- Detailed explanation of the attack mechanism
- Root cause analysis of the vulnerability
- Specific assertion code that would have prevented the exploit
Access Control & Administrative Vulnerabilities
Bybit - Compromised Safe Wallet UI
Attack Type: UI Compromise + Implementation Change Loss: $1.4B USD Root Cause: Compromised frontend showed fake transactions while changing proxy implementation Prevention: Implementation address change assertions and transaction validationRadiant Capital Hack
Attack Type: Ownership Takeover Loss: $58M+ USD Root Cause: Attackers gained control of multisig signers and changed ownership of lending pools Prevention: Owner change assertions with proper validation and whitelistingUxLink Multisig Ownership Compromise
Attack Type: Private Key Compromise + Multisig Manipulation Loss: $39.3M USD Root Cause: Compromised private keys enabled rapid multisig reconfiguration and threshold reduction Prevention: Threshold protection assertions, owner whitelisting, and cooling periodsArithmetic & Calculation Errors
Balancer V2 Rate Manipulation Exploit
Attack Type: Rounding Error Accumulation Loss: $120M+ USD Root Cause: Accumulated rounding errors in stable pool invariant calculation manipulated exchange rates Prevention: Rate change bounds assertions detecting drastic pool rate changes within single transactionsBunni XYZ Rounding Error Exploit
Attack Type: Rounding Error + Liquidity Manipulation Loss: $8.4M USD Root Cause: Rounding error in withdrawal mechanism led to disproportionate liquidity decreases Prevention: Withdrawal proportionality assertions ensuring balance decreases match share burnsAbracadabra Rounding Error Attack
Attack Type: Rounding Error Exploitation Loss: $6.5M USD Root Cause: Rounding error in RebaseToken mechanism allowed base value inflation Prevention: Invariant checks ensuring debt shares consistencyVestra DAO Hack
Attack Type: Unchecked State Flag Loss: Protocol drained Root Cause: Missing validation ofisActive flag in unstake function
Prevention: State flag validation assertions
Compound Upgrade Bug
Attack Type: Logic Error in Upgrade Loss: $280K USD (limited by quick response) Root Cause: One-letter bug (> instead of >=) in reward calculation
Prevention: Maximum reward rate validation assertions

