Skip to content

Smart Contract Vulnerabilities (SCV) List

License

Notifications You must be signed in to change notification settings

sachinbal/SCV-List

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

23 Commits
 
 
 
 
 
 
 
 

Repository files navigation

SCV-List

This list highlights the accomplishments and disclosed vulnerabilities of the top white hat security experts in DeFi.

This list is part HackerOne leaderboard and part CVE database. Contributions are welcome and it would be amazing if the crypto community could crowdsource a CVE-like database. My arbitrary rules to include a vulnerability in this list (until I am convinced otherwise) is that the vulnerability must be discovered on mainnet (meaning most audit findings are excluded) and it must not have resulted in intentional loss of user funds (meaning most rekt.news hacks are excluded).

So far, the sources of this list include postmortems from:

Additional submissions to fill in gaps are welcome.

What about common code weaknesses?

This list only includes actual vulnerabilities. There are CWE-like lists that exist to capture common weaknesses in code, including these lists:

What about hacks that cause protocols to get rekt?

This list does not include black hat hacks which involved user loss of funds, even if the funds are returned. There are other lists for that, including these lists:

What about Layer 1 blockchain vulns

This list is focused on smart contract vulnerabilities. Some layer 1 vulnerabilities may be included below, but there are separate lists for this topic

Contributions

Contributions are very welcome. This list is guaranteed to be incomplete.

This markdown table format is weird...

Yes, it renders weird on github, but you can view the markdown in your own local markdown editor instead of github. Or you can search for a web-based markdown-to-csv converter and copy the data to a spreadsheet.

Smart Contract Vulnerabilities Table

Date Protocol Name Blockchain Vulnerability Description Writeup Link Additional Links Total Value at Risk Whitehat Bounty Award Vulnerability ID
11/29/22 Uniswap ETH Reentrancy vulnerability in new UniversalRouter could allow an ERC721 callback to sweep funds sitting in the router from a previous unfinished transaction https://media.dedaub.com/uniswap-bug-bounty-1625d8ff04ae Dedaub $40,000.00
11/02/22 Oasis DAO ETH A specific call flow allows for delegatecall to call selfdestruct which would shut down the Oasis Earn platform https://www.trustindistrust.com/post/taking-home-a-20k-bounty-with-oasis-platform-shutdown-vulnerability trust_90 $20,000.00
11/01/22 Curve ETH Bribes were allocated based on a user's locked amount of CRV rather than allocating based on their veCRV balance. VeCRV balance decays over time but locked CRV does not. https://github.com/yearn/yearn-security/blob/master/disclosures/2022-11-01.md Yearn
10/18/22 Mai Finance ETH Same get_virtual_price read-only reentrancy vulnerability that ChainSecurity discovered, but this time found in QiDao’s vault integration with Curve. Price manipulation would allow theft of funds and leave the protocol with bad debt https://ambergroup.medium.com/mai-finances-oracle-manipulation-vulnerability-explained-55e4b5cc2b82 Amber Group
10/14/22 Bunni ETH The first deposit into a new pool can be frontrun by 1. depositing 1 wei into the protocol 2. depositing into the underlying pool in Uniswap and sending LP tokens directly to the protocol. This results in the protocol not providing the second depositer with any shares, and the first depositor can withdraw the first two deposits with the shares they own. https://www.rileyholterhus.com/writing/bunni rileyholterhus
09/26/22 OpenSea ETH https://twitter.com/hacker_/status/1574518042737790976 hacker_ $100,050.00
09/25/22 88mph ETH Deposits could be withdrawn before the maturity date because the deposit process did not update the rewardPerToken variable, allowing theft of yield https://medium.com/immunefi/88mph-theft-of-unclaimed-mph-rewards-bugfix-review-1dec98b9956b 0xSzeth $21,000.00
09/21/22 Mt Pelerin ETH Function did not check if input array contained duplicate values. This allowed a user to submit an array of duplicate actions and the action would be performed multiple times because there were insufficient checks. https://medium.com/immunefi/mt-pelerin-double-transaction-bugfix-review-503838db3d70 $10,000.00
09/20/22 Arbitrum Nitro ETH Uninitialized proxy. The proxy was initialized, but the values were wiped and sequencerInbox was never rewritten. Initialize could be called to set key bridge variables and steal bridge funds. https://medium.com/@0xriptide/hackers-in-arbitrums-inbox-ca23272641a2 0xriptide $560,000.00
09/09/22 Solidly V1 ETH Several vulnerabilities exist in Solidly V1 and Solidex. Denial of service is possible in multiple ways and other attacks that can remove value from the protocol are also described. https://medium.com/@seraph333/security-disclosures-and-recent-attacks-on-solidly-v1-ab7dc47558c5
09/08/22 Abracadabra AVAX The Native Asset precompile contract on Avalanche C-Chain allows delegatecall-like ability to pass original msg.sender in a call to another contract. This could be used to bypass a blacklist check that prevents calls from certain contracts. https://mirror.xyz/0x5744b051845B62D6f5B6Db095cc428bCbBBAc6F9/zRO5HegkDEHG1NEnM3h-am79Pf5RlERhHNsiI1CiFts https://medium.com/avalancheavax/apricot-phase-6-native-asset-call-deprecation-a7b7a77b850a $3,000,000.00 Statemind
09/08/22 OpenSea ETH Due to using the quotient of a division operation instead of the remainder, a memory overwrite vulnerability in a loop could overwrite a word at the end of an array https://blocksecteam.medium.com/a-new-memory-overwrite-vulnerability-discovered-in-wyvern-protocol-5285996c297d Blocksec
09/06/22 Yearn Finance ETH Yearn Vaults on ETH POW forks that use the same chainId and a DOMAIN_SEPARATOR value that is calculated at contract deployment are vulnerable to replay attacks. https://github.com/yearn/yearn-security/blob/master/disclosures/2022-09-06.md
09/03/22 Notional ETH https://twitter.com/NotionalFinance/status/1566089211068948480 $1,500,000.00 $150,000.00
08/24/22 Across Bridge double spend was possible due to off-chain relayer bug https://iosiro.com/blog/high-risk-bug-disclosure-across-bridge-double-spend Jason Matthyser $90,000.00
08/14/22 Moonwell Moonbeam Depegged assets were still valued at $1 by the protocol, which could have caused the protocol to accrue large amounts of bad debt. https://medium.com/risk-dao/the-risk-of-secondary-markets-for-depegged-collateral-tokens-moonwell-bug-disclosure-2021181f50bc Risk DAO $10,000.00
08/13/22 Talent Protocol MATIC Public function without access controls set the protocol token address, enabling a rogue ERC20 contract to freeze contract funds https://mirror.xyz/0xCf39521413F8De389771e35bB4C77b4bb827b7B3/HdSq7TVvk-s7DzQgN3u0pV8UFiVkaDft18HgmePTag4 $465,000.00 kebabsec
08/05/22 Yield Protocol Arbitrum Code was copied from a similar function resulting in an incorrectly implemented function. The fix during the post-audit remediation did not correctly consider the contract inheritance and allowed for contract funds to be drained https://medium.com/yield-protocol/post-mortem-of-incident-on-august-5th-2022-7bb70dbb9ada $206,000.00
07/25/22 Velas chain Velas Similar to pwning.eth Moonbeam and Aurora bugs, combines delegatecall with precompiled contracts on different blockchains that didn’t consider this edge case https://mirror.xyz/orenyomtov.eth/RbV_WYYTPCAObp3VsNlkgx6iQBElwulGQf586lVK7dE orenyomtov.eth $100,000.00
07/14/22 Sherlock ETH Cross-protocol reentrancy. 1inch swap callback enables reentrancy to modify exchange rate on Euler which changes the redemption amount from staking with Sherlock. https://mirror.xyz/0xE400820f3D60d77a3EC8018d44366ed0d334f93C/LOZF1YBcH1eBdxlC6HP223cAMeTpNgQ-Kc4EjQuxmGA GothicShanon89238 $250,000.00
07/07/22 Yield Protocol ETH Deprecated strategy roll-over process had a security issue but no value at risk https://twitter.com/yield/status/1545119888309567489 $0.00 $10,000.00
07/01/22 Interlay DOT interBTC bridge had two bugs that could 1. force liquidation of vaults 2. insecure address extraction for P2SH addresses allows for address spoofing https://pwning.mirror.xyz/jlT8OgtwN3mQf3KdYmXdcSXbE4s95JzT3eR3wxiLmpw https://medium.com/interlay/kintsugi-released-urgent-security-patches-aebf969ee087 pwning.eth $200,000.00
06/28/22 Moonbeam DOT Improper truncation during type conversation leads to different interpretations of a single value https://pwning.mirror.xyz/RFNTSouIIlHVNmTNDThUVb1obIeN5c1LAiQuN9Ve-ok https://moonbeam.network/blog/security-patch-for-integer-truncation-bug/ pwning.eth $1,000,000.00 CVE-2022-31111
06/16/22 Aurora NEAR A serialized payload could be crafted that would deserialize to a valid transaction. This allowed spoofing of Aurora token burns and the withdrawal of funds from the bridge. https://medium.com/immunefi/aurora-withdrawal-logic-error-bugfix-review-c5b4e30a9160 $62,935,870.00 Anon $1,000,000.00
06/10/22 Aurora NEAR Improper input sanitization allowed arbitrary inputs for the args value, which is fully controlled by user input. This value sets a recipient and fee, which used bad logic to handle these values and can result in draining of funds in a non-zero fee case. https://medium.com/immunefi/aurora-improper-input-sanitization-bugfix-review-a9376dac046f Anon $1,000,000.00
05/27/22 Moonbeam DOT A 2-part vulnerability. Precompiled contracts did not differentiate between call and delegatecall. This allowed for a malicious contract to be created to drain funds on incoming callers and the contract address could be provided to specific smart contracts that made calls to a user provided address (lack of user input validation) https://medium.com/immunefi/moonbeam-missing-call-check-bugfix-review-6279d609bdc5 https://pwning.mirror.xyz/okyEG4lahAuR81IMabYL5aUdvAsZ8cRCbYBXh8RHFuE $100,000,000.00 pwning.eth $1,050,000.00
05/27/22 Reality.eth ETH A honeypot containing 20k was vulnerable because a proposal will pass if it is not vetoed within 24 hours by the multisig https://hackmd.io/g0txop3tTfGxcNKxn4z4Jg isaacpatka $20,000.00
05/23/22 Agave ETH Uninitialized proxy, duplicate of Aave V2 uninitialized proxy because of forked code https://medium.com/@hacxyk/forked-protocols-are-not-battle-tested-agave-uninitialized-proxy-vulnerability-6b5d587b3a07 Hacxyk $25,000.00
05/15/22 Balancer ETH Double entry point tokens (e.g., SNX and sBTC) can cause a DoS condition, caused by the pool thinking it has more tokens than it actually does https://forum.balancer.fi/t/medium-severity-bug-found/3161 https://medium.com/immunefi/balancer-dos-bugfix-review-8a8ba5d971bf shw9453, gpersoon, k_besic $50,000.00
05/02/22 Sturdy ETH Weak fallback oracle in lending pool uses pool spot price, which can be manipulated to profit from price manipulation https://medium.com/@nnez/0-0-a-misconfiguration-leading-to-missing-funds-51d4b9e5f96a $3,000,000.00 nnez $100,000.00
05/02/22 Synthetix ETH A logic bug where the wrong amount variable was used. An amount variable that did not consider current debt was used, which is a larger value than the actual amount when non-zero debt exists https://medium.com/immunefi/synthetix-logic-error-bugfix-review-40da0ead5f4f thunderdeep14 $150,000.00
04/26/22 Aurora NEAR Infinite spend in bridge between ETH and NEAR blockchains https://medium.com/immunefi/aurora-infinite-spend-bugfix-review-6m-payout-e635d24273d https://aurora.dev/blog/aurora-mitigates-its-inflation-vulnerability, https://pwning.mirror.xyz/CB4XUkbJVwPo7CaRwRmCApaP2DMjPQccW-NOcCwQlAs $200,000,000.00 pwning.eth $6,000,000
04/23/22 Strips Finance Arbitrum Poorly configuration liquidation configuration allowed for manipulating the rate (the equivalent of spot price manipulation for this perpetual) to create an arbitrage opportunity with the protocol’s perpetuals https://medium.com/amber-group/strips-finances-price-manipulation-vulnerability-explained-f912734a8a2 $3,500,000.00 Amber Group $30,000
04/22/22 Sense Finance ETH Missing access controls. A function that set oracle data values could be called by anyone. https://medium.com/immunefi/sense-finance-access-control-issue-bugfix-review-32e0c806b1a0 https://medium.com/sensefinance/disclosure-fixing-a-critical-bug-in-the-sense-space-oracle-42a0bed65bc2 Violet Vienhage $50,000
04/14/22 Curve ETH Read-only reentrancy can manipulate the get_virtual_price view function return value. Other protocols were trusting this view function blindly as a price feed even though it could be manipulated by a factor of 2 or greater. https://chainsecurity.com/curve-lp-oracle-manipulation-post-mortem/ https://forum.makerdao.com/t/curve-lp-token-oracle-manipulation-vulnerability-technical-postmortem/18009, https://chainsecurity.com/heartbreaks-curve-lp-oracles/
04/13/22 Solidly V1 FTM Depositing or withdrawing frequently from a gauge increases the rewards received, so all rewards can be drained with spam deposits and withdrawal actions for small amounts belbix/solidly#1 belbix
04/07/22 Aave ETH Aave fallback oracle had no access controls on the setPrice function, allowing an arbitrary price to be set if the fallback oracle was ever used. Production fallback oracle contract is identical to the mock PriceOracle code and may have been an accidental deployment. https://medium.com/@hacxyk/aave-v3s-price-oracle-manipulation-vulnerability-168e44e9e374 $2,900,000,000.00 Hacxyk $50,000.00
04/06/22 Rari Capital ETH Uniswap V3 oracle manipulation was possible because a pool with only $1k liquidity was used https://medium.com/@hacxyk/we-rescued-4m-from-rari-capital-but-was-it-worth-it-39366d4d1812 $4,000,000.00 Hacxyk $10,000.00
04/06/22 ENS ETH ENS did not properly filter spoofed domains with 1. homograph characters 2. uppercase letters 3. period in them https://medium.com/@hacxyk/how-we-spoofed-ens-domains-52acea2079f6 Hacxyk $15,000.00
04/06/22 ENS ETH Null characters are silently discarded, so strings with null characters look identical to strings without null characters https://twitter.com/ENS_DAO/status/1516220205168754688?cxt=HHwWgIDUpcmP2YoqAAAA https://twitter.com/lcfr_eth/status/1516255494071062528 lcfr_eth $45,000.00
03/29/22 Port Finance SOL Logic error made it possible to create undercollateralized positions and steal value from the protocol https://medium.com/immunefi/port-finance-logic-error-bugfix-review-29767aced446 $25,000,000.00 nojob $630,000.00
03/25/22 Gearbox ETH Data is parsed differently by Uniswap and Gearbox, enabling parser confusion https://medium.com/@nnez/different-parsers-different-results-acecf84dfb0c https://github.com/Gearbox-protocol/security/blob/main/disclosures/2022-03-25%20-%20uniswapV3.md $10,000,000.00 nnez $150,000.00
03/21/22 ENS ETH Premium price for all ENS domains set to zero https://discuss.ens.domains/t/postmortem-ep9-deployment/11662 nicksdjohnson
03/21/22 Compound ETH The issue was a combination of TUSD token having two entrypoints controlling the same balances and the sweep function not having any access controls. Sweeping TUSD using the 2nd entrypoint would change the exchange rate which can allow the attacker to profit https://medium.com/chainsecurity/trueusd-compound-vulnerability-bc5b696d29e2 https://blog.openzeppelin.com/compound-tusd-integration-issue-retrospective/ $3,100,000 ChainSecurity
03/04/22 Convex ETH Expired vote-locked CVX could be relocked to a new address after the original lock expired, allowing excess cxvCRV rewards to be claimed https://convexfinance.medium.com/vote-locked-cvx-contract-migration-8546b3d9a38c Popcorn
03/03/22 Rari Capital ETH Cross-asset reentrancy was possible in all fuse pools that did not use upgraded cToken and Comptroller contract implementations. The old code used .call.value to transfer ETH, the new code uses .transfer. https://medium.com/@JackLongarzo/rari-capital-fuse-security-upgrade-report-e5d154c16250 samczsun, hritzdorf, and YSmaragdakis
02/28/22 dYdX ETH Gasless deposit can be abused to purchase gas tokens that can be sold. A maximum cap of 0.5 ETH limited the speed at which this can be abused. https://medium.com/@hacxyk/stealing-gas-from-dydx-0-5-eth-a-day-712c5fdc43a3 Hacxyk $25,000.00
02/24/22 Wormhole ETH Uninitialized proxy https://medium.com/immunefi/wormhole-uninitialized-proxy-bugfix-review-90250c41a43a satya0x $10,000,000.00
02/24/22 Solidex FTM When a transaction is finalized past the voting deadline, the votes become reset to their default state. This results in Solidex's own gauges receiving far too many votes. https://docs.solidexfinance.com/security/disclosures/2022-02-24
02/18/22 OpenSea ETH abi.encodePacked used with variable length inputs without domain separation could lead to hash collisions that result in theft of WETH from user wallets. 1 in 64 listings were vulnerable. https://nft.mirror.xyz/VdF3BYwuzXgLrJglw5xF6CHcQfAVbqeJVtueCr4BUzs Gus (anon) $3,000,000
02/02/22 Optimism ETH Calling selfdestruct creates new tokens out of thin air while destroyed contract retains balance https://optimismpbc.medium.com/disclosure-fixing-a-critical-bug-in-optimisms-geth-fork-a836ebdf7c94 https://www.saurik.com/optimism.html, https://github.com/ethereum-optimism/optimism/blob/master/technical-documents/postmortems/2022-02-02-inflation-vuln.md saurik $2,000,042
02/02/22 Solidly FTM veNFT double counting error https://twitter.com/AndreCronjeTech/status/1488883057654386695?cxt=HHwWjsCyuZTQyakpAAAA $200,000
01/30/22 Yearn Finance ETH, FTM Flashloan price manipulation of Balancer LP pool could lead to strategy buying stablecoin at inflated price https://github.com/yearn/yearn-security/blob/master/disclosures/2022-01-30.md https://twitter.com/bantg/status/1492225113286135809, https://medium.com/immunefi/nexus-mutual-bug-bounty-matching-program-pays-200-000-to-whitehat-4985d752dc46 $15,500,000 Anon $400,000
01/26/22 Ondo Finance ETH Uninitialized logic contract (the proxy contracts were initialized properly) allowed any user to initialize the contract and obtaining the access needed to call the destroy function to selfdestruct the contract. https://iosiro.com/blog/high-risk-vulnerability-disclosed-to-ondo-finance $0 @ashiqamien $25,000
01/24/22 ZORA ETH Infinite approval during NFT purchase can be attacked. A NFT bid could be frontrun by increasing NFT price to steal 100% of token held in bidder’s wallet https://zora.mirror.xyz/JeFZXnWb6jfJPon1rruXW-XJcoUVfgeNhu4XTYO3yFM 0x Protocol team $25,000
01/15/22 Polygon MATIC Polygon consensus mechanism could be broken, but a large amount of MATIC would have to be held for an extended period to carry out the attack https://medium.com/immunefi/polygon-consensus-bypass-bugfix-review-7076ce5047fe Niv Yehezkel $75,000
01/11/22 Redacted Cartel ETH Custom ERC20 implementation had an error in transferFrom function that improperly approved funds https://medium.com/immunefi/redacted-cartel-custom-approval-logic-bugfix-review-9b2d039ca2c5 https://twitter.com/redactedcartel/status/1482497480541544455 $3,000,000.00 Tommaso Pifferi $560,000
01/10/22 Multichain Multiple Fallback function in ERC20 tokens allow a phantom permit function to not revert, allowing unauthorized token transfer from accounts that have a non zero approval or allowance https://media.dedaub.com/phantom-functions-and-the-billion-dollar-no-op-c56f062ae49f https://medium.com/multichainorg/action-required-critical-vulnerability-for-six-tokens-6b3cbd22bfc0 $471,000,000 Dedaub $2,000,000
01/07/22 Notional ETH Internal accounting error https://medium.com/immunefi/notional-double-counting-free-collateral-bugfix-review-28b634903934 notional-finance/contracts-v2#92 $26,200,000 0x60511e57 $1,000,000
01/05/22 APWine ETH Incorrect check in delegation allows yield theft https://medium.com/immunefi/apwine-incorrect-check-of-delegations-bugfix-review-7e401a49c04f setuid0 $100,000
12/21/21 Cronos Cronos Theft of transaction fee for current block by receiving a gas refund when no gas was paid https://medium.com/immunefi/cronos-theft-of-transactions-fees-bugfix-postmortem-b33f941b9570 https://github.com/crypto-org-chain/cronos/security/advisories/GHSA-f854-hpxv-cw9r Rewards only, not original assets zb3 $40,000 CVE-2021-43839
12/14/21 Convex ETH Multisig could rugpull funds with majority 2 of 3 parties collaborating https://blog.openzeppelin.com/15-billion-rugpull-vulnerability-in-convex-finance-protocol-uncovered-and-resolved/ $15,000,000,000.00 OpenZeppelin
12/05/21 Polygon MATIC Bad signature check with ecrecover https://medium.com/immunefi/polygon-lack-of-balance-check-bugfix-postmortem-2-2m-bounty-64ec66c24c7d https://blog.polygon.technology/all-you-need-to-know-about-the-recent-network-upgrade/ $18,000,000,000 Leon Spacewalker $2,200,000
11/27/21 dYdX StarkWare L2 Low level call() with arbitrary inputs could be performed by untrusted parties. https://dydx.exchange/blog/deposit-proxy-post-mortem $2,000,000 Anon $500,000
11/17/21 Enzyme Finance ETH Drain funds using flashloan to manipulate contract internal calculations https://medium.com/immunefi/enzyme-finance-price-oracle-manipulation-bug-fix-postmortem-4e1f3d4201b5 $400,000 setuid0 $90,000
10/28/21 Aztec ETH Improper integer casting, improper value constraints for cryptographic operations https://hackmd.io/@aztec-network/disclosure-of-recent-vulnerabilities Xin Gao and Onur Kilic $50,000
10/27/21 Robo Vault ETH Flashloan price manipulation of Uniswap pool https://medium.com/@RoboVault/post-mortem-next-steps-3556820b7470 https://twitter.com/FP_Crypto/status/1453437385405046787 FP_Crypto
10/20/21 Harvest Finance ETH Uninitialized proxy https://medium.com/immunefi/harvest-finance-uninitialized-proxies-bug-fix-postmortem-ea5c0f7af96b $6,400,000 Dedaub $200,000
10/05/21 RocketPool ETH A malicious node can frontrun an ETH deposit to take ETH from the protocol’s ETH deposit. https://medium.com/immunefi/rocketpool-lido-frontrunning-bug-fix-postmortem-e701f26d7971 https://twitter.com/rocket_pool/status/1446300700661583876?s=21 Unclear Dmitri Tsumak $100,000
10/05/21 Lido Finance ETH A malicious node can frontrun an ETH deposit to take ETH from the protocol’s ETH deposit. https://medium.com/immunefi/rocketpool-lido-frontrunning-bug-fix-postmortem-e701f26d7971 Unclear Dmitri Tsumak $100,000
10/05/21 Polygon MATIC Double spend bridge vulnerability https://medium.com/immunefi/polygon-double-spend-bug-fix-postmortem-2m-bounty-5a1db09db7f1 $850,000,000 Gerhard Wegnar $2,000,000
09/02/21 OpenZeppelin ETH Reentrancy vulnerability in OpenZeppelin TimelockController contract https://medium.com/immunefi/openzeppelin-bug-fix-postmortem-66d8c89ed166 https://github.com/OpenZeppelin/openzeppelin-contracts/commit/cec4f2ef57495d8b1742d62846da212515d99dd5#diff-8229f9027848871a1706845a5a84fa3e6591445cfac6e16cfb7d652e91e8d395R307 Unknown zb3 $25,000
08/16/21 SushiSwap ETH Reusing msg.value in a loop allows payment to be reused multiple times https://samczsun.com/two-rights-might-make-a-wrong/ https://hackmd.io/@353yQn6WTImF5o12LQXXfQ/Hy2ZDYFxF, https://blog.trailofbits.com/2021/12/16/detecting-miso-and-opyns-msg-value-reuse-vulnerability-with-slither/, https://twitter.com/josephdelong/status/1431314816698916865 $350,000,000 @samczsun $1,000,000
08/15/21 Dexfolio BSC Reentrancy vulnerability that could be exploited with a custom ERC20 contract to double count staked tokens https://medium.com/amber-group/dexfolios-re-entrancy-loophole-explained-3bd3fecc29e2 Lucash-dev and Amber Group $1000
08/14/21 Curve Bribe ETH https://twitter.com/bantg/status/1426629982328180737 $118,000 @bantg Unknown
08/13/21 ENS Name Wrapper ETH ERC-1155 callback function reentrancy https://samczsun.com/the-dangers-of-surprising-code/#ens-name-wrapper @samczsun
08/10/21 Belt Finance BSC Bypass of internal balance calculation by sending tokens directly to contract https://medium.com/immunefi/belt-finance-logic-error-bug-fix-postmortem-39308a158291 $60,000,000 @bobface16 $1,050,000
08/01/21 xDai Stake xDAI Tokens accidentally sent to bridge contract can be stolen https://medium.com/immunefi/xdai-stake-arbitrary-call-method-bug-postmortem-f80a90ac56e3 $4.50 0xadee028d $5,000
07/31/21 Tidal Finance MATIC Uninitialized or unset rewardDebt variable defaults to zero, allowing free unearned reward https://medium.com/immunefi/tidal-finance-logic-error-bug-fix-postmortem-3607d8b7ed1f https://github.com/TidalFinance/tidal-contracts/commit/924e87f1aead70abb17760c839b53ba40d80bf2c#diff-46a924754f71a2f8be88d0f20295f40653c881426d64b90e8bdd4f4bed303368 Unclear Csanuragjain $25,000
07/30/21 Teller ETH Uninitialized proxy https://medium.com/immunefi/teller-bug-fix-postmorten-and-bug-bounty-launch-b3f67a65c5ac $1,000,000 Bugdefeat $50,000
06/29/21 Yearn Finance ETH Flashloan of zero value bypassed safety checks and could result in liquidation of strategy’s debt position https://github.com/yearn/yearn-security/blob/master/disclosures/2021-06-29.md xyzaudits $200,000
06/16/21 Alchemix ETH Unprotected functions could lead to frontrunning and denial of service https://medium.com/immunefi/alchemix-access-control-bug-fix-debrief-a13d39b9f2e0 $300 @ashiqamien $7,500
06/14/21 MCDEX Arbitrum Contract does not validate user-provided contract address input parameter, allowing a user to craft a malicious contract. https://medium.com/immunefi/mcdex-insufficient-validation-bug-fix-postmortem-182fc6cab899 Unclear Lucash-dev $50,000
06/13/21 Cream Finance ETH Old contract allow users to receive liquidity mining rewards without participating in liquidity mining. https://medium.com/immunefi/cream-finance-insufficient-validation-bug-fix-postmortem-1ec7248e8865 $100,000 Azeem $20,750
06/09/21 Zapper ETH Low level call() with user-provided inputs could steal LP tokens https://medium.com/immunefi/zapper-arbitrary-call-data-bug-fix-postmortem-d75a4a076ae9 https://medium.com/zapper-protocol/post-mortem-sushiswap-uniswap-v2-zap-out-exploit-84e5d34603f0 Unclear Lucash-dev $25,000
06/08/21 Mushrooms Finance ETH Flashloan function is missing an authorization check that allows any user to call the function. https://medium.com/immunefi/mushrooms-finance-logic-error-bug-fix-postmortem-780122821621 $635,000 ckksec $60,000
06/07/21 88mph ETH Unprotected init() function was missing onlyOwner modifier https://medium.com/immunefi/88mph-function-initialization-bug-fix-postmortem-c3a2282894d3 $6,500,000 @ashiqamien $42,069
05/13/21 Fei Protocol ETH Flashloan price manipulation of Uniswap pool https://medium.com/immunefi/fei-protocol-flashloan-vulnerability-postmortem-7c5dc001affb https://medium.com/fei-protocol/fei-bonding-curve-bug-post-mortem-98d2c6f271e9 $240,000,000 @bobface16 $800,000
05/08/21 Meebit NFTs Brute force attack to mint rare Meetbits NFTs https://iphelix.medium.com/meebit-nft-exploit-analysis-c9417b804f89
04/27/21 PancakeSwap BSC Lottery ticket NFT can be redeemed multiple times because first redemption doesn’t invalidate ticket. https://medium.com/immunefi/pancakeswap-logic-error-bug-fix-postmortem-f2d02adb6983 $700,000 Juno
04/27/21 Mushrooms Finance ETH MEV attack can steal yield https://medium.com/immunefi/mushrooms-finance-theft-of-yield-bug-fix-postmortem-16bd6961388f Unclear Wen-Ding Li $4,000
04/26/21 SharedStake ETH Low level call() with user-provided inputs could extract timelocked funds https://medium.com/immunefi/sharedstake-insider-exploit-postmortem-17fa93d5c90e $40,000,000 Lucash-dev $5,000
04/06/21 Fei Protocol ETH A combination of Uniswap function calls and Fei incentive calculations around maintaining peg allow a user to receive free WETH https://medium.com/immunefi/fei-protocol-vulnerability-postmortem-483f9a7e6ad1 $5,640,000 0xRevert $300,000
04/05/21 Ambisafe ETH Transferring ownership grants ownership to sender and receiver at the same time, allowing receiver to steal tokens https://samczsun.com/uncovering-a-four-year-old-bug/ @samczsun
03/26/21 ElasticDAO ETH Missing authorization allowed excess token minting https://medium.com/elasticdao/elasticdao-smart-contract-and-security-audits-400f424281b6 $5,000,000 @samczsun
03/16/21 Vesper ETH Drain funds using flashloan price manipulation of Uniswap pool https://medium.com/immunefi/vesper-rebase-vulnerability-postmortem-and-bug-bounty-55354a49d184 https://medium.com/dedaub/yield-skimming-forcing-bad-swaps-on-yield-farming-397361fd7c72 $310,000 Dedaub Unclear
03/11/21 Sovryn RSK User could take out a loan using another party’s collateral, allowing theft of the “borrowed” funds https://medium.com/immunefi/sovryn-loan-vulnerability-postmortem-ffaf4d1d688f $6,800 Whitehat Turbo $76,568
02/26/21 Tokenlon ETH Signature verification does not properly handle zero address https://tokenlon.medium.com/tokenlon-4-0-fee-incident-disclosure-9ee8b5fad564 $750,000 @samczsun $50,000
02/22/21 PancakeSwap BSC User can frontrun the winning lottery ticket selection and buy the winning lottery ticket https://medium.com/immunefi/pancakeswap-lottery-vulnerability-postmortem-and-bug-4febdb1d2400 $240,000 Thunder Unclear
02/21/21 Primitive Finance ETH Flashloan with a Uniswap pool containing an attacker-controlled token and abuse infinite allowance to steal funds https://primitivefinance.medium.com/postmortem-on-the-primitive-finance-whitehack-of-february-21st-2021-17446c0f3122 https://medium.com/immunefi/inside-the-war-room-that-saved-primitive-finance-6509e2188c86 $1,300,000 Dedaub $188,000
02/21/21 Hashmasks ETH ERC721 _safeMint callback reentrancy allows more NFTs to be minted than expected https://samczsun.com/the-dangers-of-surprising-code/#hashmasks https://thehashmasks.medium.com/hashmask-art-sale-bug-report-13ccd66b55d7 19 hashmasks @samczsun $12,500
02/15/21 NFTX ETH Internal accounting error allows multiple NFTs to be associated with the same custom ERC20 https://forum.nftx.org/t/retroactive-bug-bounty/161 @samczsun $50,000
02/09/21 Charged Particles ETH A user could sell their NFT but still maintain possession of the NFT after the sale using a malicious contract. https://medium.com/immunefi/charged-particles-griefing-bug-fix-postmortem-d2791e49a66b https://github.com/Charged-Particles/charged-particles-universe/commit/f4fb60e3f791c1bb3b8907276b27d0319ce46a68#diff-91fca72e3021a185238dd0e82e118ae3ab5993db93dd322d301c665ff74e3eed Unclear unsafe_call $5,000
02/09/21 ForTube ETH Authorization bypass by creating fake ERC20 Ftoken https://medium.com/the-force-protocol/fortube-security-vulnerability-fix-c5847359ba7d @samczsun
01/30/21 ArmorFi ETH Internal accounting error caused by extra 10**18 multiplier https://medium.com/immunefi/armorfi-bug-bounty-postmortem-cf46eb650b38 Unclear @bobface16 $876,000
01/16/21 Yearn Finance ETH Internal accounting error resulted in incorrect share price calculation https://github.com/yearn/yearn-security/blob/master/disclosures/2021-01-17.md
01/09/21 Optimism ethereum-optimism/contracts#172 ethereum-optimism/contracts#179, ethereum-optimism/contracts#181, ethereum-optimism/contracts#364, ethereum-optimism/contracts#360 @samczsun
12/04/20 Aave ETH Uninitialized proxy for Aave V2 LendingPool proxy https://medium.com/aave/aave-security-newsletter-546bf964689d https://blog.trailofbits.com/2020/12/16/breaking-aave-upgradeability/ None Josselin Feist $25,000.00
12/03/20 Frax Finance FraxFinance/frax-solidity#12 FraxFinance/frax-solidity#7 @samczsun
10/30/20 Yearn Finance ETH Flashloan price manipulation from missing slippage protection when earn() function is called https://github.com/yearn/yearn-security/blob/master/disclosures/2020-10-30.md $650,000 Wen-Ding Li
10/12/20 Yield Protocol yieldprotocol/fyDai#360 @samczsun
10/10/20 Alpha Homora ETH Opening a position when LP price is skewed and lowering the price after the position is opened can allow the position to be liquidated by a user, who would profit 5% of position value https://blog.alphafinance.io/alpha-homora-adjustments/ @samczsun
10/10/20 Yearn Finance ETH The address input parameter for the deposit function is not validated, so a fake gauge contract can be provided https://github.com/yearn/yearn-security/blob/master/disclosures/2020-10-10.md $20,000 Emiliano Bonassi
10/03/20 Aavegotchi Staking aavegotchi/ghst-staking#2 @samczsun
09/25/20 Incognito Chain ETH No validation check around token duplicating, allowing for double spend https://we.incognito.org/t/how-a-smart-contract-vulnerability-was-discovered-and-fixed/6416 $2,690,000 @samczsun
09/25/20 Yearn Finance ETH Earn function can run out of gas before completing fully, which alters the share price and can lead to buying the dip with a flashloan https://github.com/yearn/yearn-security/blob/master/disclosures/2020-09-25.md Andre Cronje
09/15/20 Lien Finance https://samczsun.com/escaping-the-dark-forest/ @samczsun
08/21/20 xTokens ETH Flashloan price manipulation of Uniswap pool https://medium.com/xtoken/xsnxa-false-start-post-mortem-f26a7a735383 @samczsun
07/25/20 yVault https://blog.trailofbits.com/2020/08/05/accidentally-stepping-on-a-defi-lego/ $400,000 @samczsun
06/21/20 Atomic Loans https://web.archive.org/web/20200926093030/https://atomic.loans/blog/vulnerability-disclosure-and-pause-new-loan-requests/ @samczsun
06/18/20 Bancor ETH safeTransferFrom does not validate message sender is authorized to spend “from” address funds, so funds can be stolen from addresses with non-zero allowance https://zengo.com/bancor-smart-contracts-vulnerability-its-not-over/ $460,000
03/26/20 Synthetix https://blog.synthetix.io/bug-disclosure @samczsun
02/20/20 Nexus Mutual https://medium.com/nexus-mutual/responsible-vulnerability-disclosure-ece3fe3bcefa @samczsun $5,000
02/18/20 Nexus Mutual https://medium.com/nexus-mutual/responsible-vulnerability-disclosure-ece3fe3bcefa Mudhit Gupta $2,000
02/17/20 Authereum https://medium.com/authereum/account-vulnerability-disclosure-ec9e288c6a24 @samczsun
02/09/20 Aragon Court https://web.archive.org/web/20210306232055/https://blog.aragon.one/aragon-court-v1-upgrades/ @samczsun
01/25/20 Curve Finance https://web.archive.org/web/20220525040546/https://blog.curve.fi/vulnerability-disclosure/ @samczsun
11/08/19 ENS https://medium.com/the-ethereum-name-service/lets-talk-ens-migration-a92d5c21df28 @samczsun CVE-2020–5232
10/17/19 Cheese Wizards https://medium.com/dapperlabs/disclosure-forking-cheeze-wizards-smart-contracts-all-funds-and-wizards-are-secure-3c53af5bc531 @samczsun
09/18/19 Hydro Protocol https://medium.com/ddex/fixed-potential-vulnerability-in-contract-used-during-private-beta-217c0ed6f694 @samczsun
09/13/19 Kyber Network https://blog.kyber.network/anatomy-of-a-bridge-reserve-smart-contract-vulnerability-and-how-we-fixed-it-fc5c50d13238 @samczsun
09/03/19 bZx Protocol https://medium.com/@b0xNet/your-funds-are-safe-d35826fe9a87 @samczsun
07/29/19 Livepeer https://forum.livepeer.org/t/protocol-paused-for-bug-fix-upgrade-7-29-19-4-21pm-edt-update-protocol-resumed-as-of-8-40pm-edt/841 @samczsun
07/12/19 0x Exchange https://samczsun.com/the-0x-vulnerability-explained/ @samczsun

About

Smart Contract Vulnerabilities (SCV) List

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published