Skip to main content

Briefing

The Resupply stablecoin protocol suffered a critical $9.5 million exploit targeting its newly deployed lending market. The primary consequence is a significant bad debt accrual and a collapse of investor confidence in the protocol’s fundamental solvency. This was achieved through a donation attack that manipulated the price-per-share calculation in an empty ERC-4626 vault, allowing the attacker to borrow approximately $10 million in reUSD using negligible collateral. The total value lost from the wstUSR market is confirmed to be $9.5 million.

Close-up view of a metallic, engineered apparatus featuring polished cylindrical and geared components. A dense, luminous blue bubbly substance actively surrounds and integrates with the core of this intricate machinery

Context

The prevailing attack surface in the DeFi lending sector remains logic flaws in asset valuation and oracle-like mechanisms, particularly within new deployments. This incident leveraged the known risk associated with the ERC-4626 standard’s initial state, where an empty vault is susceptible to price-per-share manipulation before equilibrium is established. The exploit occurred shortly after the new market’s DAO governance approval, indicating a critical lapse in pre-deployment security checks.

A striking symmetrical, mechanical structure shaped like an 'X' is centered against a blurred background of diagonal blue and grey stripes. The 'X' is intricately designed with polished blue transparent conduits, metallic silver components, and dark structural elements radiating from a central circular hub

Analysis

The attack targeted the ResupplyPair smart contract, specifically its reliance on the vault’s balanceOf function for exchange rate calculation. The attacker used a small donation of crvUSD to artificially inflate the price-per-share of the newly deployed, empty cvcrvUSD vault. By minting a minimal amount of shares (1 wei) at this inflated price, the attacker tricked the protocol into valuing this collateral at millions of dollars. This price distortion allowed the threat actor to bypass the protocol’s solvency checks and borrow $10 million in the native stablecoin reUSD , which was immediately swapped for WETH and USDC.

A sophisticated metallic mechanism, featuring striking blue and silver components with gear-like detailing, is meticulously presented. It rests within a bed of white foam, partially revealing dark blue, faceted geometric structures beneath

Parameters

  • Total Loss Value ∞ $9.5 Million (The total value of assets drained from the protocol)
  • Vulnerable Component ∞ ERC-4626 Vault (The newly deployed vault standard used for asset tracking)
  • Exploit Method ∞ Donation Attack (Manipulating the initial share price of an empty vault)
  • Collateral Used ∞ 1 Wei of Shares (The negligible amount of shares used to borrow $10M)

A detailed close-up reveals an advanced, interconnected mechanism composed of transparent cylindrical structures and deep blue components, adorned with effervescent bubbles. The interplay of light and shadow on the reflective surfaces highlights the intricate engineering and dynamic state

Outlook

Immediate mitigation requires all protocols utilizing ERC-4626 vaults to implement virtual share mechanisms or offset functions to prevent price-per-share manipulation at deployment. The second-order effect is a renewed focus on “donation attack” vectors, especially in low-liquidity or newly launched markets, increasing contagion risk for similar lending protocols. This incident establishes a new best practice ∞ mandating a non-zero initial deposit or a robust check against zero-balance vaults, even post-audit.

A close-up view displays an advanced mechanical device, featuring translucent blue casing, metallic components, and visible internal gears, all partially submerged and covered in white foamy bubbles. The intricate design highlights precision engineering, with heat sink-like fins and a prominent circular button, suggesting a high-tech piece of machinery

Verdict

The Resupply exploit is a definitive case study demonstrating how a known ERC-4626 initialization flaw can be weaponized to bypass fundamental DeFi lending solvency checks.

Stablecoin protocol, price manipulation attack, ERC-4626 vault, donation attack, floor division flaw, exchange rate distortion, negligible collateral, smart contract logic, vault accounting, systemic risk, defi lending, collateralized debt position, asset valuation, governance approval Signal Acquired from ∞ medium.com

Micro Crypto News Feeds