Security researcher rewarded $250,000 for uncovering Curve Finance vulnerability

A security researcher, known as Marco Croc from Kupia Security, has been awarded $250,000 for identifying a significant vulnerability in the decentralized finance (DeFi) protocol Curve Finance. This vulnerability, historically exploited by hackers to siphon off millions of dollars from cryptocurrency protocols, was discovered to be a reentrancy vulnerability.

In a detailed explanation shared on an X thread, Marco Croc outlined how the bug could be leveraged to manipulate balances and withdraw funds from liquidity pools within the Curve Finance protocol. Recognizing the severity of the vulnerability, Curve Finance conducted a thorough investigation and subsequently awarded Marco Croc the maximum bug bounty amount.

Although Curve Finance classified the threat as “not as dangerous” and expressed confidence in recovering any stolen funds, they acknowledged the potential for serious panic if a security incident were to occur. This recognition comes as Curve Finance recently recuperated from a $62 million hack in July, during which they resolved to reimburse $49.2 million worth of assets to liquidity providers (LPs).

On-chain data confirms that the disbursement of tokens, totaling over $49.2 million, to cover losses incurred by the Curve, JPEG’d (JPEG), Alchemix (ALCX), and Metronome (MET) pools was approved by 94% of tokenholders. The community fund will supply the Curve DAO (CRV) tokens, with the final amount also factoring in deductions for tokens recovered since the incident.

The attacker exploited a vulnerability in stable pools utilizing certain versions of the Vyper programming language. Versions 0.2.15, 0.2.16, and 0.3.0 of Vyper were found to be susceptible to reentrancy attacks, enabling the exploit to occur

Rate this article
( No ratings yet )
Chainspot News