Seneca Exploit - Post Mortem
Blog iconSeneca Protocol
Mar 1
TL:DROn Wednesday, 28th of February, Seneca's Chamber contracts, previously audited by Halborn Security, were affected by a bug approval and users' funds were compromised. In the attack, Seneca’s Chamber.sol contract was implicated. The attacker exploited Chamber's performOperations() function, allowing calls to functions in other contracts, and directed a call to .transferFrom(), using the Chamber contracts to send tokens to their address. $6,4m were stolen during the attack, ...

Most popular by Seneca Protocol

Seneca Exploit - Post Mortem

Seneca Exploit - Post Mortem

Cover image

How Seneca Is Evolving The DeFi Lending Model To Bring Leverage To The Masses

Cover image

Staking and Deployment Pipeline

Seneca Protocol

Written by
Seneca Protocol

Isolated lending market.

Subscribe

2025 Paragraph Technologies Inc

PopularTrendingPrivacyTermsHome
Search...Ctrl+K

Seneca Protocol

Subscribe