News Security Research
Categories
Launch App
Category Archive

News

The Drift Exploit: When the Admin Key Is the Vulnerability
News Security Cases

The Drift Exploit: When the Admin Key Is the Vulnerability

$280 million was drained from Drift Protocol on April 1 — not through a smart contract bug, not through a compromised seed phrase, but through a weeks-long operation that obtained two signatures from a five-member admin council and used them to seize complete protocol control. This is the admin key problem, executed at its logical extreme.

Apr 3, 2026
Q1 2026: $501 Million Lost. $21,912 Recovered. What the Data Says About Where the Risk Lives.
News Security Research

Q1 2026: $501 Million Lost. $21,912 Recovered. What the Data Says About Where the Risk Lives.

CertiK's Q1 2026 report closes the quarter at $501 million in confirmed losses across 145 incidents, with a recovery rate of 0.04%. The numbers are lower than Q1 2025 — but only because last year included a $1.4 billion outlier. Strip that out and the picture is considerably less reassuring.

Apr 1, 2026
When the Corporate Entity Becomes the Liability: The Balancer Labs Shutdown
News Security Cases

When the Corporate Entity Becomes the Liability: The Balancer Labs Shutdown

On March 24, Balancer co-founder Fernando Martinelli announced that Balancer Labs — the corporate entity that built and funded one of DeFi's foundational DEX protocols — will shut down. The direct cause was a $110 million exploit in November 2025. The actual cause was the legal architecture that made the company inseparable from the damage.

Mar 27, 2026
$1,808 to Hold a Protocol Hostage: The Governance Attack as Security Failure
News Security Cases

$1,808 to Hold a Protocol Hostage: The Governance Attack as Security Failure

On March 24, an attacker spent $1,808 on MFAM tokens, submitted a malicious governance proposal titled 'MIP-R39: Protocol Recovery – Admin Migration', cleared quorum in 11 minutes, and put $1.08 million in user funds at risk. Moonwell is now scrambling to vote it down before the March 27 deadline. The attack is not unusual. Governance tokens are not just voting shares — they are access credentials.

Mar 27, 2026
dTRINITY Paused — $257K Lost to Deposit Inflation Attack
News Security Research

dTRINITY Paused — $257K Lost to Deposit Inflation Attack

On March 17, an attacker deposited 772 USDC into dTRINITY, inflated that position to $4.8M in phantom collateral through an accounting index flaw, borrowed $257,000 in dUSD, and left. The protocol then paused. That pause confirmed what any pause always confirms: the admin key exists, and damage control is not the same as damage prevention.

Mar 25, 2026
USR Stablecoin Depegs in $24 Million Exploit
News Security Cases

USR Stablecoin Depegs in $24 Million Exploit

On March 22, an attacker minted 80 million unbacked USR tokens using roughly $200,000 in USDC and a single unguarded minting role. Resolv's website listed 14 audit engagements from five firms. The service role controlling the mint had no oracle check, no maximum limit, and no multisig. The collateral pool is fine. USR holders are not.

Mar 23, 2026
Venus Protocol's $2.15M Bad Debt: When You Dismiss the Audit Finding, the Attacker Reads It Too
News Security Cases

Venus Protocol's $2.15M Bad Debt: When You Dismiss the Audit Finding, the Attacker Reads It Too

On March 15, Venus Protocol was left with $2.15M in bad debt after a nine-month oracle manipulation campaign against the THE token. The donation attack vector had been flagged in Venus's own security audit. The team disputed the finding. The attacker did not.

Mar 18, 2026
Oracle Misconfiguration at Curve: Why Pool Creators Are the New Attack Surface
News Security Cases

Oracle Misconfiguration at Curve: Why Pool Creators Are the New Attack Surface

The Curve LlamaLend sDOLA exploit wasn't a bug in the core protocol. It was a configuration error made at deployment. When a protocol lets anyone configure oracle parameters at pool creation, the attack surface is every pool creator who ever gets it wrong.

Mar 16, 2026
Reentrancy in 2026: Why the Oldest Exploit in DeFi Is Still Winning
News Security Developers

Reentrancy in 2026: Why the Oldest Exploit in DeFi Is Still Winning

A reentrancy attack just drained $2.7M from Solv Protocol — a platform backed by Binance Labs, Blockchain Capital, and OKX Ventures, working with three active security firms. The exploit class is ten years old. The lesson is architectural, not procedural.

Mar 11, 2026
$328 Million Reasons to Verify Your Liquidity Lock
News Security Cases

$328 Million Reasons to Verify Your Liquidity Lock

For three years, Goliath Ventures told investors their capital was in crypto liquidity pools. Blockchain analysis later confirmed only $1.5 million ever reached one. On-chain verification exists. Most investors never asked for it.

Mar 9, 2026
A Government Published a Seed Phrase. $4.8M Was Gone in Hours.
News Security Cases

A Government Published a Seed Phrase. $4.8M Was Gone in Hours.

On February 26, South Korea's National Tax Service published an unredacted photo of a seized Ledger wallet and its handwritten recovery mnemonic. An attacker drained 4 million PRTG tokens within hours. The incident is not a crypto failure — it is a custody failure. And it has direct implications for how any institution handles digital asset keys.

Mar 5, 2026
Why Upgradeability Is a Liability: The Moonwell Oracle Lesson
News Security Cases

Why Upgradeability Is a Liability: The Moonwell Oracle Lesson

On February 15, a governance proposal misconfigured a Chainlink oracle and left Moonwell with $1.78M in bad debt in minutes. It was the protocol's third oracle incident in six months. The common thread isn't AI code or auditor failure — it's that the contract could be changed at all.

Mar 5, 2026
Crypto Hacks Hit a 12-Month Low in February. Here's What the Data Actually Says.
News Security Cases

Crypto Hacks Hit a 12-Month Low in February. Here's What the Data Actually Says.

PeckShield recorded $26.5M in crypto losses across 15 incidents in February 2026 — the lowest monthly figure since March 2025. The numbers reflect real progress. They also reveal where the residual risk still lives.

Mar 3, 2026
OWASP Just Added Upgradeability to the Smart Contract Top 10. We Solved It at Deployment.
News Security Research

OWASP Just Added Upgradeability to the Smart Contract Top 10. We Solved It at Deployment.

OWASP's Smart Contract Top 10: 2026 formally classifies Proxy & Upgradeability Vulnerabilities as a critical risk category. 0xKeep's immutable architecture eliminates this attack surface entirely — not at audit time, but at deployment.

Mar 2, 2026
Beyond Audits: Why Verification at Deployment Beats Post-Launch Monitoring
News Security Research

Beyond Audits: Why Verification at Deployment Beats Post-Launch Monitoring

Lunar Strategy's recognition of the top five Web3 audit firms for 2026 reflects growing institutional demand for verified protocols. But an audit certifies code at a moment in time — admin keys can undo that certification overnight. Immutable deployment is what makes an audit permanent.

Feb 27, 2026
Infrastructure, Not Insurance: The Case for Protocol-Level Security
News Research Security

Infrastructure, Not Insurance: The Case for Protocol-Level Security

A new market report projects the Web3 security sector reaching $6.84B by 2030 at a 24.1% CAGR. As audit demand drives the headline numbers, the more durable security investment is architectural — immutable contracts that prevent failures rather than detect them.

Feb 25, 2026
Liquidity Locks Are the First Line of Defense Against Rug Pulls
News Security Research

Liquidity Locks Are the First Line of Defense Against Rug Pulls

ChainAware's latest data shows 95% of new PancakeSwap pools end in rug pulls, and professional fraud operations are now indistinguishable from legitimate projects at launch. The statistical case for verified, immutable LP locks has never been stronger.

Feb 20, 2026
Cliff vs. Linear Vesting: How Your Unlock Structure Affects Market Stability
News Guides Research

Cliff vs. Linear Vesting: How Your Unlock Structure Affects Market Stability

The week of Feb 17–21 saw $130M+ in scheduled token unlocks hit circulation, with TON's $53.27M cliff release leading the pack. The market reaction illustrates a precise mechanical distinction that every token team should understand before choosing a vesting structure.

Feb 18, 2026
Cross-Chain Infrastructure and the Authentication Gap: What the CrossCurve Exploit Reveals About Multi-Chain Security
News Security Research

Cross-Chain Infrastructure and the Authentication Gap: What the CrossCurve Exploit Reveals About Multi-Chain Security

CrossCurve's expressExecute() function was left permissionless, allowing attackers to submit arbitrary cross-chain payloads by exploiting attacker-controlled metadata for authorization. The incident exposes a structural authentication gap that compounds across every chain a protocol touches.

Feb 13, 2026
Immutability as a Security Invariant: What the GYD Exploit Reveals About Governance-Level Risk
News Security Research

Immutability as a Security Invariant: What the GYD Exploit Reveals About Governance-Level Risk

The GYD stablecoin protocol was exploited after governance-level assumptions were violated. When protocols retain admin keys or upgradeable logic, governance becomes an attack surface. Write-once contracts eliminate this vector entirely.

Feb 11, 2026
The Custody Problem in Yield Vaults: What a $71.6K Pendle Drain Reveals About Architectural Risk
News Security Research

The Custody Problem in Yield Vaults: What a $71.6K Pendle Drain Reveals About Architectural Risk

An unvalidated calldata exploit drained a Pendle-based staking vault for $71.6K. The root cause wasn't just missing input validation — it was a custody model that made the contract a viable target in the first place.

Feb 6, 2026
BlockSec Weekly Roundup: $3.8M Lost Across Six Incidents — Why Token Design Flaws Are a Liquidity Lock Problem
News Security Research

BlockSec Weekly Roundup: $3.8M Lost Across Six Incidents — Why Token Design Flaws Are a Liquidity Lock Problem

Access control failures, improper input validation, and a flawed burn mechanism on BNB Chain drained $3.8M across DeFi protocols last week. Here's what the SOFI exploit reveals about the relationship between token mechanics and liquidity security.

Feb 4, 2026
Seven Hacks. One Month. The Common Thread Is Not the Code.
News Cases Security

Seven Hacks. One Month. The Common Thread Is Not the Code.

Seven DeFi hacks over $1M each in January 2026 alone. Step Finance ($30M) and a major social engineering attack both traced to compromised private keys — not smart contract flaws. Halborn's monthly roundup makes the case that admin key architecture is the real vulnerability.

Jan 30, 2026
The Holdstation Takeover: When the Attack Vector Is the Developer's IDE
News Developers Security

The Holdstation Takeover: When the Attack Vector Is the Developer's IDE

A malicious IDE or browser extension on a Holdstation team member's device led to a project-controlled wallet takeover draining ~$100K across multiple chains. A breakdown of why the developer environment is an attack surface — and why any admin key is a liability regardless of the team holding it.

Jan 28, 2026
The Attack Vector Catalogue: What QuillAudits' 30+ DeFi Threat Analysis Says About Admin Keys
News Developers Security

The Attack Vector Catalogue: What QuillAudits' 30+ DeFi Threat Analysis Says About Admin Keys

A January 2026 QuillAudits analysis cataloguing 30+ DeFi attack vectors placed admin key compromise at the top of the threat hierarchy. A technical breakdown of why that classification is correct — and what zero-admin-key architecture eliminates from the catalogue entirely.

Jan 23, 2026
Pool Reserve Manipulation via Burn: What the PancakeSwap V2 Exploits Reveal About LP Mechanics
News Security Cases

Pool Reserve Manipulation via Burn: What the PancakeSwap V2 Exploits Reveal About LP Mechanics

Two PancakeSwap V2 pools on BNB Smart Chain — XPL/USDT ($717K) and PGNLZ/USDT ($100K) — were exploited in late January via flawed token burn mechanisms that allowed direct pool reserve manipulation. A technical breakdown for developers on what deterministic pool mechanics require.

Jan 23, 2026
The Truebit Exploit: What a Single Integer Overflow in a Legacy Contract Costs
News Security Cases

The Truebit Exploit: What a Single Integer Overflow in a Legacy Contract Costs

A legacy Truebit smart contract with an integer overflow flaw allowed attackers to mint TRU tokens for free and drain $26.4M from the protocol. A clinical post-mortem on what aging code costs — and why immutable, minimal contracts do not accumulate this category of risk.

Jan 21, 2026
Security Is Not a Cost Center. The 2025 State-Sponsored Theft Data Makes the Investment Case.
News Research Security

Security Is Not a Cost Center. The 2025 State-Sponsored Theft Data Makes the Investment Case.

North Korean state-sponsored actors stole $2.02 billion from Web3 in 2025 using AI-enhanced phishing and supply chain attacks. Analysts now frame security-first infrastructure as foundational to long-term investment value. A breakdown of why 0.03 ETH is risk mitigation, not overhead.

Jan 16, 2026
$3.4 Billion Stolen in 2025. Three Incidents Explain 69% of It.
News Research Security

$3.4 Billion Stolen in 2025. Three Incidents Explain 69% of It.

Chainalysis confirmed $3.4 billion in cryptocurrency theft in 2025. Three incidents accounted for 69% of total losses. Q1 alone set an all-time quarterly record at $1.64 billion. A breakdown of what the concentration of losses reveals about systemic risk — and the infrastructure decisions that create it.

Jan 9, 2026
$27.5 Million in Two Weeks: How 2026 Started for DeFi Security
News Security Research

$27.5 Million in Two Weeks: How 2026 Started for DeFi Security

$27.5 million lost in the first two weeks of 2026. The Truebit and TMXTribe exploits, MetaMask phishing campaigns, and a familiar set of root causes. A dispatch on what the opening of 2026 signals about the security environment infrastructure builders are operating in.

Jan 7, 2026
Back to Home