DEV Community

DeFi Security Deep Dives Series' Articles

Back to ohmygod's Series
Anatomy of a $50M DeFi Slippage Disaster: How MEV Bots Ate a Whale's Lunch on Aave

Anatomy of a $50M DeFi Slippage Disaster: How MEV Bots Ate a Whale's Lunch on Aave

1
Comments
4 min read
The Upgradeable Contract Kill Chain: How Uninitialized Proxies Became DeFi's $200M+ Recurring Nightmare

The Upgradeable Contract Kill Chain: How Uninitialized Proxies Became DeFi's $200M+ Recurring Nightmare

1
Comments
6 min read
EIP-7702 and the CrimeEnjoyor Epidemic: How Ethereum's Account Abstraction Upgrade Became an Attacker's Dream

EIP-7702 and the CrimeEnjoyor Epidemic: How Ethereum's Account Abstraction Upgrade Became an Attacker's Dream

Comments
3 min read
The Step Finance Autopsy: How a $40M Solana Protocol Died From Compromised Laptops, Not Buggy Code

The Step Finance Autopsy: How a $40M Solana Protocol Died From Compromised Laptops, Not Buggy Code

Comments
5 min read
Collateral Manipulation in DeFi Lending: How Venus Protocol Lost $3.7M to an Illiquid Token Exploit

Collateral Manipulation in DeFi Lending: How Venus Protocol Lost $3.7M to an Illiquid Token Exploit

Comments
4 min read
Beyond Property Testing: How Coverage-Guided Fuzzing Is Rewriting the Smart Contract Security Playbook in 2026

Beyond Property Testing: How Coverage-Guided Fuzzing Is Rewriting the Smart Contract Security Playbook in 2026

Comments
4 min read
Solana Restaking Security in 2026: The Hidden Risk Surface of NCNs, VRTs, and the Coming Slashing Era

Solana Restaking Security in 2026: The Hidden Risk Surface of NCNs, VRTs, and the Coming Slashing Era

Comments
7 min read
MEV Protection on Solana in 2026: A Developer's Complete Guide to Defending Users Against Sandwich Attacks

MEV Protection on Solana in 2026: A Developer's Complete Guide to Defending Users Against Sandwich Attacks

Comments
7 min read
Inherited Poison: How SagaEVM Lost $7M to an Ethermint Precompile Bug It Didn't Write

Inherited Poison: How SagaEVM Lost $7M to an Ethermint Precompile Bug It Didn't Write

Comments
7 min read
MCPwned: How the Model Context Protocol Is Becoming DeFi's Newest Attack Surface

MCPwned: How the Model Context Protocol Is Becoming DeFi's Newest Attack Surface

Comments
6 min read
DeFi Circuit Breakers in 2026: From ERC-7265 to Aave Shield — Five Patterns That Actually Work

DeFi Circuit Breakers in 2026: From ERC-7265 to Aave Shield — Five Patterns That Actually Work

1
Comments
7 min read
The dTRINITY Index Anomaly: How 772 USDC Became $4.8M in Collateral and Drained a DeFi Lending Protocol

The dTRINITY Index Anomaly: How 772 USDC Became $4.8M in Collateral and Drained a DeFi Lending Protocol

Comments
6 min read
The Solana CPI Security Playbook: 7 Cross-Program Invocation Patterns That Prevent Nine-Figure Exploits

The Solana CPI Security Playbook: 7 Cross-Program Invocation Patterns That Prevent Nine-Figure Exploits

Comments
5 min read
Inside the Venus Protocol Exploit: How 9 Months of Patience and a Donation Attack Bypassed Supply Caps to Drain $3.7M

Inside the Venus Protocol Exploit: How 9 Months of Patience and a Donation Attack Bypassed Supply Caps to Drain $3.7M

1
Comments
5 min read
EIP-1153 Transient Storage Security Traps: How a Gas Optimization Killed SIR.trading and What Your Reentrancy Guard Is Missing

EIP-1153 Transient Storage Security Traps: How a Gas Optimization Killed SIR.trading and What Your Reentrancy Guard Is Missing

1
Comments
6 min read
CPI Reentrancy Is Back: A Solana Developer's Defense Playbook for Token-2022 Transfer Hooks

CPI Reentrancy Is Back: A Solana Developer's Defense Playbook for Token-2022 Transfer Hooks

Comments
5 min read
The $50M Swap Disaster: Why DeFi Frontends Need Circuit Breakers, Not Just Checkboxes

The $50M Swap Disaster: Why DeFi Frontends Need Circuit Breakers, Not Just Checkboxes

Comments
5 min read
The Venus Protocol Donation Attack: How 9 Months of Patience and 3 Lines of Missing Code Led to a $3.7M Extraction

The Venus Protocol Donation Attack: How 9 Months of Patience and 3 Lines of Missing Code Led to a $3.7M Extraction

1
Comments
5 min read
The Transient Storage Trap: Why EIP-1153 Gas Savings Are Creating a New Generation of Smart Contract Vulnerabilities

The Transient Storage Trap: Why EIP-1153 Gas Savings Are Creating a New Generation of Smart Contract Vulnerabilities

Comments
4 min read
The Venus Protocol Donation Attack: How 9 Months of Patience Bypassed Three Lines of Defense

The Venus Protocol Donation Attack: How 9 Months of Patience Bypassed Three Lines of Defense

Comments
5 min read
EVMbench and the Arms Race: How AI Agents Are Rewriting Smart Contract Security — And What Defenders Must Do Now

EVMbench and the Arms Race: How AI Agents Are Rewriting Smart Contract Security — And What Defenders Must Do Now

Comments
4 min read
The Venus Protocol Donation Attack: How an Attacker Turned $0.27 THE Tokens Into a $3.6M Payday

The Venus Protocol Donation Attack: How an Attacker Turned $0.27 THE Tokens Into a $3.6M Payday

Comments
5 min read
The Venus Protocol Donation Attack: How a 9-Month Setup Broke Three Lines of Defense

The Venus Protocol Donation Attack: How a 9-Month Setup Broke Three Lines of Defense

1
Comments
5 min read
The Approval Paradox: How SwapNet's $13.4M Arbitrary Call Exploit Exposes DeFi's Infinite Allowance Time Bomb

The Approval Paradox: How SwapNet's $13.4M Arbitrary Call Exploit Exposes DeFi's Infinite Allowance Time Bomb

Comments
5 min read
The Truebit Integer Overflow: How a Forgotten SafeMath Gap Turned a 2021 Contract Into a $26M ATM

The Truebit Integer Overflow: How a Forgotten SafeMath Gap Turned a 2021 Contract Into a $26M ATM

Comments
5 min read
The Makina Finance Exploit: How $280M in Flash Loans Turned a Curve Pool Oracle Into a $4M ATM

The Makina Finance Exploit: How $280M in Flash Loans Turned a Curve Pool Oracle Into a $4M ATM

Comments
5 min read
OWASP Smart Contract Top 10: 2026 — Reentrancy Falls to #8, Proxy Bugs Enter, and Your New Audit Priorities

OWASP Smart Contract Top 10: 2026 — Reentrancy Falls to #8, Proxy Bugs Enter, and Your New Audit Priorities

1
Comments
5 min read
EVMbench: OpenAI and Paradigm's New Benchmark Proves AI Agents Can Exploit 71% of Smart Contract Vulns

EVMbench: OpenAI and Paradigm's New Benchmark Proves AI Agents Can Exploit 71% of Smart Contract Vulns

Comments
3 min read
The Venus Protocol Donation Attack: How a 9-Month Ambush Turned a $14.5M Supply Cap Into a $53M Trojan Horse — And How to Donation-Proof Your Lending Fork

The Venus Protocol Donation Attack: How a 9-Month Ambush Turned a $14.5M Supply Cap Into a $53M Trojan Horse — And How to Donation-Proof Your Lending Fork

1
Comments
4 min read
The Resolv USR Stablecoin Exploit: How a Compromised Off-Chain Signer Let an Attacker Mint 80M Unbacked Tokens and Steal $25M

The Resolv USR Stablecoin Exploit: How a Compromised Off-Chain Signer Let an Attacker Mint 80M Unbacked Tokens and Steal $25M

Comments
5 min read
Mutation Testing for Solidity: The Audit Quality Metric Your Protocol Is Ignoring

Mutation Testing for Solidity: The Audit Quality Metric Your Protocol Is Ignoring

1
Comments
6 min read
The Aave CAPO Oracle Misfire: How a Timestamp-Ratio Desync Liquidated $26M in wstETH — A Deep Dive for DeFi Builders

The Aave CAPO Oracle Misfire: How a Timestamp-Ratio Desync Liquidated $26M in wstETH — A Deep Dive for DeFi Builders

1
Comments
5 min read
The $7M SagaEVM Precompile Exploit: How a Cross-Chain Validation Bypass Minted Stablecoins From Thin Air

The $7M SagaEVM Precompile Exploit: How a Cross-Chain Validation Bypass Minted Stablecoins From Thin Air

Comments
7 min read
The $40M Step Finance Kill: How Compromised Executive Devices Bypassed Every On-Chain Defense — And a 7-Layer OpSec Playbook for Solana Treasury Teams

The $40M Step Finance Kill: How Compromised Executive Devices Bypassed Every On-Chain Defense — And a 7-Layer OpSec Playbook for Solana Treasury Teams

1
Comments
7 min read
The Custom Detector Arms Race: Building Slither, Aderyn, and Semgrep Rules That Catch the Vulnerability Patterns Default Scanners Miss

The Custom Detector Arms Race: Building Slither, Aderyn, and Semgrep Rules That Catch the Vulnerability Patterns Default Scanners Miss

Comments
9 min read
The Aave V3 Fork Vulnerability Epidemic: Rounding Bugs, Index Desync, and a $260M Attack Surface

The Aave V3 Fork Vulnerability Epidemic: Rounding Bugs, Index Desync, and a $260M Attack Surface

Comments
8 min read
Omnistealer: How Blockchain-Embedded Malware Turns TRON, Aptos, and BSC Into an Unkillable C2

Omnistealer: How Blockchain-Embedded Malware Turns TRON, Aptos, and BSC Into an Unkillable C2

Comments
6 min read
The Composability Tax: How DeFi Protocol Interactions Create Emergent Vulnerabilities Neither Protocol Can Detect Alone

The Composability Tax: How DeFi Protocol Interactions Create Emergent Vulnerabilities Neither Protocol Can Detect Alone

Comments
5 min read
The AI Exploit Agent: How Autonomous AI Discovers DeFi Vulnerabilities at $0.50/Attempt — And 6 Defense Patterns

The AI Exploit Agent: How Autonomous AI Discovers DeFi Vulnerabilities at $0.50/Attempt — And 6 Defense Patterns

Comments
9 min read
Read-Only Reentrancy: The Silent Price Oracle Killer Every DeFi Protocol Still Gets Wrong

Read-Only Reentrancy: The Silent Price Oracle Killer Every DeFi Protocol Still Gets Wrong

Comments
5 min read
DeFi Time-Bomb Vulnerabilities: How Forked Code With Hidden Assumptions Has Cost $85M+ in 2026 — And a 5-Layer Detection Framework

DeFi Time-Bomb Vulnerabilities: How Forked Code With Hidden Assumptions Has Cost $85M+ in 2026 — And a 5-Layer Detection Framework

1
Comments
8 min read
The $679K BCE Burn Exploit: How a Defective Burn Mechanism Drained a PancakeSwap Pool

The $679K BCE Burn Exploit: How a Defective Burn Mechanism Drained a PancakeSwap Pool

1
Comments
6 min read
The Proxy Upgrade Kill Switch: Why OWASP SC10 Means Your Upgradeable Contract Is Exploitable

The Proxy Upgrade Kill Switch: Why OWASP SC10 Means Your Upgradeable Contract Is Exploitable

Comments
6 min read
The Phantom Approval: How ERC-2612 Permit Signatures Are Being Weaponized to Drain DeFi Wallets Without On-Chain Traces

The Phantom Approval: How ERC-2612 Permit Signatures Are Being Weaponized to Drain DeFi Wallets Without On-Chain Traces

1
Comments
6 min read