demonstrate human-level capability to autonomously discover and exploit zero-day smart contract vulnerabilities, accelerating the threat landscape.
Goldfinch User Wallet Drained via Legacy Contract Share Price Manipulation
A legacy contract approval flaw was weaponized by an attacker to manipulate share price and drain $330K, underscoring systemic risk in stale permissions.
Yearn Finance yETH Pool Drained Exploiting Cached Storage Arithmetic Flaw
A critical failure in state transition logic allowed a minimal 16 wei deposit to mint infinite tokens, leading to a $9 million loss via arithmetic overvaluation.
Yearn Finance Legacy yETH Pool Drained via Infinite Token Minting Flaw
A critical logic flaw in a legacy stableswap pool enabled an attacker to mint an unlimited token supply, compromising liquidity pool integrity.
