UXLINK Multi-Sig Wallet Exploited, $11.3 Million Drained via DelegateCall
A critical delegate call vulnerability in UXLINK's multi-signature wallet granted attackers full administrative control, enabling unauthorized asset draining and token minting.
UXLINK Multi-Signature Wallet Compromised, Enabling Unauthorized Token Minting
A delegate call vulnerability within a multi-signature wallet granted administrative control, allowing unauthorized asset transfers and limitless token minting.
Level Finance Referral Contract Exploited for $1.1 Million in LVL Tokens
A critical business logic flaw in Level Finance's referral contract enabled an attacker to repeatedly claim rewards, underscoring the severe risk of inadequate precondition checks in DeFi protocols.
UXLINK Multi-Signature Wallet Compromised via DelegateCall Vulnerability
A delegateCall vulnerability in a multi-signature wallet enabled unauthorized administrative control, leading to significant asset drain and token inflation.
UXLINK Multi-Signature Wallet Compromised, Billions of Tokens Minted
A delegate call vulnerability in UXLINK's multi-signature wallet granted administrative control, enabling unauthorized token minting and significant financial loss.
UXLINK Multi-Signature Wallet Compromised, $11.3 Million Drained
A delegate call vulnerability in UXLINK's multi-signature wallet granted an attacker administrative control, enabling unauthorized asset transfers and unlimited token minting.
Kame Aggregator Suffers $1.32 Million Swap Function Exploit
A critical design flaw in Kame Aggregator's `swap()` function allowed unauthorized token transfers, enabling attackers to drain $1.32 million.
Ethereum Wallets Compromised by EIP-7702 Delegator Contract Exploits
EIP-7702's delegator function enables sophisticated phishing, allowing attackers to bypass critical on-chain checks and drain user funds.
Hundred Finance Suffers $7.4 Million Flash Loan and Precision Loss Exploit
A rounding error in an hToken contract, combined with low liquidity, enabled an attacker to manipulate exchange rates and drain millions via flash loans.
Bedrock uniBTC Suffers $2 Million Exploit via Faulty Minting Logic
A critical minting logic flaw allowed attackers to exploit disparate asset valuations, compromising Bedrock's uniBTC collateral.
Nemo Protocol Suffers $2.59 Million Exploit Due to Unaudited Code
A critical vulnerability stemming from unaudited code and single-signature deployment enabled a $2.59 million state manipulation attack on the Sui-based Nemo Protocol.
Cetus Protocol on Sui Suffers $223 Million Arithmetic Overflow Exploit
An arithmetic overflow vulnerability in a third-party library allowed an attacker to manipulate asset calculations, leading to a catastrophic $223 million drain from the Cetus Protocol.
Nemo Protocol Suffers $2.6 Million Exploit Due to Unaudited Code
A critical lapse in code review and governance allowed a developer to deploy unaudited smart contracts, creating an exploitable vector for significant asset drain.
MYX Finance Airdrop Exploited by Sybil Attackers for $200 Million
Airdrop distribution mechanisms, vulnerable to Sybil attacks, enable coordinated entities to disproportionately claim token rewards, posing significant market integrity and fairness risks.
Credix Protocol Exploited via Admin Wallet, Vanishes with $4.5 Million
A compromised administrative key enabled unauthorized token minting and liquidity drainage, culminating in a suspected insider-driven rug pull.
Shibarium Bridge Compromised by Flash Loan and Validator Key Manipulation
A critical vulnerability in Shibarium's validator consensus, leveraged by a flash loan, enabled unauthorized asset exfiltration, posing systemic risk to cross-chain bridges.
SwissBorg Suffers $41 Million Solana Loss via Partner API Exploit
An exploited third-party API allowed attackers to drain $41 million in Solana tokens, highlighting critical risks in external service integrations for DeFi protocols.
Formalizing Maximal Extractable Value for Provable Blockchain Security
This research establishes a rigorous, abstract model of MEV to enable formal security proofs against economic attacks in decentralized systems.
Nemo Protocol Hacked via Developer’s Unaudited Code Deployment
A developer's unreviewed code introduced critical flash loan and query function flaws, enabling a $2.6 million state manipulation exploit.
Shibarium Bridge Exploited via Flash Loan and Validator Key Compromise
A critical vulnerability in Layer 2 bridge architecture, leveraging flash loan mechanics, allowed attackers to seize validator control and drain assets.
Nemo Protocol Developer Deployed Unaudited Code, Enabling $2.6m Exploit
An unaudited code deployment enabled a flash loan and state manipulation attack, compromising Nemo Protocol and jeopardizing user assets.
Shibarium Bridge Compromised by Flash Loan and Validator Key Exploit
A critical vulnerability in Shibarium's validator key management allowed a flash loan attack to drain $2.4 million, exposing systemic bridge risks.
Shibarium Bridge Flash Loan Attack Compromises Validator Keys
A flash loan exploit leveraged governance token control to compromise validator keys, enabling unauthorized transactions and draining $2.4 million in assets.
Shibarium Bridge Compromised by Flash Loan Validator Manipulation
A flash loan exploit leveraged temporary validator control, draining significant assets from the Shibarium-Ethereum bridge.
