Exploit Analysis Reports

Alkemi Self-Liquidation

On March 10, 2026, an attacker exploited the `liquidateBorrow` function of the Alkemi Earn Public lending protocol on Ethereum mainnet (block 24,626,979) to self-liquidate their own solvent position. The root cause is a compound vulnerability: `liquidateBorrow` lacks both a …

2026-03-10 ·  Ethereum · 43.45 ETH · Storage Aliasing · Artifacts

Gondi PurchaseBundler Drain

On 2026-03-09, the `PurchaseBundler` contract (`0xc10472ac`) deployed on Ethereum (block 24618641) was exploited through an access control bypass in its `executeSell` function. The attacker (`0x8d171c74`) used a purpose-built contract (`0xe95e3cfc`) to call `executeSell` 81 …

2026-03-09 ·  Ethereum · 39 NFTs · Flash Loan · Artifacts

MOLT EVM Weak Spawner Access Control

On 2026-03-08 at 20:36 UTC (Base block 43093167), an attacker exploited a trivially bypassable `onlySpawnerToken` modifier on the MoltEVM token contract (`0x225da3d879d379ff6510c1cc27ac8535353f501f`) to mint 100,000,000 mEVM tokens at zero cost. The modifier requires only that …

2026-03-08 ·  Base · 50.36 WETH · Access Control · Artifacts

SOLV BRO Double Mint

On March 5, 2026, Solv Protocol's Bitcoin Reserve Offering on Ethereum was exploited through a callback-driven logic error in the BRO wrapper at `0x15f7c1ac69f0c102e4f390e45306bd917f21cfcf`, accessed through the beacon proxy at `0x014e6f6ba7a9f4c9a51a0aa3189b5c0a21006869`. The …

2026-03-05 ·  Ethereum · 1211.054376965512754134 ETH · Reentrancy · Artifacts

Base Multi-Contract Exploit

**Transaction:** `0xe94a5ed54d0a9aa317c997607d7d1ea9828ad47626d7794b0e4020ff49cdf9a0` **Chain:** Base (Chain ID: 8453) **Block:** 42832267 **Date of Analysis:** 2026-03-04 **Debate Round:** 1

2026-03-04 ·  Base · 97,000 USDC · Flash Loan · Artifacts

Inugami Staking Reward Debt Drain

On March 3, 2026, the Inugami staking contract on BNB Chain (`0x2001144a0485b0b3748a167848cdd73837345d73`) was exploited via a logic error in reward-debt initialization. The attacker staked a small amount of LP, sent 1 wei WBNB to reactivate the reward window, and then claimed …

2026-03-03 ·  BSC · 13.9 WBNB (~8.75K USD) · Logic Error · Artifacts

Uniswap V4 Hook Swap Drain

On March 3, 2026 (block 24,575,085), the UniswapV4Router04 contract at `0x00000000000044a361ae3cac094c9d1b14eece97` on Ethereum mainnet was exploited via an authorization bypass vulnerability in its `swap(bytes,uint256)` function. The root cause is a hardcoded calldata offset in …

2026-03-03 ·  Ethereum · 21.198 ETH · Calldata Manipulation · Artifacts

sDOLA LlamaLend Oracle Manipulation

On March 2, 2026 at 03:00:11 UTC (block 24566937), an attacker exploited an oracle misconfiguration in the Curve LlamaLend sDOLA/crvUSD market on Ethereum. The root cause was the `CryptoFromPoolVaultWAgg` oracle contract (`0x88822ee5`) calling `sDOLA.convertToAssets()` as a spot …

2026-03-02 ·  Ethereum · 240,000 USD · Oracle Manipulation · Artifacts

BUBU2 Fee Token Staking Drain

On March 1, 2026, the BUBU2/WBNB PancakeSwap pair on BNB Chain (block 83,955,808) was drained by flash-loan sandwiching a permissionlessly-triggerable burn mechanism inside the BUBU2 token contract.

2026-03-01 ·  BSC · 32.176 WBNB · Flash Loan · Artifacts

Movie Token Burn Manipulation

On 2026-02-28 (BSC block 85677691), the Movie Token ($MT) project was exploited for approximately **381.75 WBNB (~$242K USD)** in a single transaction. The attacker abused the MT token's `extractFromPoolForLpMining` function, which burns tokens directly from the PancakeSwap …

2026-02-28 ·  BSC · 381.75 WBNB (~242K USD) · Access Control · Artifacts