Shibarium Bridge Compromised via Flash Loan and Validator Key Control
A flash loan exploit manipulated governance tokens to seize validator control, enabling unauthorized asset drainage from the Shibarium bridge.
Shibarium Bridge Suffers $2.3 Million Validator Key Compromise via Flash Loan
A critical vulnerability in Shibarium's validator system, exploited by a flash loan, enabled unauthorized asset withdrawals, halting the bridge and jeopardizing user funds.
ALEX Protocol Suffers $16.18 Million Access Control Exploit on Stacks
A critical access control vulnerability allowed an attacker to manipulate token transfer logic, leading to a significant loss of digital assets.
ALEX Protocol Suffers $16.18 Million Access Control Exploit
A critical access control flaw in ALEX Protocol's vault system allowed an attacker to bypass validation and drain $16.18 million in assets.
New Gold Protocol Suffers $2 Million Flash Loan Oracle Manipulation
A single-source price oracle vulnerability, exploitable via flash loans, allowed an attacker to manipulate asset valuation and drain liquidity, jeopardizing user capital.
New Gold Protocol Suffers $2 Million Flash Loan Price Manipulation
A single-source price oracle vulnerability enabled a flash loan attack, compromising $2 million and exposing critical DeFi risk.
Cork Protocol Suffers $12m Exploit via Uniswap V4 Hook Manipulation
A sophisticated economic-logic exploit in Cork Protocol's Uniswap V4 hook bypassed access controls, enabling unauthorized token issuance and draining $12.1M in assets.
New Gold Protocol Suffers $2m Flash Loan Price Oracle Manipulation
A flash loan exploited New Gold Protocol's single-source price oracle, enabling asset manipulation and $2M theft, highlighting critical DeFi risk.
Memecoin Launchpad Odin.fun Exploited for $7 Million via AMM Logic Flaw
An inherent flaw within Odin.fun's AMM logic allowed attackers to manipulate token values, leading to significant capital drain and undermining protocol integrity.
Resupply Protocol Suffers $9.5 Million Price Oracle Manipulation Exploit
Price oracle manipulation via ERC-4626 vault's floor division flaw enabled $9.5M drain from Resupply Protocol.
Cetus DEX Suffers $220 Million Exploit via Pricing Mechanism Manipulation
A critical flaw in Cetus Protocol's concentrated liquidity market maker pricing mechanism enabled an attacker to manipulate token values, draining significant assets and underscoring systemic risks in nascent DeFi ecosystems.
Balancer V2 Vault Vulnerability Risks Liquidity Manipulation
A critical flaw in Balancer V2's internal balance mechanism could allow unlaunched token manipulation, jeopardizing liquidity pools.
Shibarium Bridge Compromised by Flash Loan and Validator Key Manipulation
A critical vulnerability in Shibarium's validator consensus, leveraged by a flash loan, enabled unauthorized asset exfiltration, posing systemic risk to cross-chain bridges.
ALEX Protocol Suffers Access Control Exploit, $16.18 Million Lost
A critical access control flaw allowed a malicious token to drain ALEX Protocol vaults, highlighting systemic risks in contract permissioning.
Shibarium Bridge Compromised via Flash Loan and Validator Key Exploit
A critical vulnerability in Shibarium's cross-chain bridge allowed an attacker to manipulate governance tokens and seize validator control, leading to a multi-million dollar asset drain.
ALEX Protocol Suffers $16.18 Million Exploit via Failed Access Controls
A critical vulnerability in the ALEX Protocol's vault system, stemming from failed access controls, allowed an attacker to bypass security mechanisms and drain significant funds.
Shibarium Network Suffers $2.4 Million Flash Loan Validator Key Exploit
A flash loan attack manipulated governance tokens to seize validator control, exposing critical Layer 2 consensus vulnerabilities.
New Gold Protocol Suffers Oracle Manipulation Flash Loan Exploit
A single-source price oracle vulnerability enabled a flash loan attack, demonstrating critical risks in undiversified DeFi valuation mechanisms.
CrediX Finance Suffers $4.5 Million Exploit via Compromised Multisig Admin Access
A critical vulnerability in CrediX Finance's multisig administration led to unauthorized collateral minting, draining $4.5 million and exposing systemic access control risks.
New Gold Protocol Suffers $2 Million Price Oracle Manipulation Exploit
A critical vulnerability in NGP's single-source price oracle allowed flash loan manipulation, enabling the illicit draining of $2 million and an 88% token value collapse.
Shibarium Bridge Drained by Flash Loan Exploiting Validator Keys
A flash loan attack on Shibarium's bridge compromised validator keys, enabling unauthorized asset drainage and exposing critical L2 consensus vulnerabilities.
Shibarium Network Suffers $2.4m Flash Loan and Validator Key Exploit
A flash loan attack exploited Shibarium's validator consensus, enabling unauthorized transaction approvals and a significant asset drain.
Shibarium Network Drained by Flash Loan Exploiting Validator Keys
A flash loan vulnerability enabled attackers to manipulate governance tokens, seize validator control, and drain assets from the Shibarium bridge.
Cork Protocol Loses $12m to Flawed Token Redemption Logic
Inadequate validation in Cork Protocol's market creation logic enabled unauthorized token minting, leading to significant asset drain.
ALEX Protocol Suffers $8.3 Million Exploit via Self-Listing Logic Vulnerability
A critical flaw in self-listing verification logic enabled malicious token manipulation, bypassing controls to drain liquidity pools.
Shibarium Bridge Drained via Flash Loan and Validator Key Compromise
A sophisticated flash loan attack coupled with compromised validator keys enabled a $2.4 million drain from the Shibarium bridge, exposing critical L2 security gaps.
Shibarium Bridge Compromised by Flash Loan and Validator Key Exploit
A critical vulnerability in Shibarium's validator key management allowed a flash loan attack to drain $2.4 million, exposing systemic bridge risks.
Shibarium Bridge Compromised via Flash Loan and Validator Key Manipulation
A critical vulnerability in Shibarium's Layer 2 bridge allowed attackers to exploit governance token mechanics, enabling unauthorized validator control and asset exfiltration.
