Entry Thumbnail

Hyperbridge ISMP Forged Proof DOT Mint

# Hyperbridge Forged Proof DOT Mint on Ethereum On April 13, 2026 at 03:55:23 UTC, a helper contract deployed by the attacker used Hyperbridge’s Ethereum-side ISMP message path to deliver a forged governance-style `PostRequest` into `TokenGateway`. The exploit is best classified as an access-control failure at the proof-validation boundary: `HandlerV1` […]

Posted by
Entry Thumbnail

Exploit Investigator

An AI-powered multi-agent pipeline for investigating on-chain attack transactions. Produces comprehensive incident reports with root-cause analysis, self-correcting Analyst-Validator debate, and optional Foundry PoC exploits. ## Pipeline 1. **Parse input**— tx_hash, chain, hints 2. **Setup**— analysis directory + incident brief 3. **Planner**— analysis plan, call trace 4. **Data Collector**— manifest, contract […]

Posted by
Entry Thumbnail

Client Auditor

A structured 7-stage audit using an orchestrator + subagent architecture for security auditing of blockchain node implementations. Covers execution clients, consensus clients, app-chain SDKs, bridges, and any codebase with P2P networking or consensus logic. ## Pipeline 1. **Setup**— creates output directories, records audit parameters 2. **Recon**— maps codebase structure, entry […]

Posted by
Entry Thumbnail

Contract Auditor

A DFS-based AI security auditor for Solidity. The lead auditor reads code, builds a structured context map, extracts value-flow call paths, then delegates each path to a hunt agent for line-by-line depth-first analysis. Findings are merged, deduplicated, and validated. ## Pipeline 1. **Reconnaissance**— discover `.sol` files, resolve skill references, create […]

Posted by
Entry Thumbnail

SubQuery Settings Access Control Staking Drain

# SubQuery Network: Missing Access Control in `Settings` Enables Staking Drain On April 12, 2026, SubQuery Network, a staking protocol on Base, (block 44,590,469) suffered an access-control exploit that drained approximately **218.29M SQT** (about **$131.2K**) from the protocol’s Staking contract. The attacker deployed two ephemeral contracts, abused the absence of […]

Posted by