Skip to main content
Incrypthos
search
Menu
  • Research
  • Markets
  • Regulation
  • Web3
  • Adoption
  • Security
  • Insights
  • Tech
  • Glossary
  • search
Incrypthos
Close Search
Security

Bunni DEX Drained $2.4 Million Exploiting Liquidity Distribution Function

Custom liquidity logic on Bunni DEX was exploited by specific trade sizes, enabling faulty rebalancing and a $2.4M stablecoin drain.
November 23, 20253 min
Signal∞Context∞Analysis∞Parameters∞Outlook∞Verdict∞

A sleek white device featuring a reflective, blue lens is nestled within a detailed, translucent blue mesh. This mesh appears organic yet structured, possibly representing a blockchain's distributed ledger or a decentralized network's infrastructure
The image displays granular blue and white material flowing through transparent, curved channels, interacting with metallic components and a clear sphere. A mechanical claw-like structure holds a white disc, while a thin rod with a small sphere extends over the white granular substance

Briefing

The Bunni decentralized exchange suffered a critical smart contract exploit on its Ethereum deployment, resulting in the theft of stablecoin assets. The attacker leveraged a flaw in the protocol’s custom Liquidity Distribution Function (LDF) to manipulate pool share calculations, allowing unauthorized withdrawals. This systemic failure in rebalancing logic necessitated an immediate, cross-network contract pause to prevent further loss. Forensic analysis confirms the total value drained from the pools is approximately $2.4 million in USDC and USDT.

The image displays an abstract composition of frosted, textured grey-white layers partially obscuring a vibrant, deep blue interior. Parallel lines and a distinct organic opening within the layers create a sense of depth and reveal the luminous blue

Context

The use of highly customized, non-standard smart contract logic, even when built on established infrastructure like Uniswap v4, introduces an expanded attack surface. Protocols that implement proprietary rebalancing or distribution functions often face elevated risk due to a lack of battle-testing and fewer external audits focusing on the unique, custom code paths. This incident highlights the inherent danger in complex, novel mechanisms designed to optimize liquidity provider yields.

A clear sphere, filled with angular blue shards, floats within a smooth white ring. Behind and around it, sharp-edged blue cubes, some with internal light, form a fragmented, crystalline background

Analysis

The attack vector targeted Bunni’s Liquidity Distribution Function (LDF), a mechanism designed to optimize returns by dynamically rebalancing assets. The attacker executed a sequence of highly specific trade sizes that triggered an incorrect calculation within the LDF, specifically regarding liquidity provider share ownership. This faulty rebalancing process produced an erroneous state, which the attacker then exploited to siphon stablecoins from the pools at an artificially favorable rate. The core vulnerability resides in the precision and validation checks of the custom rebalancing formula under adversarial input.

A pristine white sphere, its lower half transitioning into a vibrant blue gradient, rests centrally amidst a formation of granular white and blue material, accompanied by a large translucent blue crystal shard. This entire arrangement floats on a dark, rippled water surface, creating a serene yet dynamic visual

Parameters

  • Total Loss Estimate → $2.4 Million; The estimated value of stablecoins drained from the protocol’s liquidity pools.
  • Affected Asset Class → Stablecoins; Primary assets stolen were USDC and USDT.
  • Vulnerability Type → Logic Flaw; Exploitation of a custom Liquidity Distribution Function calculation.
  • Affected Chains → Ethereum Mainnet; The primary contracts targeted were on the Ethereum network.

A surreal digital artwork features a textured white vessel, resembling a snow-covered basin, partially submerged in rippling dark blue water. Within this structure, a prominent blue crystalline object, surrounded by smaller sparkling blue fragments, creates dynamic splashes, suggesting motion and energy

Outlook

Immediate mitigation requires all users to withdraw funds from all Bunni contracts across every network, as the protocol team has initiated a global pause. This event will likely trigger a new wave of scrutiny on proprietary DeFi logic, particularly custom rebalancing functions that deviate from battle-tested standards like Uniswap V3’s core mechanisms. Security best practices will shift to mandate formal verification and competitive auditing specifically for any non-standard contract component, prioritizing correctness over yield optimization.

A transparent, angular crystal token is centrally positioned within a sleek, white ring displaying intricate circuit board motifs. This assembly is suspended over a vibrant, blue-illuminated circuit board, hinting at advanced technological integration

Verdict

The Bunni exploit confirms that complexity in custom DeFi logic remains the single greatest unmitigated risk, overriding the security assurances of underlying audited frameworks.

Smart contract vulnerability, decentralized exchange, liquidity pool, stablecoin drain, trade size manipulation, rebalancing flaw, custom contract logic, Ethereum network, on-chain exploit, DeFi security, automated market maker, pool share ownership, contract pause, immediate withdrawal, protocol risk, adversarial input, forensic analysis, asset theft, price manipulation, smart contract audit Signal Acquired from → coinmarketcap.com

Micro Crypto News Feeds

decentralized exchange

Definition ∞ A Decentralized Exchange (DEX) is a cryptocurrency trading platform that operates without a central intermediary or custodian.

contract logic

Definition ∞ Contract Logic refers to the set of predefined rules, conditions, and instructions embedded within a smart contract that govern its execution and state changes.

liquidity distribution

Definition ∞ Liquidity distribution describes how readily available assets for trading are spread across various exchanges, decentralized protocols, and trading pairs within the digital asset market.

stablecoins

Definition ∞ Stablecoins are a class of digital assets designed to maintain a stable value relative to a specific asset, typically a fiat currency like the US dollar.

assets

Definition ∞ A digital asset represents a unit of value recorded on a blockchain or similar distributed ledger technology.

vulnerability

Definition ∞ A vulnerability refers to a flaw or weakness in a system, protocol, or smart contract that could be exploited by malicious actors to compromise its integrity, security, or functionality.

ethereum network

Definition ∞ The Ethereum network is a decentralized, open-source blockchain system that enables the creation and execution of smart contracts and decentralized applications.

contract

Definition ∞ A 'Contract' is a set of rules and code that automatically executes when predefined conditions are met.

security

Definition ∞ Security refers to the measures and protocols designed to protect assets, networks, and data from unauthorized access, theft, or damage.

Tags:

Immediate Withdrawal Custom Contract Logic Price Manipulation Forensic Analysis Decentralized Exchange Trade Size Manipulation

Discover More

  • Close-up view of interconnected, robust cryptographic hardware components. A translucent blue module, possibly a polymer casing, encases a brushed metallic secure element, central to private key storage. Adjacent is a metallic housing, exhibiting a textured finish and circular indentations, suggesting a sensor or interface for blockchain node attestation. This modular design emphasizes physical security token functionality and cold storage capabilities, crucial for non-custodial asset management and tamper-evident protection within decentralized finance infrastructure. Coinbase Integrates Non-Custodial DEX Trading on Base Capturing Early Asset Flow The seamless in-app integration of DEX primitives abstracts Web3 complexity, strategically positioning Base to absorb long-tail asset liquidity and user acquisition.
  • A sophisticated metallic mechanism, resembling a validator node component, is partially submerged in a vibrant blue matrix, enveloped by effervescent white foam. This imagery evokes the rigorous protocol cleansing and transaction finality vital for robust distributed ledger technology. The intricate structure symbolizes complex cryptographic primitives and consensus mechanisms ensuring data integrity within a blockchain. The enveloping foam suggests dynamic network activity or the purification processes maintaining system health and security. Balancer V2 Boosted Pools Drained by Faulty Access Control Logic A flawed access control implementation in V2 pools allowed unauthorized asset withdrawals, bypassing invariant checks and risking systemic DeFi capital.
  • A circular, abstract visualization presents a core blockchain protocol, vertically segmented into two distinct, textured halves. The central hub could represent a smart contract's core logic or a governance token. Surrounding icy, cratered surfaces symbolize distributed ledger technology's immutable blocks and validator nodes. This visual metaphor illustrates complex blockchain architecture, potentially showcasing sharding or Layer 2 scaling solutions for enhanced transaction throughput. Contrasting textures might differentiate on-chain and off-chain processes or distinct consensus mechanisms within a decentralized network, emphasizing interoperability in the digital asset space. Cork Protocol Drained Twelve Million Exploiting Dual Smart Contract Flaws A sophisticated attacker leveraged two distinct, unpatched contract vulnerabilities to drain collateral and expose systemic audit failures.
  • A segmented white spherical structure, resembling a sharded blockchain architecture, floats partially submerged in deep blue water. Visible through hexagonal apertures are brilliant blue crystalline formations, representing immutable on-chain data or core protocol algorithms. White, frothy accumulations, akin to volatile market sentiment or transaction gas fees, dissolve from the sphere into the surrounding liquidity pool. This visual metaphor captures the dynamic interaction of digital assets within a decentralized finance ecosystem, where core mechanisms meet external market forces. Hyperliquid Perpetuals Suffers $4.9 Million Price Manipulation Attack High leverage and thin market depth on a volatile asset allowed a $3M investment to force $4.9M bad debt absorption.
  • A close-up view reveals a vibrant blue granular substance, reminiscent of aggregated digital assets or a liquidity pool, partially engulfing and interacting with sleek, metallic, modular components. These components, some solid blue and others silver, form an intricate protocol architecture, suggesting an underlying smart contract or consensus mechanism. The textured surface implies a distributed ledger environment, where structured elements facilitate automated processes within a dynamic, tokenized ecosystem. The interplay highlights robust on-chain governance or staking functionality. Balancer V2 Pools Drained Exploiting Precision Rounding Arithmetic Flaw The compounding of minor arithmetic rounding errors in `batchSwap` logic enabled systematic invariant manipulation, compromising over $120M in pool liquidity.
  • A sleek, metallic, modular blockchain infrastructure component, rendered in cool blue-silver, rests on a textured, foundational layer. Its robust, engineered panels signify a resilient DLT network, designed for high-performance consensus protocols. A translucent, crystalline sphere, symbolizing a secure digital asset or genesis block, is centrally mounted. This setup embodies a decentralized autonomous organization's core mechanism, enabling secure cold storage, cross-chain interoperability, and oracle network integration, crucial for Web3 network security. Uniswap Integrates Solana Natively Unifying $11.4 Billion Cross-Chain Decentralized Liquidity The native Solana integration eliminates cross-chain friction, positioning Uniswap as the primary unified gateway for multi-billion dollar decentralized liquidity.
  • A close-up view reveals an intricate blue and silver mechanical assembly, highlighting its complex internal structure. A central silver cylindrical component, resembling a core processor or bearing, is flanked by a textured blue structural element featuring a web-like pattern, evoking node synchronization within a decentralized network. This visual metaphor suggests blockchain architecture designed for robust cryptographic integrity and efficient transactional throughput, embodying advanced protocol engineering in digital asset infrastructure. The contrasting textures emphasize both precision and interconnectedness. Balancer Protocol Drained by Compounding Rounding Error and Access Flaw A subtle rounding-down error in swap calculations, combined with flawed access control, allowed the attacker to systematically drain over $100M from stable pools.
  • A vibrant blue, metallic, cylindrical core, reminiscent of a robust DLT protocol engine or a validator node, is showcased. Numerous translucent, spherical particles, akin to data packets or cryptographic elements, dynamically interact with its structured surface. These particles appear to be in a state of continuous processing, illustrating the intricate flow of information within a decentralized network. The visual metaphor suggests the constant computation and cryptographic hashing inherent in achieving consensus mechanisms and ensuring data integrity across a blockchain's architecture, perhaps within an enterprise blockchain solution. Forked Protocol Beets Drained via Inherited Balancer V2 Smart Contract Flaw The systemic risk of shared codebase architecture was weaponized, enabling a logic flaw to cascade across forks and drain over $100 million in pooled assets.
  • A clear, complex, interwoven transparent structure dominates the foreground, resembling a sophisticated algorithmic framework. Behind it, a deep blue, blurred form suggests underlying data streams or a core digital asset pool. This visualization abstractly represents the intricate protocol architecture essential for decentralized ledger technology DLT. Its transparent nature reflects the auditability and immutability inherent in cryptographic primitives, while the interwoven design signifies robust interoperability and the secure execution of a distributed consensus mechanism within a blockchain network. Balancer V2 Composable Pools Drained via BatchSwap Rounding Flaw A critical rounding error in the `batchSwap` upscale logic allowed adversaries to exploit deferred settlement mechanisms, resulting in over $128M in multi-chain asset loss.

Tags:

Adversarial InputAsset TheftAutomated Market MakerContract PauseCustom Contract LogicDecentralized ExchangeDeFi SecurityEthereum NetworkForensic AnalysisImmediate WithdrawalLiquidity PoolOn-Chain ExploitPool Share OwnershipPrice ManipulationProtocol RiskRebalancing FlawSmart Contract AuditSmart Contract VulnerabilityStablecoin DrainTrade Size Manipulation

Incrypthos

Stop Scrolling. Start Crypto.

About

Contact

LLM Disclaimer

Terms & Conditions

Privacy Policy

Cookie Policy

Encrypthos
Encrypthos

Blockchain Knowledge

Decrypthos
Decrypthos

Cryptocurrency Foundation

Incryphos Logo Icon
Incrypthos

Cryptospace Newsfeed

© 2026 Incrypthos

All Rights Reserved

Founded by Noo

Build on Noo-Engine

Source: The content on this website is produced by our Noo-Engine, a system powered by an advanced Large Language Model (LLM). This information might not be subject to human review before publication and may contain errors.
Responsibility: You should not make any financial decisions based solely on the content presented here. We strongly urge you to conduct your own thorough research (DYOR) and to consult a qualified, independent financial advisor.
Purpose: All information is intended for educational and informational purposes only. It should not be construed as financial, investment, trading, legal, or any other form of professional advice.
Risk: The cryptocurrency market is highly volatile and carries significant risk. By using this site, you acknowledge these risks and agree that Incrypthos and its affiliates are not responsible for any financial losses you may incur.
Close Menu
  • Research
  • Markets
  • Regulation
  • Web3
  • Adoption
  • Security
  • Insights
  • Tech
  • Glossary

Cookie Consent

We use cookies to personalize content and marketing, and to analyze our traffic. This helps us maintain the quality of our free resources. manage your preferences below.

Detailed Cookie Preferences

This helps support our free resources through personalized marketing efforts and promotions.
Analytics cookies help us understand how visitors interact with our website, improving user experience and website performance.
Personalization cookies enable us to customize the content and features of our site based on your interactions, offering a more tailored experience.