bridge was exploited for ~8M USD.
The root cause is a possibility of an arbitrary call with user controlled data via `depositToGasZipERC20()` in GasZipFacet which was deployed 5 days ago!
One of hack txs:
pETH belonging to
@JPEGd_69
has just been exploited for 11 million USD with a Curve read only reentrancy.
An attacker was frontrunned by a MEV-bot:
A screenshot from our monitoring system:
π¬New tool for onchain bug hunters:
tx-coverage allows to reveal unused code of live smart contracts by collecting coverage from historical transactions.
With it you can discover code that was never executed onchain and may contain potential bugs.
c0ffeebabe.eth executed a front-run hack for 1.9k $ on pbtc-sbtc-f Curve pool compiled with vulnerable Vyper 0.2.15:
This time a reentrancy was possible due to a ERC-777 callback in sBTC instead of a fallback on eth transfer.
Possible governance attack (?) underway at TORN. Someone creating hundreds of contracts atomically and then passing zero TORN transfers through before transferring on to gov vault, very weird activity.
Our audit reports for the
@1inch
Fusion contracts are out now! During development and testing, the 1inch contributors' team has resolved the following issues reported by us:
β 3 high severity bugs
β 1 medium severity bug
β 7 low
β 16 info
Check it out:
We continue our series of the articles on the security of the DeFi patterns, this time we examined the common vulnerabilities in the AMMs. Check it out:
Today we detected an exploit targeting
@SonneFinance
Comptroller contract on the Base chain deployed by a Tornado funded address that could drain other markets.
π£ New Solidity semgrep rule: `oracle-uses-curve-spot-price`
Detects vulnerable price oracles that rely on Curve's get_p() which was the root cause of the $22 million
@UwU_Lend
hack.
Check it out:
Yesterday we prevented an exploit on protocol after we noticed a suspicious contract that created a governance proposal which turned out to be malicious.
@ElephantStatus
The root cause of the vulnerability is the same as in another hack that happened today with
@BEARNDAO
: no slippage protection on swap!
USDTStakingContract28 lost 21k USDT to a Tornado funded attacker who exploited an unprotected token approval to any address in the function `tokenAllowAll`
The wait is over!
@Scroll_ZKP
is now live, bringing the fastest bridging experience to Scroll on your favourite app π
Shoutout to
@DecurityHQ
for a super-fast audit & helping us ensure the highest security for our users.
We are glad to announce that
@unoreinsure
has finished an audit with us. Here is a technical analysis of a potentially exploitable vulnerability found in the VotingEscrow contract of the Uno Re DAO.
π§΅π
Thanks to the awesome team at
@DecurityHQ
for flagging an issue with the way our yieldDistributor contracts were configured to work with the vote escrow contracts, potentially allowing users to reduce their lock time and still continue streaming their rewards.
However, this
Our monitoring system has detected another deflationary token attack:
An attacker called `deliver` function to shrink `_rTotal` value which increased the BUNN token balance of the Pancake pair and allowed them to perform the swap with 52 BNB profit
A contract of
@cexiswap
has been hacked for 30k USDT by exploiting an unprotected initialize() funtion. The attacker became the owner of the contract and called upgradeAndCall() which transferred USDT out of the vulnerable contract.
Decurity team partnered with
@hexensio
under the name "Hexurity" and scored 2nd place worldwide in the hardest web3 hacking competition β Paradigm CTF.
Contact us on and get audited by the top smart contract security auditors in the world!
Another ERC404 project has been hacked, this time
@ERC404_loogn
A tornado funded attacker exploited an input validation error which allowed to transfer "loogn" tokens to them for free.
Penpie protocol fell victim to a $27 million smart contract exploit. There were no references of the victim address, however Defimon instantly identified interactions with the Pendle protocol (Penpie is built on top of it):
Little time left before
@EthCC
and
@summit_defi
in Paris! We will give away free tickets to both conferences for hacking this contract:
Note: the task requires Chainlink tokens on Sepolia:
π£ New release: tree-sitter grammar for the circom language
It is already integrated by
@semgrep
in the latest 1.86.0 release, so now you can write custom semgrep rules for your ZK circuits in circom.
Proud to be sponsoring
@TheTrustX
conference in Istanbul during the
@EFDevconnect
week!
Meet Decurity at our sponsor zone and come for our content:
13 November, 16:15: Omar Ganiev, Web2.5 Security: pentesting blockchain infrastructure, wallets, and custodial apps,
13 November,
Pleased to announce our collaboration with
@ether_fi
β a liquid restaking protocol on Ethereum.
No high-risk or critical bugs were found during the audit.
Check out the report β
We've prepared a couple entry-level smart contract hacking challenges for the
@ETHAbuDhabiConf
hackathon running for the next 2 days.
Register here for practice and swag:
Another small hack on BSC network:
In the function `claim` 0xac899 mistakenly approves msg.sender the whole amount of BUSD it possesses (around 6k USD). The victim contract is not verified on Bscscan.
Ethernaut CTF 2024 has wrapped up!
π₯
@ambergroup_io
π₯
@DecurityHQ
π₯
@statemindio
Stay tuned for rewards and POAPs via email this weekπ Until next time!
Check out challenges & solutions here:
APEDAO has been just hacked for $7k using multiple flashloans due to the incorrect calculations in the `_transfer` function. An attacker repeatedly transferred the tokens to the Pancake pair and called skim():
We have recently finished an audit of
@Givethio
smart contracts together with
@PowerInsideLab
, this vuln could be exploited to grab all the rewards from the staking pool (now fixed)
The front page of now features the list of automatically detected attacks and exploits. New attacks will be revealed with a delay, if you need real-time threat intelligence feed contact us π
β½ We have added a bunch of gas optimisation
@semgrep
rules to
π You can use them in smart contract audits as well as in CI workflows. Just clone & run:
`semgrep --config solidity/performance /path/to/repo`
As a result of the CDP analysis we have started compiling security checklists for the auditors:
Stay tuned for more checklists for other DeFi patterns!
We are excited to announce a partnership with
@YieldNestFi
β a Liquid Restaking Protocol.
Now we are monitoring YieldNest with Defimon for suspicious transactions.
Get protection from DeFi hacks β
.
@BaseBrosFi
(now deleted) apparently did a rug pull disguised as a hack
Tornado funded address deployed a smart contract on Base that was set as a new vault for several strategies using seemingly stolen private key.
@SeamlessFi
reported previously as the victim is not affected
GM All, important immediate update:
1. Funds on Seamless are SAFU.
2. Seamless contributors have investigated claims of a hack on the protocol and confirmed the protocol was NOT exploited.
3. Seamless contributors are working with security teams and other Base projects to
The security audit report for Thales Liquidity Pool contracts (also used in
@OvertimeMarkets
AMM Liquidity Pool contracts) by
@DecurityHQ
is ready π«‘
Check it here:
We have updated :
ποΈadded new repositories to the simhash db:
β’ periphery of Uniswap v2 and v3
β’ compound-finance/compound-protocol
β’ aave/protocol-v2
β’ vectorized/solady
βοΈ added new networks: Polygon, Arbitrum and Optimism
What can go wrong in this Solana->Ethereum burn-and-mint bridge scheme?
Can you spot the bug?
Learn this simple yet powerful attack from one of our security reviews πππ
This morning, we discovered an exploit on the CrossX contracts. All user funds lost to this exploit will be reimbursed shortly. We have identified the vulnerability and will deploy a new contract soon.
We will go over this in detail on Tuesdayβs AMA.
β¨New rule: `uniswap-callback-not-protected`
Will find unprotected Uniswap v2/v3 callbacks that do not check if the caller is a correct pool (including faulty tx.origin checks). At least one project on
@immunefi
was vulnerable, can you find more?
Fatal flaws in a bot, a sort of on-chain virus, a trojan horse token, and arbitrage gone wrong
Join me in looking at the latest MEV bot exploit in this thread ππ»
We are proud to announce that we completed two thorough audits for
@ClearpoolFin
previously this year π‘οΈ
We have successfully collaborated with their team to ensure the protocol is fully secure and there are no issues.
Check out the reports:
The borrow limits for
@mellowprotocol
's LRT vaults are set to increase tomorrow. To bolster the safety of the contracts, an integration audit has been conducted by
@DecurityHQ
. π‘οΈ
Decurity has previously conducted audits for
@yearnfi
,
@compoundfinance
& other notable protocols.
The hacker crafted special calldata with transferFrom() calls and passed it as swapData to depositToGasZipERC20 to steal approved tokens from the bridge. Vulnerable contract:
Our monitoring system detected a bunch of token hacks:
β οΈ UMG2.0 lost $1.2k
β οΈ LoongKing lost $5k
β οΈ ETHDOGE lost $11k
β οΈ LadyPepe lost $2k
This is our write-up about one of the hardest Paradigm CTF 2022 tasks. It involves auditing and exploiting a real protocol (which was luckily deprecated):
We're thrilled to introduce our new Semgrep ruleset for smart contracts. Special thanks to
@DecurityHQ
for the incredible contributions π. Check out the ruleset here:
If you are doing a smart contract security audit and see this
`require(token.balanceOf(address(this)) == β¦.`
Youβve most probably found an issue. Anyone who can get 1 wei worth of `token` can send it to the contract as a front-run attack, forcing the method call to revert
We're glad to announce that our grant proposal for enhancing our
@semgrep
solidity rulepack has been approved by
@compoundgrants
.
The purpose is to develop new static analysis rules and adapt them for the Github pipelines of
@compoundfinance
.
We'll tweet soon about our progress!
π We are proud to announce the Security Partners for QuillCTFs
π€ They have helped us with the CTFs and contributed immensely to Web3Security.
π₯ Form your π―-π½π²πΏππΌπ» teams and bring your A-game to the bug hunt.
ποΈ π₯π²π΄πΆπππ²πΏ π‘πΌπ -
This attacker went on a spree, the vulnerability is nearly the same β a flawed `transferFrom` in a closed source contract:
This time they grabbed more than 23k USD by swapping stolen STRAC tokens.
We detected the hack and the victim 70 seconds before it happened based on the static analysis of the deployed exploit contract.
We also detected a copy-cat exploit someone has deployed but not yet used:
While our previous CTF challenge is still out (some people are close to solving!), here's an easier one for you:
Solve it and grab free tickets to
@EthCC
&
@summit_defi
conferences in Paris!
The vulnerability was possible because the input parameter claimContracts can be controlled by a malicious user. The attacker passed their own contract which returned arbitrary value in `cvgClaimable`.
The dev created a contract 3 years ago, approved a large amount of USDT to this contract and forgot about it. Today it was exploited, although it's not verified on Etherscan!
Victim contract:
With the help of
@_SEAL_Org
911 Team we shared the threat intel with the Sonne team which confirmed that they are aware of this Compound vulnerability and minted a small amount of sobAERO before setting collateral factor.
New
@semgrep
rule: `proxy-storage-collision`
Detects contracts that inherit common proxies (like TransparentUpgradeableProxy) and declare a state var (which is not constant or immutable) that might overwrite implementation storage.
Check it out π
Post-mortem from this weekend's attack is now live:
Highlights:
- Audited contracts were compromised due to an exploit in the contract initialization code that allowed repeated invocations of the "initialize" function.
This year we're sponsoring
@ETHDubaiConf
and hosting a CTF contest for the participants.
Meet us at our booth, at our lightning session, the CTF workshop, and the Panel on Security on March 16!
See our products and services:
#ETHDubai
Decurity was included in the Audits Hub of the
@Optimism
L2:
If you're launching a project on Optimism, contact us to apply for a grant, and the audit costs can be covered!
MyAi token on BSC got hacked for about 10 BNB because of a wrong approval that was given to the MultiSender contract which allowed to transfer any allowed tokens: