Close Menu
Altcoin ObserverAltcoin Observer
  • Regulation
  • Bitcoin
  • Altcoins
  • Market
  • Analysis
  • DeFi
  • Security
  • Ethereum
Categories
  • Altcoins (1,543)
  • Analysis (1,722)
  • Bitcoin (2,312)
  • Blockchain (1,376)
  • DeFi (1,610)
  • Ethereum (1,563)
  • Event (58)
  • Exclusive Deep Dive (1)
  • Landscape Ads (2)
  • Market (1,651)
  • Press Releases (3)
  • Reddit (963)
  • Regulation (1,541)
  • Security (2,191)
  • Thought Leadership (3)
  • Videos (41)
Hand picked
  • Bitcoin holdings of Saylor’s Strategy swell to over $70 billion
  • Announcing American regulated derivatives, creating unified access to future and markets of cryptographic points
  • The brokerage arm of China Merchants Bank is the 1st continental broker to provide cryptography services in Hong Kong
  • Altcoins Chase New Highs after Bitcoin reaches $ 123,000
  • Bitcoin Basher Vanguard is now the largest strategy shareholder
We are social
  • Facebook
  • Twitter
  • Instagram
  • YouTube
Facebook X (Twitter) Instagram
  • About us
  • Disclaimer
  • Terms of service
  • Privacy policy
  • Contact us
Facebook X (Twitter) Instagram YouTube LinkedIn
Altcoin ObserverAltcoin Observer
  • Regulation
  • Bitcoin
  • Altcoins
  • Market
  • Analysis
  • DeFi
  • Security
  • Ethereum
Events
Altcoin ObserverAltcoin Observer
Home»DeFi»The pirates exploit the protocols which are said to be: what is missing?
DeFi

The pirates exploit the protocols which are said to be: what is missing?

June 5, 2025No Comments5 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Crypto news hackers keep exploiting audited defi protocols option01.webp.webp
Share
Facebook Twitter LinkedIn Pinterest Email


Disclosure: the views and opinions expressed here belong only to the author and do not represent the views and opinions of the editorial of Crypto.News.

Defi is attacked, but not threats against which industry is used to defend. While the developers are meticulously scan lines of code for vulnerabilities, the attackers have changed tactics, exploiting economic weaknesses which are unnoticed under impeccable programming.

For example, the Jelly Jeton feat on Hyperledger, where the attackers were able to siphon more than $ 6 million in the Hyperledger insurance fund, is an excellent example. This feat was not at all caused by coding errors, but by playable incentives and not taken risks that no one had examined.

Cybersecurity DEFI has traveled a long way. Intelligent contract audits – designed to catch bugs in software code – are the standard today. But we have urgently expanded its scope beyond simple lines of code. Intelligent contract audits are fundamentally inadequate, unless they also analyze economic and theoretical risks. The excessive dependence of industry on audits only of the code is obsolete and dangerous, leaving projects vulnerable to an endless cycle of attacks.

Recent attacks overlook the danger of economic exploits

In March 2025, the hyperliquid scholarship, which made its contracts audited, was ambushed by an exploit of $ 6 million involving its jelly token. How? The attackers did not find a bug in the code; They designed a short pressure by abusing the own logic of hyperliquid liquidation, by pumping the price of Jelly and manipulating the risk parameters of the platform.

In other words, hyperliquid designers had not evaluated in certain market behaviors – surveillance that traditional audits have not caught. The case of hyperliquid shows that the impeccable code cannot save a project built on trembling economic assumptions.

Shortly before Jelly’s incident, Polter Finance, a Loan Loan Protocol, was drained by $ 12 million thanks to a Flash loan attackAnother type of common attack based on the economy, not on coding vulnerabilities. The attacker has contracted flash loans and handled the project price oracle, bringing the system to process without value as well as billions of people.

The code did exactly what it was supposed to, but the design was imperfect, which allows an extreme price swing to go bankrupt the platform. The feat turned out to be so devastating that Polter Finance, a promising project, was forced to stop operations.

These are not isolated attacks / events; They are part of an increasing scheme in DEFI. In the case, after the case, intelligent opponents exploit protocols by manipulating market inputs, incentives or governance mechanisms to trigger results, developers did not provide. We have seen efficiency farms evolved by reward gaps, stabbing ankles attacked via coordinated market movements and insurance funds drained by extreme volatility.

Strengthen audits with economic and theoretical analysis of the game

The traditional audits check if “the code does what it is supposed”, but which checks if “what is supposed to do” is logical in opponents? Unlike a closed program, protocols DEFI live in a dynamic and contradictory environment. Prices fluctuate, users adapt strategies and protocols interconnect in a complex way.

While most web teams have engineers that can capture software bugs during development, few have internal economic expertise, which makes it essential to fill this gap and identify the vulnerabilities of incentive design and economic logic.

Really rigorous audits include a theoretical and economic analysis of the game, which involve examining things such as fees, liquidation formulas, collateral parameters and governance processes. They force listeners to consider: “Given these rules, how could someone enjoy it by folding them?”

For example, during an audit carried out by OAK Security, we discovered that the insurance fund of the perpetual exchange platform could be completely drained by volatility because it had not taken into account the “risk of vega” – the sensitivity of the protocol to volatility – in its pricing model. It was not at all a code bug – it was a design defect that would have caused the collapse of turbulent markets. Only a theoretical and economical deep dive caught it – and fortunately, we were able to report the problem before launch.

These economic exploits are well documented, and not terribly difficult to spot – but they only surface when the listeners ask the right questions and do not reflect on the code on the page.

The founders must demand more listeners

The founders of the protocol should ask the listeners to examine all the components of a trading system, including implicit and out -of -chain logical components, to ensure complete safety. In the best scenario, any critical mission logic would be brought to the channel.

If you are founder or investor, it is essential to ask your listeners: what about the manipulation of Oracle? What about crunch liquidity scenarios? Have you analyzed Tokenomics for attack vectors? If the answer is a silence or a stitching by hand, you should dig more deeply.

The cost of these dead angles is simply too high – the incorporation of the economic and theoretical analysis of the game is not only a “pleasant to have”; It is a matter of survival for DEFI projects. We must cultivate a culture where the code examination and the economic examination go hand in hand for each major protocol.

Let’s raise the bar now – before another lesson in several million dollars forces our hand.

Jan Philipp Fritsche

Jan Philipp Fritsche

Jan Philipp Fritsche is the managing director of OAK Security, a cybersecurity company specializing in web3 audits. Before his role in Oak Security, Dr. Fritsche has had a large experience in econometric modeling and risks, occupying positions in institutions such as the European Central Bank and Diw Berlin. He has a doctorate. In economics from the University of Humboldt in Berlin.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleBitcoin ATM Scams Costing Americans More Than $114 Million
Next Article The president of the SEC, Atkins, reaffirms the promise to end ambiguity in cryptographic regulations.

Related Posts

DeFi

Kamino becomes the first great lender of Defi to accept token actions as guaranteed

July 15, 2025
DeFi

The Solana Defi Jito application is ready to increase the value of the token with Subdao – DL News

July 15, 2025
DeFi

Information sheet: the clarity act worse that the deregulation of the crypto made 21 of last year

July 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Single Page Post
Share
  • Facebook
  • Twitter
  • Instagram
  • YouTube
Featured Content
Event

Internet Computer Launches the World Computer Hacker League: A Global Stage for Web3 Innovators

July 15, 2025

July 2025 – The Internet Computer Protocol (ICP), in collaboration with the global ICP Hubs…

Press Releases

Istanbul Blockchain Week 2025 Breaks Records, Blending Web3, AI & Real-World Assets

July 14, 2025

Istanbul, Türkiye – July 2025 – Istanbul Blockchain Week 2025, hosted by EAK Digital, wrapped…

1 2 3 … 50 Next
  • Facebook
  • Twitter
  • Instagram
  • YouTube

The brokerage arm of China Merchants Bank is the 1st continental broker to provide cryptography services in Hong Kong

July 15, 2025

Ethereum still 39% below the ATH – but 3 reasons why ETH could rally

July 15, 2025

The largest Bitcoin Darknet Abacus Market market disappears in a suspected exit scam

July 15, 2025
Facebook X (Twitter) Instagram LinkedIn
  • About us
  • Disclaimer
  • Terms of service
  • Privacy policy
  • Contact us
© 2025 Altcoin Observer. all rights reserved by Tech Team.

Type above and press Enter to search. Press Esc to cancel.

bitcoin
Bitcoin (BTC) $ 116,426.19
ethereum
Ethereum (ETH) $ 3,038.73
xrp
XRP (XRP) $ 2.89
tether
Tether (USDT) $ 0.999973
bnb
BNB (BNB) $ 683.16
solana
Solana (SOL) $ 159.90
usd-coin
USDC (USDC) $ 1.00
dogecoin
Dogecoin (DOGE) $ 0.192377
tron
TRON (TRX) $ 0.298457
staked-ether
Lido Staked Ether (STETH) $ 3,034.82