Briefing

A critical vulnerability in a custom stableswap contract for the Yearn Finance yETH pool on Ethereum has resulted in a $9 million asset drain. The exploit leveraged a flaw in the protocol’s internal accounting, specifically where cached storage variables were not reset after the pool’s total supply was depleted. This state inconsistency allowed the threat actor to execute a highly capital-efficient attack, minting an astronomical 235 septillion yETH tokens from a negligible 16 wei deposit to deplete the pool’s underlying assets. This incident confirms the extreme risk inherent in complex, non-standardized smart contract logic that attempts gas-saving optimizations.

The image displays a dark, intricate mechanical core surrounded by vibrant blue, translucent fluid-like structures. These elements are partially enveloped by a white, frothy foam, all set against a neutral grey background

Context

The prevailing risk factor in the decentralized finance (DeFi) ecosystem remains the use of complex, custom-forked contracts that introduce subtle state management vulnerabilities. This incident targeted a bespoke stableswap implementation, which, in an effort to reduce gas costs, utilized cached storage variables to track virtual balances. The known attack surface for this class of protocol is the failure to explicitly handle all possible state transitions, particularly the edge case where a pool’s total supply is zeroed out.

The image displays a stylized scene featuring towering, jagged ice formations, glowing deep blue at their bases and stark white on top, set against a light grey background. A prominent metallic structure, resembling a server or hardware wallet, is integrated with the ice, surrounded by smaller icy spheres and white, cloud-like elements, all reflected on a calm water surface

Analysis

The attack vector exploited a “Cached Storage Flaw” in the contract’s logic for calculating the share price upon the first deposit into an empty pool. The attacker first executed multiple deposit-and-withdrawal cycles to deliberately leave residual, phantom balances in the gas-optimized packed_vbs storage variables. They then withdrew all remaining liquidity, correctly setting the total token supply to zero but leaving the cached virtual balance variables populated with stale, non-zero data. Finally, a minimal deposit of just 16 wei was executed, which triggered the contract’s “first-ever deposit” logic, causing it to incorrectly read the large, stale values and mint a near-infinite number of yETH tokens to the attacker.

A luminous blue faceted crystal stands prominently amidst soft white cloud-like textures. A translucent blue shard is partially visible on the left, also embedded in the ethereal substance

Parameters

  • Total Loss → $9 Million USD (The estimated total value of underlying assets drained from the yETH pool).
  • Vulnerability Type → Cached Storage Flaw (A logic error where internal accounting variables were not reset upon a critical state change).
  • Minted Token Quantity → 235 Septillion yETH (The astronomical number of tokens minted by the attacker due to the logic flaw).
  • Trigger Cost → 16 Wei Deposit (The minimal amount of input required to trigger the infinite minting condition).
  • Affected Protocol Component → Custom yETH Stableswap Contract (The specific, non-standard contract implementation containing the flaw).

A close-up view displays a dense network of interwoven, deep blue granular structures, accented by bright blue cables and metallic silver circular components. These elements create an abstract yet highly detailed representation of complex digital infrastructure

Outlook

Immediate mitigation for similar protocols requires an urgent audit of all custom contract logic, specifically focusing on explicit state management for edge cases like zero-supply conditions and gas-saving accounting mechanisms. The primary second-order effect is a heightened contagion risk for any protocol that has forked or adapted similar stableswap code without rigorous state transition testing. This event will establish a new security best practice mandating formal verification for all internal accounting logic to ensure that cached or virtual balances are synchronized with the actual, on-chain token supply at every critical juncture.

The exploit confirms that even marginal gas optimizations introduce catastrophic systemic risk when they violate the fundamental principle of explicit and validated state transitions.

Stale storage value, infinite token minting, DeFi accounting error, virtual balance flaw, stableswap logic, gas optimization risk, zero supply condition, critical vulnerability, on-chain forensics, state transition bug, smart contract exploit, flash loan vector, Ethereum protocol risk, token price manipulation, pool drain event, custom contract code, asset loss, internal accounting, deposit logic, minimal input Signal Acquired from → checkpoint.com

Micro Crypto News Feeds