
Briefing
The Balancer V2 protocol suffered a catastrophic security breach on November 3, 2025, resulting in the theft of approximately $128 million across multiple blockchain networks. The incident was caused by a sophisticated exploitation of a precision rounding vulnerability within the Composable Stable Pool’s swap calculation mechanisms. This core logic flaw allowed the threat actor to systematically manipulate the pool’s invariant, which directly suppressed the price of Balancer Pool Tokens (BPT). The total confirmed loss of assets, including WETH and wstETH, is quantified at $128 million, making it one of the largest DeFi security events of the year.

Context
Balancer’s V2 architecture utilizes a centralized Vault contract to hold tokens for all connected pools, a design intended to maximize capital efficiency. However, this architecture creates a single point of failure, meaning a vulnerability in a single pool type’s logic exposes all assets within the Vault. This specific class of Composable Stable Pool had undergone eleven security audits, demonstrating that even rigorous review can fail to anticipate subtle, low-level arithmetic edge cases.

Analysis
The attack vector was a precision rounding error in the _upscaleArray function used for EXACT_OUT swaps within the batchSwap feature. This function incorrectly utilized downward rounding ( mulDown ) when scaling token balances, introducing a microscopic discrepancy into the pool’s accounting. The threat actor first conditioned the pool by executing swaps to push token balances to the specific 8-9 wei numerical boundary where the rounding error was maximized.
By executing a batched sequence of 65+ micro-swaps, the actor compounded these tiny, one-wei errors into a catastrophic manipulation of the pool’s invariant (D value). This artificial invariant reduction suppressed the BPT price, allowing the threat actor to mint undervalued BPT and immediately redeem them for full-value assets, effectively draining the liquidity.

Parameters
- Key Metric ∞ $128 Million ∞ Total estimated value of assets drained from Balancer V2 Composable Stable Pools.
- Vulnerability Type ∞ Precision Rounding Flaw ∞ The specific arithmetic error in the _upscaleArray function that caused invariant manipulation.
- Affected Chains ∞ Nine Blockchain Networks ∞ The exploit spread across Ethereum, Base, Avalanche, Arbitrum, Optimism, Gnosis, Polygon, Berachain, and Sonic.
- Attack Duration ∞ Under 30 Minutes ∞ The time taken for the threat actor to execute the entire multi-chain exploitation sequence.

Outlook
Immediate mitigation requires all users to withdraw liquidity from any remaining V2 Composable Stable Pools that have not been paused or upgraded. The systemic risk of this incident extends to all DeFi protocols that rely on similar StableSwap-based mathematical invariants and integer-based arithmetic for critical financial logic. This event will establish a new security best practice, mandating a formal, economic-level verification of all rounding and precision logic, moving beyond traditional code-level audits to focus on adversarial economic boundary conditions.

Verdict
This breach confirms that subtle, low-level arithmetic flaws in core financial logic are a critical, high-impact attack vector, necessitating a complete re-evaluation of mathematical rigor in all DeFi smart contract design.
