DeFi Automated Market Maker Drained via Protocol Precision Manipulation
A subtle, systemic flaw in complex pool mathematics allowed for precision rounding manipulation, enabling unauthorized asset draining and immediate liquidity shock across multiple chains.
Curve Finance Pools Drained by Compiler-Level Smart Contract Reentrancy Flaw
A critical compiler-level reentrancy vulnerability in Vyper 0.2.15-0.3.0 allowed attackers to bypass non-reentrant guards, enabling multi-million dollar asset theft.
Decentralized Exchange Suffers Massive Multi-Chain Smart Contract Logic Exploit
A critical flaw in the protocol's V2 pool logic enabled unauthorized asset withdrawals, proving systemic risk in complex multi-chain architectures.
Balancer V2 Pools Drained by Precision Rounding Smart Contract Flaw
A systemic precision rounding error in the V2 Vault's `batchSwap` function allowed attackers to repeatedly drain liquidity via compounded, minute discrepancies.
KyberSwap Elastic Drained Fifty-Six Million Exploiting Concentrated Liquidity Logic
A systemic logic flaw in concentrated liquidity pool tick calculations allowed double liquidity counting, enabling a multi-chain $56M asset drain.
Major DeFi Protocol Drained $200 Million Exploiting Critical Reentrancy Flaw
The reentrancy flaw allowed an external call to recursively withdraw assets, subverting state checks and draining $200M from the vault.
Major DeFi Lending Protocol Drained $50 Million via Oracle Manipulation
A $50M drain confirms that unaudited oracle input validation remains a critical systemic risk for all interconnected DeFi lending platforms.
Balancer Multi-Chain Pools Drained Exploiting Critical Access Control Flaw
Systemic weak permission controls across Balancer's multi-chain architecture enabled a massive $128M unauthorized asset drain, demanding immediate risk-mitigation action.
DeFi Protocol Prisma Finance Drained via Malicious Flash Loan Input Validation Flaw
Inadequate input validation on the flash loan callback allowed an attacker to spoof migration data, directly compromising approved user collateral.
