ID:
bacon-protocol-50
100 pts
Platform:
Type:
Category:
Method:
Data Sources:
Ethereum
Protocol
Lending
Contract Vulnerabilities
Extended Method:
Reentrancy attack
Days in Operation:
317
(0.87 Years)





100 pts each
This morning someone used reentrancy in the contract to get more bHOME than they should have and took some USDC. Most of the funds for the protocol were already safely lent out against homes. The hack is made possible due to a reentrancy bug in the lend() routine so that the hacker can get more lending credits via re-entering the lend() routine.
The issue was found quickly. The contract has been patched and is being reaudited.
The loss is estimated at $1M. Funds were transferred to Tornado.Cash.
DISCLAIMER: While web3rekt has used the best efforts in aggregating and maintaining this database, this web site makes no representations or warranties with respect to the accuracy or completeness of its information and data herein, and specifically disclaim any implied warranties of merchantability or fitness for any particular purpose.
​
Under no circumstances, shall web3rekt be liable for any loss of profit or funds, any regulatory or governmental penalties, any legal costs, or any other commercial and non-commercial damages, including but not limited to special, incidental, consequential, or other damages from any or all usage of the data and information derived from this database.