지금 프로젝트를 보호하세요
최대 규모의 웹3 보안 제공업체로 프로젝트를 강화하세요.
CertiK 보안 전문가가 귀하의 요청을 검토 후 곧 연락드리겠습니다.

Curve Conundrum: The dForce Attack via a Read-Only Reentrancy Vector Exploit

보고서 ·사고 분석 ·
Curve Conundrum: The dForce Attack via a Read-Only Reentrancy Vector Exploit

Project name: dForce

Project type: Lending

Date of exploit: Feb 9, 2023

Asset loss: $3.7M

Vulnerability: Price manipulation (Read-only Reentrancy)

Date of audit report publishing: Feb 21, 2021

Conclusion: Out of Audit Scope

Details of the Exploit

Background

dForce is a DeFi project providing services including stablecoin, lending, trading, and governance. In the dForce lending protocol, the amount of tokens a user can borrow depends on the value of their collaterals, which is calculated using external price Oracles. In this exploit, the external price Oracle is a Curve protocol.

Nature of the Vulnerability

  • A manipulated asset price incorrectly calculates the attacker's collateral value, so the attacker can borrow more than its collateral to drain the vault.
  • The asset price is provided by a Curve protocol, which has a read-only reentrancy issue in its implementation.
  • The attacker manipulated the token price by triggering external calls to update its collateral in dForce's lending protocol in the process of withdrawing liquidity from the Curve pool.

CertiK Audit Overview

Screenshot 2024-01-08 at 5.47.56 AM

Screenshot 2024-01-08 at 5.49.26 AM

Conclusion

On Feb 9, 2023, dForce's lending protocol was attacked, leading to a loss of $3.7M. The attacker made use of a read-only reentrancy vector to manipulate the price in the lending protocol to drain funds from the pool. The vulnerability lies in the dependency on the Curve protocol, which was used as price Oracles in dForce's lending protocol, and has been widely recognized by the community. The dependency on the Curve protocol is not in CertiK's audit scope.

References

dForce's announcement: https://twitter.com/dForcenet/status/1623904209161830401

관련 블로그

Top Crypto Security Vectors to Look Out For in 2026

Top Crypto Security Vectors to Look Out For in 2026

2026 represents a critical juncture in the security of digital assets. As the crypto ecosystem continues to institutionalize, threats are evolving, driven by the industrialization of artificial intelligence and the emergence of new vulnerabilities.

Truebit Incident Analysis

Truebit Incident Analysis

On 08 January 2026 Truebit was exploited for ~$26.6M due to an overflow issue. A malicious actor minted tokens for zero ETH that they then sold for ~$26.4M in the same transaction. The exploit was followed up by a second attacker who was able to extract a further ~$224k.

GMX Incident Analysis

GMX Incident Analysis

On 9 July 2025 GMX V1 vault was exploited by a white-hat for ~$42M due to a reentrancy issue. The funds were later returned to GMX who awarded the white-hat a 10% bounty. The whitehat had minted and then staked GLP before creating a short position directly from the vault contract through reentrancy. Executing in this order bypassed the ShortsTracker, and prevented the average short position price from being updated. This occurs when the market price exceeds the tracked average price, resulting in the protocol overestimating unrealized losses. As a result, the Assets Under Management (AUM) calculation was manipulated to inflate the apparent value of GLP.