
Briefing
BetterBank, a lending protocol on PulseChain, suffered a critical exploit stemming from a flaw in its bonus reward minting mechanism, allowing an attacker to manipulate tokenomics and drain protocol reserves. The incident’s root cause was the contract’s insufficient validation of liquidity pair authenticity, which enabled the creation of a fraudulent trading environment for reward generation. This systemic oversight resulted in an initial on-chain loss of approximately $5 million in protocol assets, underscoring the severe financial risk posed by unvalidated token logic.

Context
The prevailing security posture before the incident was compromised by a known, unpatched vulnerability. A pre-deployment audit identified the exact class of exploit ∞ the potential for malicious actors to create bogus liquidity pools and qualify for bonus rewards ∞ but the finding was misclassified as Low severity. This dismissal of an architectural flaw, based on an assumption of economic non-viability, left a critical attack surface exposed. The protocol’s reliance on open-environment DEX logic without whitelisting trusted pairs created the necessary conditions for the attack chain.

Analysis
The attack vector leveraged the protocol’s swap. TrackBonus smart contract functions, which were designed to mint ESTEEM reward tokens upon a FAVOR token purchase. The core system compromise was the lack of validation logic to restrict these functions to official, whitelisted liquidity pools.
The attacker deployed a malicious contract, created an unauthorized liquidity pair on PulseX using a worthless token and FAVOR, and then executed repeated bulk swaps. Each swap successfully triggered the flawed function to mint massive ESTEEM bonuses, which were then converted into valuable assets, and the use of the unofficial pool bypassed the protocol’s intended tax fees, ensuring the exploit’s profitability.

Parameters
- Initial Loss Metric ∞ $5 Million (The total value of assets drained from the protocol reserves before any recovery.)
- Root Cause ∞ Insufficient Liquidity Pair Validation (The smart contract logic failed to verify the legitimacy of the trading pool before minting reward tokens.)
- Vulnerable Function ∞ swapExactTokensForFavorAndTrackBonus (The specific contract function that triggered the unearned ESTEEM bonus minting.)
- Blockchain Affected ∞ PulseChain (The Layer-1 network hosting the exploited BetterBank lending protocol.)
- Post-Exploit Recovery ∞ $2.7 Million (The value of pDAI returned by the attacker following on-chain negotiation.)

Outlook
Immediate mitigation requires the protocol to implement strict whitelisting for all liquidity pools authorized to trigger reward minting and to apply the originally recommended patch for path validation. This incident establishes a new security best practice ∞ audit findings related to core tokenomic logic must be classified as Critical, irrespective of initial economic viability assumptions. Contagion risk exists for any DeFi protocol utilizing an open-access reward system or complex tokenomics without rigorous, pool-level access controls. This event mandates a systemic re-evaluation of all reward distribution contracts across the ecosystem.
