DeFiHackAlerts

356 posts

DeFiHackAlerts banner
DeFiHackAlerts

DeFiHackAlerts

@DeFiHackAlerts

Know about DeFi protocol hacks first. FREE alert service providing actionable Alpha.

Düsseldorf - Germany Katılım Temmuz 2025
158 Takip Edilen249 Takipçiler
jussy
jussy@jussy_world·
He’s right 5% on stables isn’t worth it But when it’s 19% since inception on delta-neutral strategies, you’re missing profit On @piggybank_fi, yield comes from funding rate arbitrage across perpetual DEXs And tonight, Season 0 rewards should be announced, with some form of revenue sharing That’s what I call DeFi Ofc, DYOR as always
jussy tweet media
fabiano.sol@FabianoSolana

Defi gave me 6 figures But I'm tired of losing money So I stopped trusting CT and audited protocols myself. Here are the highest yields with low risk: - Multisigs - All audited - No liquidation risk (multiplying/looping)

English
22
6
131
14.6K
Wazz
Wazz@WazzCrypto·
I've been using this for basically 90% of my projects, I can oneshot everything without issues I generally use Gemini Gems to generate it, I have found it yields good results, better than other models. But you can use this prompt with any agent: github.com/wwwazzz/senior…
English
2
0
29
1.5K
Wazz
Wazz@WazzCrypto·
Sharing my Prompt on How to One-shot any App with your Coding Agent One shotting an app these days is not hard, but you need the proper structure and plan, otherwise everything will be filled with assumptions or gaps, which are often wrong for your specific use case 🧵
Wazz tweet media
English
8
3
72
7.7K
DeFiHackAlerts
DeFiHackAlerts@DeFiHackAlerts·
Be careful with Litecoin right now.
Alex Shevchenko 🇺🇦@AlexAuroraDev

10h ago @litecoin experienced a coordinated attack on the chain that resulted in 13 blocks reorg that took more than 3h to generate. During this time attackers were performing double spend attacks on multiple cross-chain swapping protocols. We are investigating the situation.

English
0
0
1
128
cryptoleon
cryptoleon@cryptoleon·
Ich möchte mich mit mehr deutschen connecten im Space. Wenn du deutsch sprichst kommentier einfach und ich folge dir brudi
Deutsch
1K
17
893
258.2K
DonDegen
DonDegen@DonDegenDefi·
@HYPEconomist Only reasonable thing you can do is making your own stablecoin by doing delta neutral trades on Hyperliquid and other perps
English
1
0
1
40
HYPEconomist | Theo Arc
HYPEconomist | Theo Arc@HYPEconomist·
all i want is 7% APY on my stablecoins without the constant fear of losing everything to a hack is that asking too much?
English
163
16
693
64K
DeFiHackAlerts
DeFiHackAlerts@DeFiHackAlerts·
Good to know, if you are invested in USD1.
Tindorr 🌯@0xTindorr

Something is off on @worldlibertyfi market. Util. rates on USD1 and USDC reach 98.26% and 92.3% respectively. WLFI whales deposited 3B tokens of WLFI as collateral and borrowed USDC and USD1, depleting the pool and pushing the supply APR through the roof. While some think this is a good opportunity to lend, I'm doing the opposite and withdrawing while there's still room. Too many potential and uncontrollable risks: withdrawal stuck, liquidation cascades, bad debt in the worst case. Not gonna risk it. DYOR.

English
1
0
1
151
Lasalad
Lasalad@TRTtheSalad·
3% instant withdrawal fee wiped out months of yield. I deposited 2,000 USDC into the yoUSD(@yield) vault in December. The position generated ~37 USDC in yield over time. In theory my balance should now be around 2,037 USDC. But due to the @ResolvLabs exploit exposure (yoUSD vault had funds in the RLP junior tranche), a 2.95% withdrawal fee now applies. Result: • Redeemable today: 1,980 USDC • Net result: -20 USDC That turns months of yield into roughly -3.3% APY. A good reminder that in DeFi risk isn't only smart contracts it's also hidden mechanics in vault strategies. You don’t win every time. Keep doing your own research!🫡
Lasalad tweet mediaLasalad tweet media
English
2
0
3
228
Defimon Alerts
Defimon Alerts@DefimonAlerts·
⛑ $512K rescued by Defimon after infinite approvals were granted to @squidrouter multicall The SquidMulticall contract's run() function allows anyone to execute arbitrary external calls with no access control. A wallet 0xacc0 mistakenly approved the multicall contract instead of the router contract and did it across multiple chains. It didn't take a long time before first attack - a MEV-bot called run() with a crafted Call struct that executed transferFrom() on the WETH contract, transferring just 1 WETH from a victim. In fact the victim user had around $800K approved to the mulitcall contract on various chains. After we detected the first attack our whitehat bot identified the vulnerable cross-chain approvals and managed to rescue around $512K. We contacted the person via Blockscan chat and returned all the rescued funds. We learnt that it was an operational mistake: "we were supposed to only approve to the Squid router address". Although some funds were lost, 0xacc0 was happy that the majority of the funds was rescued! First attack: bscscan.com/tx/0x81d0c429e… Victim: bscscan.com/address/0xaCc0… SquidMulticall: bscscan.com/address/0xaD6C… Rescued funds consolidation address: debank.com/profile/0xF50D…
Defimon Alerts tweet media
English
6
5
52
8.1K
resende.sol 🐼 ⛩️
resende.sol 🐼 ⛩️@resendedefi·
From what I’ve seen so far, I also think it’s unlikely they’ll recover the capital lost in the attack. This situation honestly made me rethink a few things, because I’ve never gone too deep into protocol security. I enjoy exploring new DeFi projects, and most of my analysis was focused on metrics like TVL, liquidity, adoption, and similar signals. Now I want to improve my risk management and start taking protocol security much more seriously.
English
2
0
1
19
JukitCryptoX
JukitCryptoX@jukitCrypto·
I had $1K USDC+ exposure on @ExponentFinance , currently can not withdraw anything stay safu
CryptoParsel@derparsel

List of protocols exposed to @DriftProtocol and current status 👇 🔸 @reflectmoney - USDC+ is farming yield on Drift; mint and redemption of USDC+ has been frozen; funds are insured 🔸 @project0 - protocol paused; no new borrows can be made agains drift positions 🔸 @piggybank_fi - $106.4k/$4M of funds were deployed to Drift (~2.6%) 🔸 @ranger_finance - rUSD has exposure to Drift, but no statement from the team so far 🔸 @uselulo - Classic deposits may be affected according to the team 🔸 @DeFiCarrot - team confirmed no significant exposure to Drift for CRT yield (actually only $600) 🔸 @xplaceapp - uses Drift (besides Kamino) for yield on Savings, no statement from the team so far 🔸 @GetPyra - uses Drift for yield and credt; user funds withput open loans are moved away for security reasons 🔸 @TradeNeutral - no remaining NT Vaults should be affected 🔸 @elementaldefi - uses Drift for USDC Vaults, no statement from the team so far 🔸 @Loopscale - team confirmed no exposure to Drift 🔸 @synatraxyz - team confirmed no exposure to Drift

English
6
0
5
299
fabiano.sol
fabiano.sol@FabianoSolana·
I’m tired of losing money So I locked in the past two days and built a website that tracks almost every stablecoin yield on Solana - Risk (audits, multisigs, liquidation risk) - APY (and where the yield comes from) - Airdrops 🔗 solana-yields-two.vercel.app
English
207
111
1.1K
161.4K
YAM 🌱
YAM 🌱@yieldsandmore·
Earlier today, ~392k USDC from @SiloFinance's managed soUSDC vault on Arbitrum was forcibly allocated into the wstUSR/USDC market, leaving bad debt. wstUSR was trading at ~$0.12 onchain, but the Silo market's oracle priced it at 1 wstUSR = 1.1329 USDC. Anyone who bought wstUSR cheaply could use it as collateral worth ~10x its real value. The exploiter called deposit() on the wstUSR market directly, donating the shares to soUSDC. The supply cap controlling how much soUSDC can actively allocate to this market was 0, but that cap only governs the vault's own outbound deposits. It does nothing to stop external parties from crediting positions to the vault. Once those shares landed in soUSDC's balance, totalAssets() counted them. It iterates every market in the withdrawal queue and reads the vault's actual share balance in each one, with no check on whether the position was voluntarily entered. Combined with the oracle gap, each attack loop worked like this: 1. Flash-loan USDC. 2. Deposit the bulk of USDC to soUSDC, which routes it to an existing market and mints soUSDC shares to the attacker. 3. Deposit a small amount of USDC to the wstUSR market directly, donate the shares to soUSDC. 4. Borrow that USDC back using cheap wstUSR as collateral at the inflated oracle price. 5. Redeem the soUSDC shares. soUSDC's totalAssets() now includes the gifted position, so the attacker's shares are worth more than when they deposited. Combined with the borrow proceeds, this covers the flashloan repayment. 6. Walk away with a small profit. wstUSR stays locked as collateral permanently. Each loop was limited by how much wstUSR the attacker had, so between loops they kept buying more on the open market. That pressure drove wstUSR from ~$0.12 to ~$0.75. The loop ran 32 times over ~75 minutes. Silo's allocator noticed and called reallocate() to move the remaining 154k to an idle holding vault. It didn't help. The idle vault was in soUSDC's withdrawal queue. Each flashloan loop inflated soUSDC's book value by depositing to the wstUSR market, but that market had nothing liquid to withdraw since it was immediately borrowed out. So soUSDC pulled the shortfall from the idle vault every single time. 154k gone in 40 seconds across 20 transactions. soUSDC depositors are now exposed to ~392k of undercollateralised debt at 100% utilisation. What could Silo have done? The oracle used by the wstUSR market is hardcoded as immutable in the SiloConfig contract. The only option available was removing the wstUSR market from soUSDC's withdrawal queue before anyone exploited it. That process requires three steps, each behind the vault's 48h timelock: enable the market with a nominal cap, set the cap back to 0, submit removal and wait for it to finalise. Six days total. They didn't start it. What can they do now? They can still run that same six-day process. It won't recover the 392k, but it prevents a repeat. They should also remove the soUSDC vault from the UI to prevent new deposits. SiloVault is forked from @Morpho's MetaMorpho contract (Silo's own source code says `Forked with gratitude from Morpho Labs`). Any MetaMorpho/SiloVault-style vault that (1) counts externally credited market balances in totalAssets(), (2) leaves the toxic market in the withdraw queue, and (3) relies on a stale or structurally incomplete pricing path can be exposed to this same class of attack. Example exploit tx: arbiscan.io/tx/0xd354389e6… Exploiter: debank.com/profile/0x8170… soUSDC Vault: v2.silo.finance/vaults/arbitru… wstUSR market: v2.silo.finance/markets/arbitr… Failed rescue tx: arbiscan.io/tx/0x3235decc8… Oracle: #readContract" target="_blank" rel="nofollow noopener">arbiscan.io/address/0x6BC7…
YAM 🌱 tweet media
English
17
35
245
69.7K