SwissBorg Solana Earn Program Suffers $41m Third-Party API Exploit
A compromised third-party API allowed unauthorized withdrawal authority, exposing on-chain controls and draining $41 million in SOL from a DeFi staking program.
LLMs Automate Smart Contract Formal Verification Property Generation
A novel system leverages large language models and retrieval-augmented generation to automate smart contract property creation, enhancing security and accessibility.
Multi-Signature Wallet Drained via Sophisticated Phishing Attack
A meticulously crafted phishing campaign exploited multi-signature wallet approval mechanisms, enabling the unauthorized transfer of significant digital assets.
Multi-Sig Wallet Drained by Sophisticated Phishing Attack
A cunning phishing attack exploited a multi-signature wallet, leading to the unauthorized transfer of assets by disguising malicious approvals.
Nemo Protocol Suffers $2.6 Million Exploit from Unaudiated Code Deployment
A critical lapse in code review and deployment protocols allowed a rogue developer to introduce state-modifying vulnerabilities, leading to significant asset exfiltration.
Nemo Protocol Loses $2.6 Million from Unaudited Code Deployment
A public flash loan function and state-modifying query flaw enabled a $2.6 million drain, highlighting critical governance and audit failures.
Shibarium Bridge Suffers Flash Loan Validator Key Compromise
A flash loan attack manipulated Shibarium's validator consensus, enabling unauthorized asset siphoning and exposing critical governance vulnerabilities.
Nemo Protocol Suffers Rogue Developer Code Deployment Exploit
An internal developer's unauthorized code deployment with critical flash loan and state modification vulnerabilities led to a significant $2.6 million protocol compromise.
Multi-Signature Wallet Drained via Sophisticated Phishing Approval Deception
Sophisticated phishing bypassed multi-sig security by disguising malicious approvals, leading to a $3M asset drain and highlighting advanced social engineering risks.
Sophisticated Phishing Drains $3m from Multi-Signature Wallet via Malicious Approval
Malicious contract impersonation and Safe Multi Send abuse enabled a $3M phishing drain, highlighting critical authorization vector risks.
Shibarium Bridge Compromised by Flash Loan and Validator Key Exploit
A critical vulnerability in Shibarium's validator key management allowed a flash loan attack to drain $2.4 million, exposing systemic bridge risks.
Nemo Protocol Suffers $2.59 Million Exploit from Rogue Developer Code
A critical vulnerability in unaudited smart contract code, maliciously deployed by an insider, enabled unauthorized state modifications and flash loan exploitation, leading to significant asset drain.
Base L2 Integrates Solana Bridge and Explores Network Token
Base expands its architectural footprint, enabling seamless cross-chain asset flow and advancing toward a foundational interoperable layer.
Nemo Protocol Suffers $2.6 Million Exploit from Unaudited Code
A publicly exposed flash loan function and state-modifying query vulnerability allowed unauthorized asset drainage, posing a critical risk to protocol integrity.
Bybit Ethereum Cold Wallet Compromised by Masked Transaction Exploit
A sophisticated masked transaction exploit manipulated smart contract logic, leading to a massive drain of Bybit's Ethereum cold wallet.
Nemo Protocol Suffers $2.6 Million Exploit Due to Unaudi
A developer's unauthorized code deployment and flash loan vulnerability led to a $2.6 million loss, exposing critical internal control failures.
Multi-Signature Wallet Drained by Sophisticated Phishing Attack via Disguised Approvals
Malicious contract approvals, disguised through legitimate interfaces, represent a critical bypass of multi-sig security, endangering user assets.
Nemo Protocol Developer Exploit Enables $2.6 Million Flash Loan Attack
An internal code deployment flaw allowed unauthorized contract state manipulation, exposing user funds to immediate exfiltration.
Formalizing MEV: Abstract Model for Blockchain Economic Attacks
This research establishes a formal theory of Maximal Extractable Value, providing a rigorous abstract model for understanding and mitigating blockchain economic attacks.
Venus Protocol User Phished, $13.5 Million Recovered by Governance
A sophisticated phishing attack leveraging a malicious client compromised a user's delegated account control, exposing DeFi to social engineering vulnerabilities.
Shibarium Bridge Drained by Flash Loan and Validator Key Exploit
A sophisticated flash loan attack exploited Shibarium's validator key management, compromising network consensus and enabling significant asset exfiltration.
Shibarium Bridge Suffers $2.4 Million Reentrancy Exploit
A reentrancy vulnerability in the Shibarium Bridge led to a $2.4 million asset drain, underscoring critical security gaps in cross-chain infrastructure.
GMX V1 Suffers $40 Million Reentrancy Exploit on Arbitrum
A critical reentrancy vulnerability in GMX V1's GLP pricing mechanism allowed attackers to manipulate asset valuations, enabling unauthorized token minting and liquidity drain.
Odin.fun Suffers $7 Million Bitcoin Loss via AMM Liquidity Manipulation
A critical flaw in Odin.fun's Automated Market Maker allowed price spoofing, enabling attackers to drain significant Bitcoin liquidity.
Yala Stablecoin Depegs after Unauthorized Bridge Deployment Exploit
A critical bridge deployment key compromise enabled an attacker to depeg Yala's stablecoin, highlighting severe risks in key management.
UPCX Payment Platform Suffers $70 Million Private Key Compromise
A compromised private key enabled an attacker to maliciously upgrade a smart contract, facilitating unauthorized withdrawal of $70 million from management accounts.
Cetus DEX on Sui Network Exploited via Price Oracle Manipulation
A critical flaw in Cetus Protocol's price oracle allowed attackers to inject fake liquidity, compromising asset integrity and draining $260 million.
Resupply Lending Protocol Exploited via Oracle Price Manipulation Vulnerability
An integer division flaw in a newly deployed vault allowed attackers to manipulate exchange rates, enabling undercollateralized borrowing and significant asset drain.
ALEX Protocol Suffers $8.3 Million Exploit via Self-Listing Logic Vulnerability
A critical flaw in self-listing verification logic enabled malicious token manipulation, bypassing controls to drain liquidity pools.
