DeFi Payment Protocol Drained via Compromised Deployer Key and Contract Takeover
Centralized contract ownership remains a critical attack surface, enabling a deployer key compromise to maliciously manipulate core staking logic.
Stablecoin Protocol USPD Drained via Stealth Proxy Initialization Attack
A novel Clandestine Proxy In the Middle attack compromised USPD's deployment, enabling the stealthy minting of 98M tokens and a $1M collateral drain.
DeFi Protocol UwU Lend Drained by Flash Loan Oracle Manipulation
The protocol's oracle design, which lacked price smoothing and relied on manipulable low-liquidity pools, enabled a $4 billion flash loan attack.
Prisma Finance Migration Contract Drained via Flash Loan Input Validation Flaw
Critical lack of input validation within the MigrateTroveZap contract allowed an attacker to spoof migration data during a flash loan callback, resulting in a $12.3 million collateral drain.
Cross-Chain Bridge Flaw Enables Massive Token Minting and Asset Drain
A sophisticated cross-chain bridge manipulation allowed a threat actor to mint and dump billions of fake tokens, causing an 87% token price crash.
Bex Protocol Drained $12.4 Million by Inherited Smart Contract Logic Flaw
An architectural vulnerability in the V2 vault logic of a forked protocol allowed for unauthorized, multi-chain asset extraction.
