Briefing

Groundbreaking research confirms that advanced Large Language Models (LLMs) like GPT-5 and Claude Sonnet 4.5 can autonomously discover and exploit both known and zero-day vulnerabilities in live smart contracts. This capability fundamentally shifts the threat landscape, as the low operational cost of AI-driven scanning makes finding and exploiting vulnerabilities economically viable for malicious actors at scale. The study demonstrated AI agents successfully cracking 207 out of 405 historical exploit contracts and independently discovering two completely new, exploitable zero-day flaws in unaudited code.

A close-up view reveals a futuristic, modular computing system featuring prominent blue circuit pathways and metallic grey components. A central processing unit with a display shows digital data, resembling a transaction hash or smart contract execution details

Context

Prior to this research, the prevailing risk model assumed human expertise was the bottleneck in discovering complex, low-level logic flaws, with most exploits leveraging known patterns like reentrancy or oracle manipulation. The industry’s security posture relied heavily on human-led audits and bug bounties, often failing to address the systemic risk posed by the sheer volume of newly deployed, unaudited contracts. This new vector bypasses the human element, turning the entire surface of deployed code into an immediate, persistent attack surface.

This detailed close-up showcases a highly intricate, futuristic blue and silver mechanical device, featuring a central optical element encircled by complex, angular components. The object's metallic and translucent structures are illuminated by vibrant blue light, highlighting its sophisticated engineering and potential for advanced data processing

Analysis

The attack vector leverages the LLM’s code comprehension and reasoning capabilities to perform automated symbolic execution and fuzzing, effectively simulating adversarial inputs against the contract’s logic. The AI agent first analyzes the smart contract code for critical functions, then uses its reasoning to construct a multi-step transaction payload that manipulates the contract’s state to achieve an unauthorized outcome, such as infinite token minting or asset draining. This process is highly efficient, costing only $1.22 on average to scan a single contract, which drastically lowers the barrier to entry for sophisticated exploitation.

A macro shot highlights a meticulously engineered component, encased within a translucent, frosted blue shell. The focal point is a gleaming metallic mechanism featuring a hexagonal securing element and a central shaft with a distinct keyway and bearing, suggesting a critical functional part within a larger system

Parameters

  • AI Agent Success Rate → 207/405 (AI agents successfully exploited 207 out of 405 historically hacked contracts).
  • Zero-Day Discovery → 2 (Number of completely new, previously unknown vulnerabilities found by AI in new contracts).
  • Average Contract Scan Cost → $1.22 (The average API cost to run an AI agent to scan a single smart contract for vulnerabilities).

A central blue circuit board, appearing as a compact processing unit with finned heatsink elements, is heavily encrusted with white frost. It is positioned between multiple parallel silver metallic rods, all set against a background of dark grey circuit board patterns

Outlook

The immediate mitigation requires a fundamental shift in security standards, mandating the integration of AI-powered security analysis tools into the continuous integration and deployment pipeline for all smart contracts. The second-order effect is a massive increase in contagion risk, as the same vulnerability class can be quickly identified across all forks and similar protocols. This incident will establish a new auditing baseline where formal verification and adversarial AI testing are no longer optional, but essential to achieving protocol resilience against automated threats.

A detailed view presents a translucent, organic-like skeletal structure enclosing distinct blue and white mechanical components. The intricate, interconnected design of the outer shell reveals the precise, modular units within, set against a dark, muted background

Verdict

The demonstrated capability of autonomous AI exploitation marks the end of security through obscurity for smart contracts, demanding an immediate and systemic pivot toward AI-augmented defense.

Smart contract security, zero-day vulnerability, autonomous exploitation, AI threat modeling, decentralized finance risk, smart contract audit, code logic flaw, security posture, asset protection, protocol resilience, white-hat defense, systemic risk, on-chain forensics, threat intelligence, API cost structure, token contract flaw, access control, vulnerability disclosure, ethical hacking, automated threat, digital asset security. Signal Acquired from → egw.news

Micro Crypto News Feeds