On July 30th, vulnerabilities in the Vyper programming language were discovered, leaving many pools on Curve susceptible to a reentrancy attack. The attack resulted in $69.3 million being affected, with $16.7 million returned by white hats and approximately $52 million lost. CertiK found that versions 0.2.15, 0.2.16, and 0.3.0 of the Vyper compiler were vulnerable to malfunctioning reentrancy locks.
The attack targeted the pETH-ETH-f pool and involved six wallets, with one wallet successfully exploiting the vulnerability and acquiring over $11.4 million worth of WETH before another front runner executed their transaction first.
All Comments