Market Cap: $3.2738T 0.430%
Volume(24h): $102.3681B -31.980%
  • Market Cap: $3.2738T 0.430%
  • Volume(24h): $102.3681B -31.980%
  • Fear & Greed Index:
  • Market Cap: $3.2738T 0.430%
Cryptos
Topics
Cryptospedia
News
CryptosTopics
Videos
Top News
Cryptos
Topics
Cryptospedia
News
CryptosTopics
Videos
bitcoin
bitcoin

$104264.493076 USD

0.98%

ethereum
ethereum

$2508.729236 USD

0.68%

tether
tether

$1.000282 USD

0.00%

xrp
xrp

$2.161731 USD

2.69%

bnb
bnb

$656.133522 USD

1.15%

solana
solana

$154.931661 USD

1.51%

usd-coin
usd-coin

$0.999827 USD

0.00%

dogecoin
dogecoin

$0.189854 USD

0.63%

tron
tron

$0.267125 USD

0.95%

cardano
cardano

$0.677843 USD

1.34%

hyperliquid
hyperliquid

$32.573357 USD

4.91%

sui
sui

$3.241549 USD

4.65%

chainlink
chainlink

$13.871933 USD

2.24%

avalanche
avalanche

$20.696380 USD

3.56%

stellar
stellar

$0.264409 USD

1.04%

Cryptocurrency News Articles

Tiny Overflow Bug in Cetus Smart Contract Was Root Cause of $230M DeFi Loss

May 26, 2025 at 04:07 pm

SlowMist confirmed bug in checked_shlw function was root cause of $230M DeFi loss. Tiny overflow bug in Cetus smart contract allowed attacker to fake massive liquidity deposits.

Tiny Overflow Bug in Cetus Smart Contract Was Root Cause of $230M DeFi Loss

On May 22, something alarming happened in the SUI blockchain world. Prices on the Cetus decentralized exchange (DEX) suddenly dropped, and its liquidity pools were drained. The total estimated loss was over $230 million.

Several reports quickly implicated a single triple-entry arbitrageur who used a flash loan to crash a token price instantly and siphon off funds from multiple protocols. However, the precise technical vulnerability that enabled this massive exploit remained a subject of discussion.

Now, renowned blockchain security team SlowMist has released a detailed analysis, revealing a tiny overflow bug in Cetus’ smart contract as the root cause of the staggering DeFi loss.

The checked_shlw function, designed to check for errors like overflows, failed to properly detect an overflow in the get_delta_a function, which is used to calculate the delta of token A when adding liquidity.

This bug allowed the attacker to claim to be adding a huge amount of liquidity by displaying a nearly impossible price and submitting only 1 token, while the system expected 367506680905089974005506088888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888

Disclaimer:info@kdj.com

The information provided is not trading advice. kdj.com does not assume any responsibility for any investments made based on the information provided in this article. Cryptocurrencies are highly volatile and it is highly recommended that you invest with caution after thorough research!

If you believe that the content used on this website infringes your copyright, please contact us immediately (info@kdj.com) and we will delete it promptly.

Other articles published on Jun 02, 2025