Bex Protocol Drained $12.4 Million by Inherited Smart Contract Logic Flaw
An architectural vulnerability in the V2 vault logic of a forked protocol allowed for unauthorized, multi-chain asset extraction.
AI-Generated Wallet Drainer Infiltrates Open-Source Ecosystem via Malicious NPM Package
An AI-crafted supply chain attack exploited developer trust in the NPM registry to deploy stealthy wallet-draining malware, compromising end-user funds.
Solana Wallets Targeted by Malicious AI-Generated NPM Supply Chain Attack
Malicious NPM dependency executed a stealth wallet drainer script, leveraging AI-generated code to compromise developer systems and steal Solana assets.
Forked Protocol Beets Drained via Inherited Balancer V2 Smart Contract Flaw
The systemic risk of shared codebase architecture was weaponized, enabling a logic flaw to cascade across forks and drain over $100 million in pooled assets.
Malicious NPM Packages Exploit Software Supply Chain to Steal User Crypto
A new npm supply chain attack leverages cloaking and fake CAPTCHAs for unauthenticated redirection, directly enabling user financial theft.
