Mid

4.9K posts

Mid banner
Mid

Mid

@Elmidou

co-founder & chief investment officer of @yield, the yield engine for the crypto economy

Miami Beach, FL เข้าร่วม Haziran 2009
195 กำลังติดตาม1.2K ผู้ติดตาม
Mid
Mid@Elmidou·
Happy Monday DeFi folks. Let’s get to it!
English
0
0
7
165
Mid
Mid@Elmidou·
The YO teams ships as much during the weekend (unexpectedly) as we ship during the workweek
English
2
0
10
823
Mid รีทวีตแล้ว
Michael Egorov
Michael Egorov@newmichwill·
Those who say "crypto is dead" or "DeFi is dead" don't know what they are talking about. Banks never operated in such harsh conditions, and they always get saved by the Big Printer. As a result, their infra is horrifically bad. In DeFi, we have to make sure that our stuff is solid, and only the fittest survives
English
107
188
1.4K
131.6K
Mid
Mid@Elmidou·
AI made finding farfetched vulnerabilities trivial for hackers and DeFi’s giant pools are the low hanging fruit across the tech stack - Explains the DeFi hack surge this past few months.
English
0
0
10
607
Mid
Mid@Elmidou·
New UX dropping today: see your positions across @Ethereum, @Base and @Solana in one chart. YO keeps pushing the frontier of multichain.
English
1
2
17
3.2K
Mid
Mid@Elmidou·
@kahunacap I didn’t need the SEC, but I definitely agree with that 😆
English
0
0
0
34
Kahuna
Kahuna@kahunacap·
@Elmidou You know the SEC just said yall can’t be curating RWA vaults, right?
English
1
0
0
39
Mid
Mid@Elmidou·
Just blocked another private credit opportunity from being listed for $yoUSD because it is not transparent enough on the yield source. Asymmetry of information creates conflicts of incentives, which leads to a silent increase in risk.
English
3
0
16
1.4K
Mid
Mid@Elmidou·
Thank you for playing
English
0
0
2
150
Mid
Mid@Elmidou·
DeFi doom timeline unleashed. Do you like the trenches?
English
4
0
12
392
Mid รีทวีตแล้ว
Sam Kamani
Sam Kamani@samkamani·
Just spoke with Mehdi Lebbar, co-founder of @yield, a DeFi yield platform that just raised $10M. Here are the most important things I learned. 🧵
Sam Kamani tweet media
English
2
0
2
72
Mid
Mid@Elmidou·
@catwychan Hey @ResolvLabs is this also a case where you want to take from RLP and give to the exploiter?
English
1
0
1
58
Catherine is Solving
Catherine is Solving@catwychan·
Can’t believe still seeing resolv USR exploits even now. Silo finance saw ~$400k USDC drained via wstUSR market on arbitrum, yesterday. - The exploit seem to be only possible in silo implementation (morpho fork). - In silo’s version, TotalAsset() counts both collateral + supply. The collateral value is priced via the oracle. - In this case, since the vault share accounts for the collateral, attackers can inflate NAV by ~9x by donating cheap collateral — wstUSR ($0.12 on DEX but $1.13 via the vault oracle) — and then redeem vault shares to extract real value from the vault’s other liquid markets. - Whereas standard Metamorpho’s TotalAsset() only counts for the vault’s supply positions. Takeaways: Not all morpho forks are created the same. But how are users supposed to know. We are all f***ed.
YAM 🌱@yieldsandmore

Earlier today, ~392k USDC from @SiloFinance's managed soUSDC vault on Arbitrum was forcibly allocated into the wstUSR/USDC market, leaving bad debt. wstUSR was trading at ~$0.12 onchain, but the Silo market's oracle priced it at 1 wstUSR = 1.1329 USDC. Anyone who bought wstUSR cheaply could use it as collateral worth ~10x its real value. The exploiter called deposit() on the wstUSR market directly, donating the shares to soUSDC. The supply cap controlling how much soUSDC can actively allocate to this market was 0, but that cap only governs the vault's own outbound deposits. It does nothing to stop external parties from crediting positions to the vault. Once those shares landed in soUSDC's balance, totalAssets() counted them. It iterates every market in the withdrawal queue and reads the vault's actual share balance in each one, with no check on whether the position was voluntarily entered. Combined with the oracle gap, each attack loop worked like this: 1. Flash-loan USDC. 2. Deposit the bulk of USDC to soUSDC, which routes it to an existing market and mints soUSDC shares to the attacker. 3. Deposit a small amount of USDC to the wstUSR market directly, donate the shares to soUSDC. 4. Borrow that USDC back using cheap wstUSR as collateral at the inflated oracle price. 5. Redeem the soUSDC shares. soUSDC's totalAssets() now includes the gifted position, so the attacker's shares are worth more than when they deposited. Combined with the borrow proceeds, this covers the flashloan repayment. 6. Walk away with a small profit. wstUSR stays locked as collateral permanently. Each loop was limited by how much wstUSR the attacker had, so between loops they kept buying more on the open market. That pressure drove wstUSR from ~$0.12 to ~$0.75. The loop ran 32 times over ~75 minutes. Silo's allocator noticed and called reallocate() to move the remaining 154k to an idle holding vault. It didn't help. The idle vault was in soUSDC's withdrawal queue. Each flashloan loop inflated soUSDC's book value by depositing to the wstUSR market, but that market had nothing liquid to withdraw since it was immediately borrowed out. So soUSDC pulled the shortfall from the idle vault every single time. 154k gone in 40 seconds across 20 transactions. soUSDC depositors are now exposed to ~392k of undercollateralised debt at 100% utilisation. What could Silo have done? The oracle used by the wstUSR market is hardcoded as immutable in the SiloConfig contract. The only option available was removing the wstUSR market from soUSDC's withdrawal queue before anyone exploited it. That process requires three steps, each behind the vault's 48h timelock: enable the market with a nominal cap, set the cap back to 0, submit removal and wait for it to finalise. Six days total. They didn't start it. What can they do now? They can still run that same six-day process. It won't recover the 392k, but it prevents a repeat. They should also remove the soUSDC vault from the UI to prevent new deposits. SiloVault is forked from @Morpho's MetaMorpho contract (Silo's own source code says `Forked with gratitude from Morpho Labs`). Any MetaMorpho/SiloVault-style vault that (1) counts externally credited market balances in totalAssets(), (2) leaves the toxic market in the withdraw queue, and (3) relies on a stale or structurally incomplete pricing path can be exposed to this same class of attack. Example exploit tx: arbiscan.io/tx/0xd354389e6… Exploiter: debank.com/profile/0x8170… soUSDC Vault: v2.silo.finance/vaults/arbitru… wstUSR market: v2.silo.finance/markets/arbitr… Failed rescue tx: arbiscan.io/tx/0x3235decc8… Oracle: #readContract" target="_blank" rel="nofollow noopener">arbiscan.io/address/0x6BC7…

English
3
0
5
2.8K
Mid
Mid@Elmidou·
@HubertX13 @ResolvLabs How much do you estimate for loss of collateral pool? Why would Gauntlet get anything if their illicit USR were bought by their own automation after the exploit?
English
1
0
12
444
Hubirb 🐘👀
Hubirb 🐘👀@HubertX13·
After gathering thoughts from various parties at ETHCC, here is my take on the options available to @ResolvLabs regarding their recent $USR hack. For me it’s very clear, there are two paths going forward: 1/ Resolv reduces $RLP value by the loss in collateral pool and uses treasury funds to partially compensate Fluid and Gauntlet for their USR bad debt. In this case, pretty much no end user will loose anything since fluid has repaid already, and anyway both gauntlet and fluid committed to repay right after the hack so it’s their word on the line. After that, new USR token and Resolv is back in business. 2/ Resolv repays fluid’s and gauntlet’s USR bad debts. RLP takes a significant hit, this creates an additional few millions of bad debt increasing even more the whole. Fluid is happy as they can replenish their treasury. Gauntlet is half happy half rekt because of the RLP bad debt generated. Tons of end users get rekt. Resolv then shut down as nobody will ever allocate funds to RLP again. Probably possible to get an exit door at Fluid. As an investor in Resolv, I would very much prefer if the team would decide to go the option 1 route (which is btw the most solid one from a legal standpoint). Hopefully there is a path towards rebuilding a successful Resolv.
English
4
6
21
3.9K
Mid
Mid@Elmidou·
Update: Resolv investor wants Resolv Labs to misappropriate RLP assets for the benefit of Fluid and Gauntlet. The intrigue thickens. x.com/hubertx13/stat…
Hubirb 🐘👀@HubertX13

After gathering thoughts from various parties at ETHCC, here is my take on the options available to @ResolvLabs regarding their recent $USR hack. For me it’s very clear, there are two paths going forward: 1/ Resolv reduces $RLP value by the loss in collateral pool and uses treasury funds to partially compensate Fluid and Gauntlet for their USR bad debt. In this case, pretty much no end user will loose anything since fluid has repaid already, and anyway both gauntlet and fluid committed to repay right after the hack so it’s their word on the line. After that, new USR token and Resolv is back in business. 2/ Resolv repays fluid’s and gauntlet’s USR bad debts. RLP takes a significant hit, this creates an additional few millions of bad debt increasing even more the whole. Fluid is happy as they can replenish their treasury. Gauntlet is half happy half rekt because of the RLP bad debt generated. Tons of end users get rekt. Resolv then shut down as nobody will ever allocate funds to RLP again. Probably possible to get an exit door at Fluid. As an investor in Resolv, I would very much prefer if the team would decide to go the option 1 route (which is btw the most solid one from a legal standpoint). Hopefully there is a path towards rebuilding a successful Resolv.

English
1
0
4
458
Mid
Mid@Elmidou·
Time to put some cash aside
George Goncalves@bondstrategist

Macro Podcast Palooza (March 2026 Edition) I don’t hear/see it all, but I listen to a lot podcasts... A list of some insightful reporting from the past month… 1.) The AI Boom Is Hiding A Sick Economy | Eric Basmajian @EPBResearch youtube.com/watch?v=VlvNsq… 2.) This Is Your Last Exit | Edward Dowd @DowdEdward with Michelle Makori @MichelleMakori youtube.com/watch?v=spqjpw… 3.) It’s Only Going To Get Worse | Jeffrey Gundlach @TruthGundlach with Julia La Roche @JuliaLaRoche youtube.com/watch?v=d8sPQo… 4.) The Worst Crisis in 30 years | Luke Gromen @LukeGromen & Grant Williams @ttmygh with Jay Martin @JayMartinBC youtube.com/watch?v=eKJco-… 5.) Fed Must Act Now | Danielle DiMartino Booth @DiMartinoBooth with David Lin @davidlin_TV youtube.com/watch?v=nhPjOZ…

English
0
0
4
281