Informations
Jump to content

Lorem Ipsum...

Click to Dismiss this Notification
Ładowanie danych...
  • Matcha Meta Hit via SwapNet: Router Exploit on Base Leads to Up to $16.8M Drained

    Please Register !

    What happened?

    On Sunday, Matcha Meta (a DEX aggregator) reported a security incident that didn’t originate from Matcha’s own core systems, but from one of its key liquidity routes: SwapNet. The issue was tied to a smart-contract vulnerability involving SwapNet’s router contract, which attackers allegedly used to siphon user funds.

    Matcha Meta warned that anyone who had previously approved tokens for SwapNet’s router contract could still be exposed, and urged users to revoke those approvals immediately to limit further damage.


    Please Register !

    Why token approvals matter here

    In DeFi, token approvals (allowances) let a contract move your tokens without asking again each time. That’s convenient… until the contract (or a contract you approved) becomes vulnerable.

    In this case, the alert focused on “one-time approvals” and older allowances that might still exist. If the router had permission to spend your tokens, an attacker could potentially exploit that approval pathway.

    Please Register !

    Matcha Meta’s guidance: revoke all approvals granted to SwapNet’s router contract.


    Please Register !

    How much was stolen? Estimates differ

    Different security trackers reported different totals:

    • CertiK estimated roughly $13.3M drained.

    • PeckShield reported at least $16.8M stolen on Base.

    PeckShield also described on-chain movements that included swapping stablecoins into ETH and then moving funds across networks:

    Please Register !

    CertiK’s analysis pointed to an exploit pattern that allowed malicious actions through the SwapNet contract:

    Please Register !


    Please Register !

    Was Matcha Meta itself hacked?

    Matcha Meta stated that the risk exposure was connected to SwapNet, rather than a direct compromise of Matcha Meta’s own infrastructure.

    At the time of publication, Matcha Meta had not publicly confirmed details such as:

    • the precise root cause of the vulnerability,

    • whether affected users would be compensated,

    • what additional safeguards would be implemented going forward.

    Here’s the original X post mentioned in the article (kept in the same spot as in the source):


    Please Register !

    Not an isolated case: recent exploits add up

    This incident landed shortly after another major smart-contract exploit. About two weeks earlier, an attack reportedly caused around $26M in losses for Truebit (an offline computation protocol), and the TRU token experienced a dramatic crash (around 99%), according to reporting dated Jan. 8.

    Related reading (title only): Bitcoin investor loses retirement fund in AI-fueled romance scam


    Please Register !

    Smart contracts remain the top target

    Security reporting continues to highlight smart contracts as the biggest bullseye for attackers:

    • Smart-contract weaknesses reportedly accounted for 30.5% of crypto exploit losses in 2025, across 56 incidents (per SlowMist’s year-end summary).

    • Account takeovers and hijacked X accounts were next, at roughly 24%.


    Please Register !

    AI is changing the exploit landscape

    Researchers also point out that modern AI tooling is speeding up how vulnerabilities are discovered. The article notes that in December, commercial generative AI agents reportedly identified about $4.6M worth of exploitable smart-contract issues in existing protocols, using models such as:

    • Anthropic’s Claude Opus 4.5

    • Claude Sonnet 4.5

    • OpenAI’s GPT-5


    Please Register !

    Quick protection checklist (extra tips)

    If you use DeFi aggregators, routers, or DEX tools, this is the hygiene that saves wallets:

    • Please Register !

      Audit your allowances regularly (especially for router/spender contracts).

    • Please Register !

      Revoke approvals you don’t need (old approvals are silent risk).

    • Please Register !

      Prefer limited approvals over “infinite” approvals when possible.

    • Please Register !

      Keep a separate wallet for DeFi experimenting vs. long-term holdings.

    • Please Register !

      Don’t sign transactions you don’t fully understand—especially “approval” and “permit” style signatures.

    • Please Register !

      If a protocol posts a security alert, assume speed matters: revoke first, investigate after.

     Share



    User Feedback

    Join the conversation

    You can post now and register later. If you have an account, sign in now to post with your account.

    Guest

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.

spacer.png

Disable AdBlock
The popup will be closed in 5 seconds...