Briefing

A critical vulnerability in a custom stableswap contract for the Yearn Finance yETH pool on Ethereum has resulted in a $9 million asset drain. The exploit leveraged a flaw in the protocol’s internal accounting, specifically where cached storage variables were not reset after the pool’s total supply was depleted. This state inconsistency allowed the threat actor to execute a highly capital-efficient attack, minting an astronomical 235 septillion yETH tokens from a negligible 16 wei deposit to deplete the pool’s underlying assets. This incident confirms the extreme risk inherent in complex, non-standardized smart contract logic that attempts gas-saving optimizations.

A transparent, elongated crystalline object, resembling a hardware wallet, is shown interacting with a large, irregular mass of deep blue, translucent material. Portions of this blue mass are covered in delicate, spiky white frost, creating a striking contrast against the vibrant blue

Context

The prevailing risk factor in the decentralized finance (DeFi) ecosystem remains the use of complex, custom-forked contracts that introduce subtle state management vulnerabilities. This incident targeted a bespoke stableswap implementation, which, in an effort to reduce gas costs, utilized cached storage variables to track virtual balances. The known attack surface for this class of protocol is the failure to explicitly handle all possible state transitions, particularly the edge case where a pool’s total supply is zeroed out.

A textured surface, adorned with numerous water droplets, transitions from a soft grey to a deep, saturated blue. A distinct, clear circular area dominates the center, from which multiple fine blue lines extend outward, resembling organized data streams

Analysis

The attack vector exploited a “Cached Storage Flaw” in the contract’s logic for calculating the share price upon the first deposit into an empty pool. The attacker first executed multiple deposit-and-withdrawal cycles to deliberately leave residual, phantom balances in the gas-optimized packed_vbs storage variables. They then withdrew all remaining liquidity, correctly setting the total token supply to zero but leaving the cached virtual balance variables populated with stale, non-zero data. Finally, a minimal deposit of just 16 wei was executed, which triggered the contract’s “first-ever deposit” logic, causing it to incorrectly read the large, stale values and mint a near-infinite number of yETH tokens to the attacker.

A striking visual depicts two distinct, angular structures rising from dark, rippled water, partially obscured by white, voluminous clouds. One structure is a highly reflective silver, while the other is a fractured, deep blue block with intricate white patterns

Parameters

  • Total Loss → $9 Million USD (The estimated total value of underlying assets drained from the yETH pool).
  • Vulnerability Type → Cached Storage Flaw (A logic error where internal accounting variables were not reset upon a critical state change).
  • Minted Token Quantity → 235 Septillion yETH (The astronomical number of tokens minted by the attacker due to the logic flaw).
  • Trigger Cost → 16 Wei Deposit (The minimal amount of input required to trigger the infinite minting condition).
  • Affected Protocol Component → Custom yETH Stableswap Contract (The specific, non-standard contract implementation containing the flaw).

A futuristic, ice-covered device with glowing blue internal mechanisms is prominently displayed, featuring a large, moon-like sphere at its core. The intricate structure is partially obscured by frost, highlighting both its advanced technology and its cold, secure nature

Outlook

Immediate mitigation for similar protocols requires an urgent audit of all custom contract logic, specifically focusing on explicit state management for edge cases like zero-supply conditions and gas-saving accounting mechanisms. The primary second-order effect is a heightened contagion risk for any protocol that has forked or adapted similar stableswap code without rigorous state transition testing. This event will establish a new security best practice mandating formal verification for all internal accounting logic to ensure that cached or virtual balances are synchronized with the actual, on-chain token supply at every critical juncture.

The exploit confirms that even marginal gas optimizations introduce catastrophic systemic risk when they violate the fundamental principle of explicit and validated state transitions.

Stale storage value, infinite token minting, DeFi accounting error, virtual balance flaw, stableswap logic, gas optimization risk, zero supply condition, critical vulnerability, on-chain forensics, state transition bug, smart contract exploit, flash loan vector, Ethereum protocol risk, token price manipulation, pool drain event, custom contract code, asset loss, internal accounting, deposit logic, minimal input Signal Acquired from → checkpoint.com

Micro Crypto News Feeds