Hacken🇺🇦

10.7K posts

Hacken🇺🇦 banner
Hacken🇺🇦

Hacken🇺🇦

@hackenclub

End-to-End Blockchain Security & Compliance Partner Born on blockchain. Built for what’s next 🛡️

Security Castle Katılım Ağustos 2017
297 Takip Edilen136.7K Takipçiler
Sabitlenmiş Tweet
Hacken🇺🇦
Hacken🇺🇦@hackenclub·
Secure development is becoming standard in Web3. But risk hasn’t disappeared. It has shifted into upgrades, edge cases, and operational blind spots. Our 2025 Secure Software Development Life Cycle Maturity Survey shows how and where. Get the report: hackenio.cc/4lLNm6o
Hacken🇺🇦 tweet media
English
8
12
34
3.2K
Hacken🇺🇦
Hacken🇺🇦@hackenclub·
Huge thanks to the teams who contributed insights to this research and helped make industry benchmarking possible: @protofire, @MAX_exch, @takadao_io, @JunctionFi, @CipherLabsx, @MSTBlockchain, @StrobeFinance, @fg_platform, @aeternafi, @overtake_world, @Cyclone_Chain, @SkyCoin_xso, @daCat_token, Sway, @Astra__Nova, @lumisfi_, @onchainwinx, @flicker_finance, @nonco_otc, @UFarmDigital, @AssetoFinance, @smartenergypay, @Privily_fi, @aibtcdev, WristKey Global Solutions.
English
4
3
18
309
Hacken🇺🇦
Hacken🇺🇦@hackenclub·
Another emerging trend: AI in development. 80% of respondents now use AI tools in their workflows. But governance around secure AI usage, code provenance, and review processes is still catching up.
English
2
1
10
259
Hacken🇺🇦
Hacken🇺🇦@hackenclub·
Secure development is becoming standard in Web3. But risk hasn’t disappeared. It has shifted into upgrades, edge cases, and operational blind spots. Our 2025 Secure Software Development Life Cycle Maturity Survey shows how and where. Get the report: hackenio.cc/4lLNm6o
Hacken🇺🇦 tweet media
English
8
12
34
3.2K
Hacken🇺🇦
Hacken🇺🇦@hackenclub·
We’ll also dive into the 1inch case: ▫️ How the team simulated real attackers ▫️ What “zero critical findings” actually means ▫️ What most teams still underestimate in production security If you’re building in Web3, this is for you.
English
0
0
2
291
Hacken🇺🇦
Hacken🇺🇦@hackenclub·
In this Space: ▫️ How penetration testing simulates real attackers ▫️ Where risk concentrates beyond smart contracts ▫️ Why upgrades and integrations create new attack paths ▫️ How mature protocols approach offensive security
English
1
0
2
344
Hacken🇺🇦
Hacken🇺🇦@hackenclub·
Most Web3 hacks don’t come from smart contracts anymore. They come from everything around them. Tomorrow we’re going live with @1inch to break down how real attackers actually approach modern DeFi systems. Set a reminder 👇 x.com/i/spaces/1pKkO…
English
3
2
17
1.4K
sun wukong
sun wukong@sunwukongcall·
Meta Financial AI@MetaFinancialAI

A months long, premeditated attack exploiting a known, dismissed vulnerability in a low liquidity token market. Mefai Analysis. We investigated after seeing some articles suggesting that @Binance was to blame. It has nothing to do with Binance,(We know this was intentional.) and #Venus has also warned team about this. Venus Protocol vTHE Attack | Full Analysis Attacker, 0x1a35bd28efd46cfc46c2136f878777d69ae16231 Funding: 7,400 ETH from Tornado Cash The Block How It Worked, Attacker spent 9 months (starting June 2025) quietly accumulating ~84% of THE's supply cap (14.5M tokens). Then, instead of depositing normally, they transferred tokens directly to the vTHE contract a donation attack bypassing the supply cap entirely and building a 53.2M THE position, 3.7× the allowed limit. They then ran a classic loop, 1 deposit THE 2 borrow assets 3 buy more THE 4 wait for TWAP oracle update 5 repeat, pushing THE's price from ~$0.263 to ~$0.563 before it collapsed to ~$0.22 on liquidation. Assets borrowed, 6.67M CAKE, 1.58M USDC, 2,801 BNB, and 20 BTC. Damage , ~$2.15M in bad debt remained 1.18M CAKE and 1.84M THE unrecoverable. The playbook mirrors the October 2022 Mango Markets exploit. Damning Part ,This exact donation attack vector was flagged in Venus's own Code4rena security audit. The team dismissed it, arguing donations were supported behavior with no negative side effects.

English
1
0
1
159
Hacken🇺🇦
Hacken🇺🇦@hackenclub·
🚨 @VenusProtocol on BSC was exploited for ~$3.7M on March 15. Root cause: supply cap bypass via direct ERC-20 transfers to a vToken contract, a known Compound V2 design flaw previously flagged in Venus’s own Code4rena audit. Example tx: bscscan.com/tx/0x5aede60c7… ~50 exploit transactions in total. 🧵
Hacken🇺🇦 tweet media
English
13
19
94
9.4K
Hacken🇺🇦
Hacken🇺🇦@hackenclub·
We always credit sources when we rely on external work. Here, the analysis comes from our own on-chain investigation. The data is fully public: transactions, flows, contract behavior. Multiple teams can reach the same conclusions analyzing the same evidence. That’s independent research, not copying.
English
0
0
2
54
Abdul Malik Janjua
Abdul Malik Janjua@A_Malikjanjua·
@hackenclub @VenusProtocol You copied this Data from @MetaFinancialAI . When you copy someone’s content, you should also give proper credit to the original Ones... x.com/MetaFinancialA…
Meta Financial AI@MetaFinancialAI

A months long, premeditated attack exploiting a known, dismissed vulnerability in a low liquidity token market. Mefai Analysis. We investigated after seeing some articles suggesting that @Binance was to blame. It has nothing to do with Binance,(We know this was intentional.) and #Venus has also warned team about this. Venus Protocol vTHE Attack | Full Analysis Attacker, 0x1a35bd28efd46cfc46c2136f878777d69ae16231 Funding: 7,400 ETH from Tornado Cash The Block How It Worked, Attacker spent 9 months (starting June 2025) quietly accumulating ~84% of THE's supply cap (14.5M tokens). Then, instead of depositing normally, they transferred tokens directly to the vTHE contract a donation attack bypassing the supply cap entirely and building a 53.2M THE position, 3.7× the allowed limit. They then ran a classic loop, 1 deposit THE 2 borrow assets 3 buy more THE 4 wait for TWAP oracle update 5 repeat, pushing THE's price from ~$0.263 to ~$0.563 before it collapsed to ~$0.22 on liquidation. Assets borrowed, 6.67M CAKE, 1.58M USDC, 2,801 BNB, and 20 BTC. Damage , ~$2.15M in bad debt remained 1.18M CAKE and 1.84M THE unrecoverable. The playbook mirrors the October 2022 Mango Markets exploit. Damning Part ,This exact donation attack vector was flagged in Venus's own Code4rena security audit. The team dismissed it, arguing donations were supported behavior with no negative side effects.

English
1
1
2
165
Hacken🇺🇦
Hacken🇺🇦@hackenclub·
⚠️ Attention Compound V2 forks: Verify whether direct token transfers to your cToken contracts bypass supply-cap logic. If so, the same attack pattern may still be exploitable.
English
3
2
7
725
Hacken🇺🇦
Hacken🇺🇦@hackenclub·
Venus states the oracle functioned as designed, reflecting market prices. The issue was an artificially pumped collateral asset feeding into an uncapped position. THE market and 8 other low-liquidity markets are now paused while supply-cap enforcement is being hardened. x.com/VenusProtocol/…
English
2
2
6
769