⛓
Bridge Exploits
1 article Cross-chain bridge contracts hold locked assets on one chain and mint wrapped tokens on another. Attackers forge withdrawal proofs, exploit validator threshold bugs, or manipulate the verification logic to drain the locked side.
Notable incidents Kelp DAO ($292M)Ronin ($625M)Nomad ($190M)
Read investigations → 🎭
Social Engineering
1 article Long-term infiltration of development teams — fake employees, compromised contractors, or insider threats plant malicious code or steal signing keys. Nation-state groups like Lazarus operate campaigns spanning months.
Notable incidents Drift Protocol ($285M)Bybit ($1.4B)Radiant Capital ($50M)
Read investigations → 📈
Price Manipulation
1 article Attackers use flash loans or large capital positions to move thin on-chain oracle prices, then exploit protocols that rely on those prices for collateral valuation, liquidation thresholds, or payout calculations.
Notable incidents Hyperliquid POPCAT ($6M)Mango Markets ($114M)Euler ($197M)
Read investigations → Uncollateralised loans borrowed and repaid within a single transaction block. They amplify capital for price manipulation, governance attacks, and reentrancy exploits — requiring zero upfront capital from the attacker.
Notable incidents bZx ($1M)PancakeBunny ($45M)Platypus ($8.5M)
A contract calls an external address before updating its own state. The external address re-enters the original contract and drains funds before the balance is decremented. The original DeFi vulnerability class.
Notable incidents The DAO ($60M, 2016)Curve Finance ($61M, 2023)Fei Protocol ($80M)
On-chain price oracles report external data to smart contracts. Attackers manipulate spot prices on low-liquidity DEX pools that serve as oracles, or exploit stale data windows in aggregators like Chainlink.
Notable incidents Cream Finance ($130M)Inverse Finance ($15M)Nirvana ($3.5M)
Compromised infrastructure, leaked .env files, malicious dependencies (supply chain), or phishing give attackers direct access to admin or treasury signing keys — bypassing all smart contract security entirely.
Notable incidents Atomic Wallet ($35M)LastPass → $160M+Multichain ($126M)
Missing or misconfigured access modifiers on privileged contract functions — initializers callable by anyone, admin functions without ownership checks, or proxy upgrade paths left unprotected.
Notable incidents Poly Network ($611M)Wormhole ($320M)Ankr ($5M)