Low | Medium | High | Critical | Total | |
---|---|---|---|---|---|
Not fixed | 3 | - | - | - | 3 |
Fixed | 5 | 2 | - | - | 7 |
Total | 8 | 2 | 0 | 0 | 10 |
Click to show description
Quick Summary Paribus was exploited due to a reentrancy issue, resulting in the loss of 69,696 $USD worth of $ETH. Details of the Exploit Paribus is a cross-chain lending and borrowing protocol. The protocol suffered an exploit on the Arbitrum layer-two chain. The root cause was a well-known reentrancy vulnerability from an old version of CompoundV2 that Paribus had forked. The attacker deployed two malicious unverified contracts and used this vulnerability to withdraw funds multiple times before updating their balance on-chain. As a result, they were able to drain 35.2 $ETH which is currently worth 69,696 $USD at the time of writing. All stolen assets were transferred through Stargate Bridge in two transactions. Block Data Reference Attacker address: https://arbiscan.io/address/0x014abff04e5c441b2ceaa62d843bbc5ae49e5504 Malicious transaction: https://arbiscan.io/tx/0x0e29dcf4e9b211a811caf00fc8294024867bffe4ab2819cc1625d2e9d62390af Malicious contracts: https://arbiscan.io/address/0xcd31e27f0a811de7139938b1972b475697f8c50b https://arbiscan.io/address/0xec05281d0345f5142acd197bdbc6c4e1fc29dfe7
# | Name | Auditor | Date | Chains | Issues |
---|---|---|---|---|---|
1 | [SCA] Paribus / Protocol-Co... | Hacken | 2024/09/03 | Ethereum | No active critical issues |
2 | Paribus Smart Contracts Review | Zokyo | 2024/03/28 | Off-Chain (Private) | No active critical issues |
3 | [SCA] Paribus / Governance | Hacken | 2023/12/13 | Ethereum | No active critical issues |
4 | [SCA] Paribus / Lending | Hacken | 2023/03/11 | Ethereum | No active critical issues |
5 | [SCA] Paribus / Lending | Hacken | 2022/05/23 | Ethereum | No active critical issues |
6 | [SCA] Paribus / Staking | Hacken | 2021/12/15 | Ethereum | No active critical issues |