
Briefing
The Yearn Finance ecosystem experienced a critical security incident involving a legacy stable-swap pool, resulting in the unauthorized draining of underlying liquid staking assets. The primary consequence is a total capital loss for users of the affected yETH vault, necessitating an immediate governance proposal for victim reimbursement from the treasury. Forensic analysis confirms the total financial impact of the exploit is approximately $9 million, leveraged through a single-transaction infinite token minting vulnerability.

Context
This incident underscores the persistent risk associated with maintaining legacy smart contracts that operate outside the current, hardened security architecture of a main protocol. The prevailing attack surface for older DeFi implementations often involves non-standard token logic or custom pool designs that lack the rigorous, multi-layered auditing applied to modern, standardized vault systems. This vulnerability was an inherent design flaw in the token’s minting function, which was not adequately protected by standard access controls or invariant checks.

Analysis
The attack vector exploited a specific logic flaw within the custom stable-swap pool contract used for the legacy yETH token. The attacker leveraged this flaw to execute a single, complex transaction that manipulated the contract’s internal state, allowing the minting of a near-infinite supply of the yETH token. With this artificially inflated balance of yETH , the threat actor was able to withdraw a disproportionate amount of the pool’s real, underlying assets, including wstETH and rETH, effectively draining the pool’s liquidity before the protocol’s monitoring systems could react. The root cause was a failure in the minting function’s internal accounting and validation checks.

Parameters
- Total Funds Drained → $9 Million (The combined loss from the primary stable-swap pool and the associated Curve pool ).
- Vulnerability Class → Infinite Minting Flaw (A critical logic error in the token’s supply mechanism ).
- Affected Asset Type → Liquid Staking Tokens (The underlying assets stolen were wrapped/staked ETH variants ).
- Attacker Action → Single Transaction Exploit (The entire drain was executed in one atomic on-chain operation ).

Outlook
Protocols must immediately conduct comprehensive audits on all legacy and custom-logic contracts, prioritizing sunsetting or migrating funds from systems that do not meet current security standards. The immediate mitigation for users is to withdraw assets from any similarly structured, older pools across the DeFi landscape to prevent contagion risk from shared code bases. This event will likely establish a new best practice standard for immutable contract logic, mandating formal verification for all custom token minting and burning mechanisms.

Verdict
This $9 million loss is a definitive warning that legacy contract exposure represents an unacceptable systemic risk to the digital asset ecosystem, irrespective of a protocol’s current security posture.
