Skip to main content

Briefing

The Onyx Protocol, a fork of Compound Finance, experienced a significant security incident resulting in a $3.8 million loss due to a vulnerability within its NFT Liquidation contract. Attackers leveraged this flaw to drain the vUSD stablecoin, subsequently causing its depeg. This event underscores the persistent risks associated with inherited codebases and the complexities of integrating novel components like NFT liquidation mechanisms into established DeFi architectures.

The visual presents a segmented white structural framework, akin to a robust blockchain backbone, channeling a luminous torrent of blue cubic data packets. These glowing elements appear to be actively flowing through the conduit, signifying dynamic data transmission and processing within a complex digital environment

Context

Prior to this incident, Compound v2 forks have frequently faced exploits stemming from a known vulnerability in newly launched, empty lending markets, susceptible to price manipulation if not managed meticulously. This prevailing attack surface has been a recurring vector across the DeFi ecosystem, enabling attackers to exploit discrepancies in asset valuation. The Onyx exploit initially appeared to be a variant of this known class of vulnerability.

A highly detailed mechanical assembly is presented, showcasing a blend of polished silver components and vibrant blue, intricate structures. The foreground features concentric silver rings leading to a central textured band, which precisely engages with spoked blue elements, each adorned with directional arrow indicators

Analysis

The core of the incident involved a technical flaw residing within Onyx Protocol’s NFT Liquidation contract. While initially suspected as a re-exploitation of a known Compound v2 fork bug, the team clarified that the vulnerability was specifically tied to this NFT-related component. The attacker successfully manipulated asset prices, enabling the unauthorized draining of vUSD stablecoins from the protocol. This chain of events highlights how a specific contract’s logic, when combined with price manipulation, can lead to a direct loss of funds and systemic instability for pegged assets.

A granular white substance connects to a granular blue substance via multiple parallel metallic conduits, terminating in embedded rectangular components. This visual metaphorically represents a cross-chain bridge facilitating blockchain interoperability between distinct decentralized network segments

Parameters

  • Protocol Targeted ∞ Onyx Protocol
  • Attack Vector ∞ NFT Liquidation Contract Vulnerability and Price Manipulation
  • Financial Impact ∞ $3.8 Million
  • Asset Affected ∞ vUSD Stablecoin
  • Initial Disclosure ∞ September 26, 2024

A snow-covered mass, resembling an iceberg, floats in serene blue water, hosting a textured white sphere and interacting with a metallic, faceted object. From this interaction, a vivid blue liquid cascades into the water, creating white splashes

Outlook

Immediate mitigation for users involved with Onyx Protocol should focus on understanding the current status of the vUSD stablecoin and any official guidance from the project. For similar protocols, this incident necessitates a rigorous re-evaluation of all newly integrated contract logic, especially those interacting with liquidation mechanisms or price oracles, even within audited base codebases. This exploit reinforces the critical need for comprehensive security audits that extend beyond inherited vulnerabilities to cover novel contract interactions and potential price manipulation vectors.

A clear, faceted, crystalline object rests on a dark surface, partially enclosing a dark blue, textured component. A central metallic gear-like mechanism is embedded within the blue material, from which a black cable extends across the foreground towards a blurred, multi-toned mechanical device in the background

Verdict

This incident serves as a stark reminder that even well-established codebase forks require meticulous scrutiny of new integrations, as novel contract interactions can introduce critical, unforeseen attack surfaces within the digital asset security landscape.

Signal Acquired from ∞ protos.com

Glossary