<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: QuillAudits</title>
    <description>The latest articles on Forem by QuillAudits (@quillaudits_ai).</description>
    <link>https://forem.com/quillaudits_ai</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F9203%2F6abe5f3d-95f1-440d-801f-5ac4c914d9d9.png</url>
      <title>Forem: QuillAudits</title>
      <link>https://forem.com/quillaudits_ai</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/quillaudits_ai"/>
    <language>en</language>
    <item>
      <title>CrediX Finance’s $4.5M Exploit (Suspected Exit Scam)</title>
      <dc:creator>QuillAudits</dc:creator>
      <pubDate>Tue, 12 Aug 2025 07:26:24 +0000</pubDate>
      <link>https://forem.com/quillaudits_ai/credix-finances-45m-exploit-suspected-exit-scam-28d9</link>
      <guid>https://forem.com/quillaudits_ai/credix-finances-45m-exploit-suspected-exit-scam-28d9</guid>
      <description>&lt;p&gt;On August 4, 2025, CrediX Finance, a lending protocol on the Sonic blockchain, was hit by a $4.5M exploit — just weeks after its July launch. What first appeared to be a security breach soon raised suspicions of an exit scam when the team vanished after promising full recovery of user funds.&lt;/p&gt;

&lt;h2&gt;
  
  
  How It Happened?
&lt;/h2&gt;

&lt;p&gt;Just six days before the attack, the exploiter gained full administrative control through CrediX’s ACLManager contract, likely using a compromised or insider-owned admin wallet. They granted themselves multiple high-level roles, including complete pool control, cross-chain bridge access, asset listing authority, and emergency shutdown powers.&lt;/p&gt;

&lt;p&gt;Using these privileges, the attacker exploited the BRIDGE_ROLE to mint millions in unbacked acUSDC and acscUSD tokens without depositing any collateral. They then used these fake assets as collateral to borrow legitimate funds, draining over $4.5M worth of USDC, scUSD, wS, staked tokens and WETH.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why It’s Not Just a ‘Hack’?
&lt;/h2&gt;

&lt;p&gt;This wasn’t a typical smart contract vulnerability. The exploit relied on centralized admin privileges, a governance flaw that allowed complete abuse of protocol functions. Evidence suggests insider involvement or collusion.&lt;/p&gt;

&lt;h2&gt;
  
  
  Post-Attack Fallout
&lt;/h2&gt;

&lt;p&gt;Initially, CrediX promised full restitution within 48 hours, claiming a deal had been reached with the attacker. But within days, the team disappeared, website offline, socials deleted and no recovery plan shared. Stability DAO has since taken charge of recovery efforts, collecting KYC details of two team members and preparing a formal legal case.&lt;/p&gt;

&lt;h2&gt;
  
  
  Want to Dive Deeper?
&lt;/h2&gt;

&lt;blockquote&gt;
&lt;p&gt;We’ve broken down the CrediX exploit step-by-step in our full blog, covering the transactions, role setup, funds flow, and red flags that pointed to an exit scam.&lt;br&gt;
👉 &lt;a href="https://www.quillaudits.com/blog/hack-analysis/credix-finance-4.5m-exploit?utm_source=devto&amp;amp;utm_medium=blog&amp;amp;utm_campaign=credix_exploit" rel="noopener noreferrer"&gt;Read the full CrediX Finance exploit analysis here&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  The Bigger Lesson
&lt;/h2&gt;

&lt;p&gt;CrediX’s downfall highlights the dangers of excessive admin centralization in DeFi. Without checks like multi-signature governance and transparent oversight, even secure smart contracts can be undermined from within.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.quillaudits.com" rel="noopener noreferrer"&gt;At QuillAudits&lt;/a&gt;, we’ve seen this pattern repeat across the industry. In our &lt;a href="https://www.quillaudits.com/reports/crypto-exploits-h1-report-2025?utm_source=devto&amp;amp;utm_medium=blog&amp;amp;utm_campaign=h1_2025_report" rel="noopener noreferrer"&gt;H1 2025 Web3 Security Report&lt;/a&gt;, insider threats and governance mismanagement continue to be leading causes of multi-million dollar losses, proving that security isn’t just about code but also about who controls the keys.&lt;/p&gt;

</description>
      <category>blockchain</category>
      <category>web3</category>
      <category>smartcontract</category>
      <category>lendingprotocol</category>
    </item>
    <item>
      <title>Arcadia Finance Lost $3.5M Due to Lack of Input Validation</title>
      <dc:creator>QuillAudits</dc:creator>
      <pubDate>Thu, 17 Jul 2025 11:25:41 +0000</pubDate>
      <link>https://forem.com/quillaudits_ai/arcadia-finance-lost-35m-due-to-lack-of-input-validation-12ad</link>
      <guid>https://forem.com/quillaudits_ai/arcadia-finance-lost-35m-due-to-lack-of-input-validation-12ad</guid>
      <description>&lt;p&gt;Arcadia Finance, known for its automated liquidity management protocol, faced a massive exploit on July 15, 2025. The protocol, deployed on the Base chain, lost around $3.5 million after a critical input validation flaw was exploited by an attacker.&lt;/p&gt;

&lt;h2&gt;
  
  
  What Went Wrong?
&lt;/h2&gt;

&lt;p&gt;At the heart of the exploit was the rebalance function in Arcadia’s smart contract. This function allowed users to manage their liquidity positions flexibly. However, it lacked strict validation checks for certain inputs, especially the swapData parameter, opening a door for attackers.&lt;/p&gt;

&lt;p&gt;The attack began with a large flash loan of 5,623 WETH and 9,968 cbBTC. Using this, the attacker cleverly set themselves as the asset manager by invoking the setAssetManager function, a feature available for normal users. Once in control, they could trigger sensitive functions like flashAction().&lt;/p&gt;

&lt;p&gt;The attacker then minted an LP NFT with a minimal amount of assets and even repaid a debt on behalf of the victim contract to bypass the system’s health check mechanism. By doing this, they ensured their malicious actions wouldn’t immediately revert.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Exploit Flow
&lt;/h2&gt;

&lt;p&gt;With the groundwork set, the attacker called the rebalance function on the RebalancerSpot contract. This function accepted a maliciously crafted swapData payload. Through a series of function calls enabled by this data, the attacker executed a flash action that allowed them to withdraw various NFT LP positions tied to Arcadia.&lt;/p&gt;

&lt;p&gt;Once withdrawn, they drained these positions by removing liquidity — walking away with substantial profits.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Root Cause
&lt;/h2&gt;

&lt;p&gt;The real issue lay in the unchecked input of the rebalance function and the chained internal function calls that followed.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The malicious swapData wasn’t validated.&lt;/li&gt;
&lt;li&gt;This led to internal calls like _swap() and executeAction() trusting and executing harmful logic.&lt;/li&gt;
&lt;li&gt;The attacker used this loophole to extract LP positions and empty them.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In simple terms, Arcadia’s contracts were too trusting of user-supplied data, an oversight that cost them millions.&lt;/p&gt;

&lt;h2&gt;
  
  
  Aftermath
&lt;/h2&gt;

&lt;p&gt;The attacker funded their operations via Tornado Cash and later bridged 1,203 ETH from Base to Ethereum using Across Protocol. Despite the Arcadia team reaching out, recovery efforts showed no success.&lt;/p&gt;

&lt;p&gt;Want to know how this hack unfolded in detail?&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;We’ve broken down the full attack flow, fund movement, and key security lessons in our detailed analysis :&lt;br&gt;
👉 &lt;a href="https://www.quillaudits.com/blog/hack-analysis/arcadia-finance-hack-analysis" rel="noopener noreferrer"&gt;Read the Full Analysis on Arcadia Finance Exploit&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  Crypto Hacks in 2025: A Growing Concern
&lt;/h2&gt;

&lt;p&gt;The Arcadia exploit is just one among many high-profile attacks that shook the Web3 space in 2025. In fact, over $2.3 billion was lost to various exploits in the first half of the year alone. Access control flaws, social engineering and unchecked input validations topped the list of attack vectors.&lt;/p&gt;

&lt;p&gt;If you want a deeper dive into these trends and key security insights, check out our &lt;a href="https://www.quillaudits.com/reports/crypto-exploits-h1-report-2025" rel="noopener noreferrer"&gt;2025 H1 Crypto Exploits &amp;amp; Security Breaches Report&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  Don’t Let Input Validation Flaws Drain Your Protocol!
&lt;/h2&gt;

&lt;p&gt;Arcadia’s $3.5M exploit highlights a classic yet dangerous oversight, failing to validate critical input data. At &lt;a href="https://www.quillaudits.com/" rel="noopener noreferrer"&gt;QuillAudits&lt;/a&gt;, we help projects spot such vulnerabilities before attackers do, with in-depth audits and a multi-layered review framework.&lt;/p&gt;

</description>
      <category>web3</category>
      <category>security</category>
      <category>blockchain</category>
      <category>smartcontract</category>
    </item>
  </channel>
</rss>
