
Briefing
A major security incident has impacted the decentralized finance sector, targeting a legacy yETH product. The primary consequence is the total draining of liquidity pools containing liquid staking assets, causing a direct capital loss for users who provided liquidity to the affected pools. The exploit was facilitated by a critical infinite-minting logic flaw in the custom yETH token contract, resulting in a quantifiable loss of approximately $9 million in ETH and various Liquid Staking Tokens.

Context
This incident underscores the systemic risk posed by maintaining legacy smart contracts with custom, unaudited logic, particularly those interacting with high-value liquid staking derivatives. The prevailing attack surface remains complex token-to-token interactions within stableswap pools, where minor mathematical or logic errors can be weaponized for total liquidity extraction. The lack of robust, continuous formal verification on older, non-core contracts created an unacceptable security debt.

Analysis
The attack vector exploited a flaw within the custom implementation of the yETH token’s minting function, which failed to correctly bound the supply calculation when interacting with the associated stableswap pool. The attacker executed a single transaction to mint an astronomical 235 trillion yETH tokens out of thin air. This artificially inflated token supply was then used to swap for real, underlying assets → specifically ETH and various LSTs → from the Balancer and Curve pools linked to the product, effectively draining the entire pool in a single, atomic operation.

Parameters
- Total Capital Loss → $9 Million (Total assets drained from the affected yETH stableswap and Curve pools )
- Vulnerability Type → Infinite Mint Logic Flaw (A bug in the custom token contract’s internal supply calculation )
- Exploited Asset Quantity → 235 Trillion yETH (The number of fake tokens minted by the threat actor )
- Affected Contracts → Legacy yETH Stableswap Pool (The older contract implementation, not the V2/V3 vaults )
- Stolen Assets → ETH and Liquid Staking Tokens (The primary assets removed from the liquidity pools )

Outlook
Immediate mitigation requires the definitive deprecation and de-risking of all legacy contracts with non-standard logic, even those considered non-core to the protocol’s current operations. This exploit will likely establish a new security best practice mandating a zero-tolerance policy for custom token minting logic in high-value pools, driving a shift toward standardized, battle-tested token interfaces. Second-order effects include increased scrutiny on all Liquid Staking Token (LST) derivatives and their integration into complex DeFi primitives across the ecosystem.

Verdict
This exploit confirms that code-level logic flaws in legacy DeFi infrastructure remain the single greatest systemic risk to deposited capital, irrespective of a protocol’s current security maturity.
