Cetus DEX Suffers $220 Million Exploit via Pricing Mechanism Manipulation
A critical flaw in Cetus Protocol's concentrated liquidity market maker pricing mechanism enabled an attacker to manipulate token values, draining significant assets and underscoring systemic risks in nascent DeFi ecosystems.
Formal Verification Secures Stellar DeFi Lending Protocols
A novel formal verification tool, Certora Sunbeam Prover, mathematically guarantees the integrity of Stellar-based DeFi smart contracts, preventing catastrophic financial exploits.
DeFi Ecosystem Confronts Evolving Smart Contract Vulnerabilities and Systemic Risk
The pervasive reliance on complex smart contract logic and external data feeds introduces critical attack vectors, demanding a paradigm shift in security posture to mitigate multi-billion dollar exposures.
Balancer V2 Vault Vulnerability Risks Liquidity Manipulation
A critical flaw in Balancer V2's internal balance mechanism could allow unlaunched token manipulation, jeopardizing liquidity pools.
Shibarium Bridge Compromised by Flash Loan and Validator Key Manipulation
A critical vulnerability in Shibarium's validator consensus, leveraged by a flash loan, enabled unauthorized asset exfiltration, posing systemic risk to cross-chain bridges.
Kinto Ethereum L2 Suffers Reentrancy Exploit, Loses $15 Million USDC
A reentrancy vulnerability in Kinto's minting contract allowed attackers to siphon $15 million in USDC, exposing critical L2 smart contract design flaws.
Zksync Airdrop Contract Admin Key Leak Leads to Unauthorized Minting
A compromised administrative key in a zkSync airdrop contract enabled unauthorized token minting, highlighting critical access control vulnerabilities.
Onyx Protocol Suffers $3.8 Million Exploit via NFT Liquidation Contract
A critical flaw in Onyx Protocol's NFT liquidation contract enabled an attacker to drain $3.8 million, compromising stablecoin peg integrity.
ALEX Protocol Suffers Access Control Exploit, $16.18 Million Lost
A critical access control flaw allowed a malicious token to drain ALEX Protocol vaults, highlighting systemic risks in contract permissioning.
