Briefing

A critical vulnerability in a custom stableswap contract for the Yearn Finance yETH pool on Ethereum has resulted in a $9 million asset drain. The exploit leveraged a flaw in the protocol’s internal accounting, specifically where cached storage variables were not reset after the pool’s total supply was depleted. This state inconsistency allowed the threat actor to execute a highly capital-efficient attack, minting an astronomical 235 septillion yETH tokens from a negligible 16 wei deposit to deplete the pool’s underlying assets. This incident confirms the extreme risk inherent in complex, non-standardized smart contract logic that attempts gas-saving optimizations.

A sophisticated internal mechanism, featuring polished metallic bearings and gears alongside angular blue structural components, is partially revealed. This intricate system is overlaid and partially encased by a translucent, white, porous material composed of countless interconnected spheres, creating a resilient network

Context

The prevailing risk factor in the decentralized finance (DeFi) ecosystem remains the use of complex, custom-forked contracts that introduce subtle state management vulnerabilities. This incident targeted a bespoke stableswap implementation, which, in an effort to reduce gas costs, utilized cached storage variables to track virtual balances. The known attack surface for this class of protocol is the failure to explicitly handle all possible state transitions, particularly the edge case where a pool’s total supply is zeroed out.

A striking metallic lens, intricately designed with multiple rings, is securely integrated into a crystalline, textured formation. The formation transitions from a frosty, translucent white to a deep, luminous blue, casting a subtle glow from within

Analysis

The attack vector exploited a “Cached Storage Flaw” in the contract’s logic for calculating the share price upon the first deposit into an empty pool. The attacker first executed multiple deposit-and-withdrawal cycles to deliberately leave residual, phantom balances in the gas-optimized packed_vbs storage variables. They then withdrew all remaining liquidity, correctly setting the total token supply to zero but leaving the cached virtual balance variables populated with stale, non-zero data. Finally, a minimal deposit of just 16 wei was executed, which triggered the contract’s “first-ever deposit” logic, causing it to incorrectly read the large, stale values and mint a near-infinite number of yETH tokens to the attacker.

Blue faceted crystals, resembling intricate ice formations, are partially covered in white, powdery frost. The intricate blockchain architecture is visually represented by these crystalline structures, each facet symbolizing a validated block within a distributed ledger technology

Parameters

  • Total Loss → $9 Million USD (The estimated total value of underlying assets drained from the yETH pool).
  • Vulnerability Type → Cached Storage Flaw (A logic error where internal accounting variables were not reset upon a critical state change).
  • Minted Token Quantity → 235 Septillion yETH (The astronomical number of tokens minted by the attacker due to the logic flaw).
  • Trigger Cost → 16 Wei Deposit (The minimal amount of input required to trigger the infinite minting condition).
  • Affected Protocol Component → Custom yETH Stableswap Contract (The specific, non-standard contract implementation containing the flaw).

A large, deep blue, translucent faceted object, resembling a gemstone, is depicted resting at an angle on a reflective, rippled surface. White, textured, cloud-like formations are positioned around and partially on top of the blue object, with one larger mass on the right and smaller ones on the left

Outlook

Immediate mitigation for similar protocols requires an urgent audit of all custom contract logic, specifically focusing on explicit state management for edge cases like zero-supply conditions and gas-saving accounting mechanisms. The primary second-order effect is a heightened contagion risk for any protocol that has forked or adapted similar stableswap code without rigorous state transition testing. This event will establish a new security best practice mandating formal verification for all internal accounting logic to ensure that cached or virtual balances are synchronized with the actual, on-chain token supply at every critical juncture.

The exploit confirms that even marginal gas optimizations introduce catastrophic systemic risk when they violate the fundamental principle of explicit and validated state transitions.

Stale storage value, infinite token minting, DeFi accounting error, virtual balance flaw, stableswap logic, gas optimization risk, zero supply condition, critical vulnerability, on-chain forensics, state transition bug, smart contract exploit, flash loan vector, Ethereum protocol risk, token price manipulation, pool drain event, custom contract code, asset loss, internal accounting, deposit logic, minimal input Signal Acquired from → checkpoint.com

Micro Crypto News Feeds