Every exploit teaches something. The Hack Database catalogs real-world DeFi attacks โ root cause analysis, attack vectors, affected protocols, and the patterns that made them vulnerable. This isn't just a reference library. It's the training ground for compound intelligence: each documented exploit improves future detection by giving agents concrete patterns to hunt for across new codebases. Fork hunting, pattern matching, and adversarial reasoning all start here.
MetaPool exploited via deflationary token manipulation in AMM pools. Attacker used repeated skim() calls following burn transfers to inflate...
MetaPool mpETH vault allowed free minting when internal _deposit() was overridden without protecting mint() entry point. Inheritance bypass ...
Across Protocol vulnerability where attackers could invalidate nonces on Permit2, causing DoS for legitimate users via nonce tracking desync...
Solana programs vulnerable to target-dependent undefined behavior. x86_64 assumptions fail on BPF/SBF targets due to memory alignment and op...
Comprehensive analysis of Balancer V2 exploit involving flash loan manipulation, protocol accounting errors, and reentrancy through external...
ERC-4626 vaults vulnerable to share price manipulation via direct asset donations. Attacker inflates exchange rate, benefiting existing hold...
OpenZeppelin RLP Audit
OpenZeppelin v5.5 Audit
OpenZeppelin v5.4 Audit
OpenZeppelin v5.3 Audit
OpenZeppelin v5.2 Audit
OpenZeppelin v5.1 Audit
Pinto Protocol Audit
OpenZeppelin v5.0 Audit
OpenZeppelin v4.9 Audit
ALEX Bridge Audit
Firm / Nomoi Audit
Ref Finance Security Audit
OpenZeppelin Checkpoints Audit
OpenZeppelin ERC-4626 Audit
ALEX Launchpad v1.1 & AutoALEX Audit
ALEX DAO Audit
ALEX Launchpad & Vault Audit
Alchemix v2 Audit
ALEX Pool Equation Audit
OpenZeppelin Contracts Audit (2018)
Oak Network Security Audit
XYZ Protocol Security Audit
CC Protocol Security Audit
Plume Network Security Audit
Plaza Finance Security Audit
Hoenn Security Audit
Helios Security Audit
Halogen Security Audit
Scroll Euclid Phase 1 Review
Scroll Euclid Phase 2 Review
Scroll 4844 Blob Security Review
Scroll L2geth Initial Review
Scroll L2geth Security Review
Scroll zkTrie Security Review
Zest ClarityAlliance Audit
Zest Protocol v2 Audit
Zest Protocol v2 Upgrade Audit
Zest Protocol v2 Upgrade V2 Audit