Moby Protocol Suffers $1.1 Million Private Key Compromise
A compromised private key enabled unauthorized contract upgrades, allowing an attacker to drain assets and exposing critical vulnerabilities in key management systems.
Hyperdrive Lending Protocol Suffers $782,000 Router Smart Contract Exploit
A critical flaw in Hyperdrive's router contract enabled unauthorized arbitrary calls, allowing an attacker to drain significant liquidity from core markets.
Hyperliquid Hyperdrive Protocol Operator Permissions Exploited for $700k
A critical flaw in operator permissions within Hyperdrive's Router allowed manipulation of Treasury Market positions, risking user funds.
UXLINK Multi-Signature Wallet Compromised, Enabling Unauthorized Token Minting
A delegate call vulnerability within a multi-signature wallet granted administrative control, allowing unauthorized asset transfers and limitless token minting.
Eclair Lightning Network Funds at Risk from Old Commitment Transaction Exploit
A critical flaw in older Eclair versions enables attackers to broadcast stale commitment transactions, risking full channel fund theft.
Griffin AI Suffers $3m Cross-Chain Exploit via Forged LayerZero Peer
A critical misconfiguration in cross-chain validation mechanisms allowed unauthorized token minting, highlighting systemic vulnerabilities in DeFi bridge security.
Numa Protocol Suffers Synthetic Asset Manipulation Exploit
A vault logic flaw enabled attackers to inflate synthetic asset value, leading to collateral manipulation and unauthorized liquidations.
Shibarium Bridge Compromised: Flash Loan Seizes Validator Keys
A flash loan exploit manipulating governance tokens to seize validator control exposes critical Layer 2 bridge vulnerabilities, threatening asset integrity.
Marginfi Protocol Secures $160 Million from Flash Loan Vulnerability
A critical collateral management flaw in Marginfi was responsibly disclosed, averting a $160 million flash loan exploit.
Nemo Protocol Suffers $2.6 Million Exploit Due to Unaudited Code
A critical lapse in code review and governance allowed a developer to deploy unaudited smart contracts, creating an exploitable vector for significant asset drain.
Memecoin Launchpad Odin.fun Exploited for $7 Million via AMM Logic Flaw
An inherent flaw within Odin.fun's AMM logic allowed attackers to manipulate token values, leading to significant capital drain and undermining protocol integrity.
Numa Protocol Suffers $313k Exploit via NumaVault Manipulation
A critical vulnerability in Numa Protocol's NumaVault allowed malicious nuBTC minting, enabling attacker to liquidate user positions and drain funds.
ALEX Protocol Suffers $16.18 Million Exploit via Failed Access Controls
A critical vulnerability in the ALEX Protocol's vault system, stemming from failed access controls, allowed an attacker to bypass security mechanisms and drain significant funds.
Force Bridge Suffers $3.9 Million Private Key Compromise across Chains
Compromised private keys enabled unauthorized privileged function calls, draining multi-chain assets and exposing critical cross-chain bridge vulnerabilities.
Cork Protocol Loses $12m to Flawed Token Redemption Logic
Inadequate validation in Cork Protocol's market creation logic enabled unauthorized token minting, leading to significant asset drain.
Nemo Protocol Market Pool Drained via Undisclosed Exploit
A lack of immediate root cause disclosure for a market pool drain highlights the inherent risks in nascent DeFi protocols.
ALEX Protocol Suffers $8.3 Million Exploit via Self-Listing Logic Vulnerability
A critical flaw in self-listing verification logic enabled malicious token manipulation, bypassing controls to drain liquidity pools.
Nemo Protocol Developer Deployed Unaudited Code, Enabling $2.6m Exploit
An unaudited code deployment enabled a flash loan and state manipulation attack, compromising Nemo Protocol and jeopardizing user assets.
Shibarium Bridge Compromised by Flash Loan and Validator Key Exploit
A critical vulnerability in Shibarium's validator key management allowed a flash loan attack to drain $2.4 million, exposing systemic bridge risks.
Formalizing MEV for Blockchain Security Proofs
This research establishes a formal theory of Maximal Extractable Value, providing a foundational model for analyzing and proving blockchain security against economic attacks.
Monero Suffers 18-Block Reorganization from Qubic 51% Attack
A mining pool's majority hash rate control enabled a deep blockchain reorg, invalidating transactions and undermining network finality.
Nemo Protocol Suffers $2.6 Million Exploit from Unaudiated Code Deployment
A critical lapse in code review and deployment protocols allowed a rogue developer to introduce state-modifying vulnerabilities, leading to significant asset exfiltration.
