$7M Protocol Breach
Odin.fun lost $7 million through AMM manipulation - their third breach in six months. Inadequate treasury and unclear compensation plans.
Read AnalysisExpert security audits and incident analysis from a team of leading cybersecurity researchers specializing in blockchain and smart contracts, API and web security, software and binary analysis, malware analysis, and cloud security for robust digital asset protection.
View Security Plans Request an AuditWe continuously monitor and analyze security breaches to help the community learn from real-world attacks and improve their security posture.
Odin.fun lost $7 million through AMM manipulation - their third breach in six months. Inadequate treasury and unclear compensation plans.
Read AnalysisAI project claimed 51% attack on Monero. Community investigation found hashrate closer to 30%. Market moved before verification.
Read Analysis127,426 BTC worth $3.5B in 2020 vanished from LuBian's mining pool. Now valued at $14.8B, still sitting untouched on-chain.
Read AnalysisCompromised Credix admin account minted worthless tokens, borrowed $4.5M against phantom collateral, then shipped to Ethereum.
Read AnalysisBigONE lost $27M when attackers compromised production servers and reprogrammed withdrawal systems to approve unauthorized drains.
Read AnalysisHackers exploited hidden proxy backdoor to mint 110,000 $K tokens on Arbitrum, draining $1.55M from liquidity pools.
Read AnalysisCritical vulnerabilities discovered by our security researchers, demonstrating real expertise in identifying and mitigating high-impact security issues before they're exploited.
Discovered buffer overflow vulnerability in Shotcut video editor affecting MLT Framework image processing. CVE assigned by MITRE. Coordinated disclosure in progress with vendor.
Discovered a critical re-entrancy vulnerability that could have allowed attackers to drain $500M+ from the protocol. Privately reported and fixed before exploitation.
Identified a flash loan attack vector in the new concentrated liquidity pools implementation that could manipulate price oracles. Disclosed through public bug bounty program.
Found a precision loss vulnerability in restaking calculations that could have resulted in incorrect rewards distribution over time.
Discovered a critical flaw in metadata handling that allowed attackers to manipulate NFT attributes after purchase. Responsibly disclosed to the team.
Identified a critical flaw in the governance contract that could have allowed a malicious actor to execute arbitrary code. Privately reported and patched.
Found a vulnerability in the oracle aggregation contract that could allow price manipulation under specific conditions.
Discovered a potential signature verification bypass in the bridge contract that could lead to unauthorized token minting. Reported privately.
Identified a logic error in the farming contract that could have resulted in incorrect reward calculations.
Disclaimer: All private findings are disclosed with explicit permission from the affected projects. Some details may be omitted to protect sensitive information.
For each vulnerability, we follow responsible disclosure practices and work closely with project teams to ensure issues are fixed before any public disclosure.
Discovered a critical re-entrancy vulnerability that could have allowed attackers to drain $500M+ from the protocol. Privately reported and fixed before exploitation.
Found a precision loss vulnerability in restaking calculations that could have resulted in incorrect rewards distribution over time.
Identified a critical flaw in the governance contract that could have allowed a malicious actor to execute arbitrary code. Privately reported and patched.
Discovered a potential signature verification bypass in the bridge contract that could lead to unauthorized token minting. Reported privately.
Disclaimer: All private findings are disclosed with explicit permission from the affected projects. Some details may be omitted to protect sensitive information.
For each vulnerability, we follow responsible disclosure practices and work closely with project teams to ensure issues are fixed before any public disclosure.
Discovered buffer overflow vulnerability in Shotcut video editor affecting MLT Framework image processing. CVE assigned by MITRE. Coordinated disclosure in progress with vendor.
Identified a flash loan attack vector in the new concentrated liquidity pools implementation that could manipulate price oracles. Disclosed through public bug bounty program.
Discovered a critical flaw in metadata handling that allowed attackers to manipulate NFT attributes after purchase. Responsibly disclosed to the team.
Found a vulnerability in the oracle aggregation contract that could allow price manipulation under specific conditions.
Identified a logic error in the farming contract that could have resulted in incorrect reward calculations.
Comprehensive security solutions tailored to modern digital infrastructure and decentralized systems.
Complete audit and security analysis of blockchain protocols, consensus mechanisms, and token implementations.
Rigorous auditing of smart contracts across multiple platforms to identify vulnerabilities before deployment.
Assessment and hardening of cloud infrastructure to ensure data integrity and access controls.
Comprehensive testing of mobile applications for iOS and Android platforms to identify potential security risks.
Thorough evaluation of web applications to identify and mitigate security vulnerabilities and ensure compliance.
Deep analysis of compiled code and digital forensics to identify vulnerabilities and investigate incidents.
Get expert security analysis from our team of specialized researchers.
For security audit requests, vulnerability reports, or incident analysis, reach out to our team:
audit@bytescan.netWe respond to all audit requests within 24 hours. Include project details, scope, and timeline in your email.
We combine automated tools with deep human expertise to identify vulnerabilities that others miss.
Get in touch with our security team.
For security audits, vulnerability reports, and incident analysis:
audit@bytescan.net