Briefing

Groundbreaking research confirms that advanced Large Language Models (LLMs) like GPT-5 and Claude Sonnet 4.5 can autonomously discover and exploit both known and zero-day vulnerabilities in live smart contracts. This capability fundamentally shifts the threat landscape, as the low operational cost of AI-driven scanning makes finding and exploiting vulnerabilities economically viable for malicious actors at scale. The study demonstrated AI agents successfully cracking 207 out of 405 historical exploit contracts and independently discovering two completely new, exploitable zero-day flaws in unaudited code.

A close-up view reveals a complex metallic device partially encased in striking blue, ice-like crystalline structures, with a central square component suggesting a specialized chip. Wires and other mechanical elements are visible, indicating an intricate technological assembly

Context

Prior to this research, the prevailing risk model assumed human expertise was the bottleneck in discovering complex, low-level logic flaws, with most exploits leveraging known patterns like reentrancy or oracle manipulation. The industry’s security posture relied heavily on human-led audits and bug bounties, often failing to address the systemic risk posed by the sheer volume of newly deployed, unaudited contracts. This new vector bypasses the human element, turning the entire surface of deployed code into an immediate, persistent attack surface.

A close-up shot reveals a futuristic, intricate mechanical device, predominantly white with glowing blue internal components. The structure features segmented outer rings and a transparent central core filled with luminous blue digital patterns

Analysis

The attack vector leverages the LLM’s code comprehension and reasoning capabilities to perform automated symbolic execution and fuzzing, effectively simulating adversarial inputs against the contract’s logic. The AI agent first analyzes the smart contract code for critical functions, then uses its reasoning to construct a multi-step transaction payload that manipulates the contract’s state to achieve an unauthorized outcome, such as infinite token minting or asset draining. This process is highly efficient, costing only $1.22 on average to scan a single contract, which drastically lowers the barrier to entry for sophisticated exploitation.

A metallic, multi-faceted structure, reminiscent of a cryptographic artifact or a decentralized network node, is embedded within fragmented bone tissue. Fine, taut wires emanate from the construct, symbolizing interconnectedness and the flow of information, much like nodes in a blockchain network

Parameters

  • AI Agent Success Rate → 207/405 (AI agents successfully exploited 207 out of 405 historically hacked contracts).
  • Zero-Day Discovery → 2 (Number of completely new, previously unknown vulnerabilities found by AI in new contracts).
  • Average Contract Scan Cost → $1.22 (The average API cost to run an AI agent to scan a single smart contract for vulnerabilities).

The image displays a detailed view of a futuristic mechanical arm, composed of translucent and matte blue segments with polished silver accents. This intricate design, highlighting precision engineering, evokes the complex operational frameworks within the cryptocurrency ecosystem

Outlook

The immediate mitigation requires a fundamental shift in security standards, mandating the integration of AI-powered security analysis tools into the continuous integration and deployment pipeline for all smart contracts. The second-order effect is a massive increase in contagion risk, as the same vulnerability class can be quickly identified across all forks and similar protocols. This incident will establish a new auditing baseline where formal verification and adversarial AI testing are no longer optional, but essential to achieving protocol resilience against automated threats.

A vivid blue, metallic 'X' structure, intricately detailed with internal circuit-like components, anchors the image, surrounded by a soft, blurred grey-blue background. Numerous slender, metallic wires radiate from the structure, implying a complex network of connections and data pathways

Verdict

The demonstrated capability of autonomous AI exploitation marks the end of security through obscurity for smart contracts, demanding an immediate and systemic pivot toward AI-augmented defense.

Smart contract security, zero-day vulnerability, autonomous exploitation, AI threat modeling, decentralized finance risk, smart contract audit, code logic flaw, security posture, asset protection, protocol resilience, white-hat defense, systemic risk, on-chain forensics, threat intelligence, API cost structure, token contract flaw, access control, vulnerability disclosure, ethical hacking, automated threat, digital asset security. Signal Acquired from → egw.news

Micro Crypto News Feeds