Briefing

Groundbreaking research confirms that advanced Large Language Models (LLMs) like GPT-5 and Claude Sonnet 4.5 can autonomously discover and exploit both known and zero-day vulnerabilities in live smart contracts. This capability fundamentally shifts the threat landscape, as the low operational cost of AI-driven scanning makes finding and exploiting vulnerabilities economically viable for malicious actors at scale. The study demonstrated AI agents successfully cracking 207 out of 405 historical exploit contracts and independently discovering two completely new, exploitable zero-day flaws in unaudited code.

A sophisticated, transparent blue and metallic mechanical assembly occupies the foreground, showcasing intricate internal gearing and an external lattice of crystalline blocks. A central shaft extends through the core, anchoring the complex structure against a blurred, lighter blue background

Context

Prior to this research, the prevailing risk model assumed human expertise was the bottleneck in discovering complex, low-level logic flaws, with most exploits leveraging known patterns like reentrancy or oracle manipulation. The industry’s security posture relied heavily on human-led audits and bug bounties, often failing to address the systemic risk posed by the sheer volume of newly deployed, unaudited contracts. This new vector bypasses the human element, turning the entire surface of deployed code into an immediate, persistent attack surface.

An arctic scene showcases striking blue and clear crystalline formations rising from snow-covered terrain, reflected in the calm water below. In the background, snow-capped mountains complete the serene, icy landscape

Analysis

The attack vector leverages the LLM’s code comprehension and reasoning capabilities to perform automated symbolic execution and fuzzing, effectively simulating adversarial inputs against the contract’s logic. The AI agent first analyzes the smart contract code for critical functions, then uses its reasoning to construct a multi-step transaction payload that manipulates the contract’s state to achieve an unauthorized outcome, such as infinite token minting or asset draining. This process is highly efficient, costing only $1.22 on average to scan a single contract, which drastically lowers the barrier to entry for sophisticated exploitation.

An abstract, three-dimensional structure showcases smooth white spheres and thick, glossy white rings, intricately interwoven with masses of small, reflective blue and white cubes. These vibrant cubes appear clustered around and emanating from the white forms, creating a visually complex and dynamic composition against a dark grey background

Parameters

  • AI Agent Success Rate → 207/405 (AI agents successfully exploited 207 out of 405 historically hacked contracts).
  • Zero-Day Discovery → 2 (Number of completely new, previously unknown vulnerabilities found by AI in new contracts).
  • Average Contract Scan Cost → $1.22 (The average API cost to run an AI agent to scan a single smart contract for vulnerabilities).

A detailed close-up of a blue-toned digital architecture, featuring intricate pathways, integrated circuits, and textured components. The image showcases complex interconnected elements and detailed structures, suggesting advanced processing capabilities and systemic organization

Outlook

The immediate mitigation requires a fundamental shift in security standards, mandating the integration of AI-powered security analysis tools into the continuous integration and deployment pipeline for all smart contracts. The second-order effect is a massive increase in contagion risk, as the same vulnerability class can be quickly identified across all forks and similar protocols. This incident will establish a new auditing baseline where formal verification and adversarial AI testing are no longer optional, but essential to achieving protocol resilience against automated threats.

A highly polished, spherical object with visible circular apertures and metallic accents is positioned above a densely packed, glowing blue circuit board. The orb's mirrored exterior reflects the intricate pathways and illuminated components of the electronic substrate, creating a sense of deep technological immersion

Verdict

The demonstrated capability of autonomous AI exploitation marks the end of security through obscurity for smart contracts, demanding an immediate and systemic pivot toward AI-augmented defense.

Smart contract security, zero-day vulnerability, autonomous exploitation, AI threat modeling, decentralized finance risk, smart contract audit, code logic flaw, security posture, asset protection, protocol resilience, white-hat defense, systemic risk, on-chain forensics, threat intelligence, API cost structure, token contract flaw, access control, vulnerability disclosure, ethical hacking, automated threat, digital asset security. Signal Acquired from → egw.news

Micro Crypto News Feeds