Skip to Content
SecurityExploits

Exploits

Bunni

On September 2, Bunni was exploited for ~$8.4m by a sophisticated attacker. Two pools were affected: weETH/ETH on Unichain and USDC/USDT on Ethereum.

Bunni Exploit Post Mortem 

TL;DR: The attacker constructed an atomic liquidity increase and sandwich attacked it.

The key fault was a rounding direction that was safe in the context of a single operation but led to unsafe behavior as part of multiple operations.

// decrease idle balance proportionally to the amount removed { (uint256 balance, bool isToken0) = IdleBalanceLibrary.fromIdleBalance(state.idleBalance); uint256 newBalance = balance - balance.mulDiv(shares, currentTotalSupply); if (newBalance != balance) { s.idleBalance[poolId] = newBalance.toIdleBalance(isToken0); } }

Cork

Cork Exploit Post Mortem 

SlowMist Exploit Analysis 

Exploit overview:

At 11:39 UTC on May 28, Cork Protocol experienced an exploit resulting in the extraction of 3,761 wstETH from the wstETH:weETH market.

Attacker targeted two sophisticated edge cases:

• Vector 1: Manipulated rollover pricing just before expiry, buying 3,761 Cover Tokens for only 0.000002 wstETH.

• Vector 2: Deployed malicious hook to bypass validation in Cork Hook & FlashSwapRouter, draining 3,761 wstETH from PSM.

Last updated on