
Briefing
The Hedgey Finance protocol, a decentralized platform for token vesting and lockups, suffered a catastrophic exploit targeting a critical business logic flaw within its smart contracts. This vulnerability allowed a threat actor to gain and retain unauthorized token transfer approvals, subsequently draining locked assets across multiple networks. The incident exposed a systemic risk in complex DeFi primitives, demonstrating that a single missing line of code can lead to massive financial compromise. Total losses are estimated at $44.7 million, with the majority of funds siphoned from the Arbitrum network.

Context
Prior to the exploit, the security posture of many DeFi protocols was overly reliant on initial code audits, which often fail to capture complex business logic flaws and multi-step attack vectors. The prevailing risk factor involved the complexity of token-locking and vesting mechanisms, where the interaction between token allowances, campaign creation, and cancellation functions creates a large attack surface. This incident leveraged a known class of vulnerability ∞ the failure to properly manage and revoke state-altering permissions after a contract’s primary operation is complete.

Analysis
The attack vector exploited a flaw in the ClaimCampaigns contract, specifically within the createLockedCampaign function. The attacker first utilized a flash loan to call this function, which, as designed, granted a token approval to the attacker’s contract. Crucially, the attacker then called cancelCampaign , which successfully withdrew the initial tokens but failed to include the necessary code to revoke the previously granted approval. With the token approval still active and pointing to the malicious contract, the attacker executed a subsequent transferFrom call, systematically draining the contract’s approved assets across Ethereum and Arbitrum, culminating in the $44.7 million loss.

Parameters
- Total Funds Lost ∞ $44.7 Million (The estimated total value of tokens drained across both chains).
- Vulnerable Component ∞ ClaimCampaigns Smart Contract (The contract managing token vesting and lockups).
- Root Cause ∞ Missing Approval Revocation (The absence of a single line of code to zero out token allowance upon campaign cancellation).
- Primary Affected Chain ∞ Arbitrum ($42.6 Million lost) (The network sustaining the largest financial loss).
- Attack Tool ∞ Flash Loan (Used to fund the initial transaction and manipulate contract state).

Outlook
Immediate mitigation for similar protocols requires a mandatory review of all functions that grant token allowances, ensuring explicit revocation logic is implemented across every exit path, including cancellations and withdrawals. The primary second-order effect is heightened contagion risk for all protocols utilizing similar token-locking or vesting contract logic, necessitating a sector-wide audit focused on state management and permission revocation. This incident establishes a new best practice ∞ supplementing pre-deployment audits with real-time, runtime application self-protection (RASP) to detect and block malicious transaction patterns that exploit business logic flaws.
