Elad Ernst
659 posts

Elad Ernst
@EladErnst
Cyber Security Researcher at @blockaid_





Earlier today a vulnerability in Huma’s legacy v1 contracts on Polygon was exploited for 101,400 USDC. No user funds at risk and PST is not impacted. Huma’s v2 system on Solana is a complete rewrite and this issue does not apply to v2 systems. The teams were already in the process of sunsetting all the legacy v1 pools, and have paused v1 completely now.




Earlier this morning, one of the legacy V1 deployments of Renegade was exploited for ~$209k. The whitehat has already returned ~$190k, and all affected users will be made whole. We have confirmed that the issue is isolated to the V1 Arbitrum deployment, and that all other deployments (V1 Base, V2 Arbitrum, V2 Base) are safe. No action is required from integrators; all infrastructure that supports trades against the V1 Arbitrum deployment has been paused, and no further funds are at risk.




Shoutout to @blockaid_ you the real hero



🚨 Blockaid's exploit detection system identified an on-going admin-key compromise exploit on @wasabi_protocol across Ethereum and Base. The Wasabi: Deployer EOA was used to grant ADMIN_ROLE to an attacker helper contract, which then UUPS-upgraded the perp vaults and LongPool to a malicious implementation that drained balances.




