지금 프로젝트를 보호하세요
최대 규모의 웹3 보안 제공업체로 프로젝트를 강화하세요.
CertiK 보안 전문가가 귀하의 요청을 검토 후 곧 연락드리겠습니다.

Initialization Oversight: The Merlin DEX Exploit

보고서 ·사고 분석 ·
Initialization Oversight: The Merlin DEX Exploit

Project name: Merlin DEX

Project type: DEX

Date of exploit: April 26, 2023

Asset loss: 435 WETH, 811K USDC

Vulnerability: Privileged role

Date of audit report publishing: Apr 14, 2023

Conclusion: Within the audit report

Details of the Exploit

Background

In the Merlin DEX project, the MerlinSwapPair contract is deployed by a factory contract to create pairing pools for two tokens. The pool will be used for token exchange and liquidity management.

Nature of the Vulnerability

When the MerlinSwapPair contract is initialized, maximum allowances of two tokens inside the pool are approved to the feeTo role of the factory, which means feeTo address can withdraw all reserves in the pool directly.

CertiK Audit Overview

Screenshot 2024-01-08 at 5.25.55 AM

Conclusion

On April 26, 2023, Merlin DEX pools were drained due to a vulnerability in the initialization of the MerlinSwapPair contract, leading to a loss of 435 WETH and 811K USDC.

The contract deployer withdrew all funds in Merlin DEX pools directly. The vulnerability lies in the initialization of the MerlinSwapPair contract, which approves max allowances to the factory contract's feeTo role. The vulnerability is in CertiK's audit scope.

관련 블로그

Balancer Incident Analysis

Balancer Incident Analysis

On 3 November 2025, Balancer and its forks Beets and Bex were exploited, resulting in a combined initial loss of approximately $130M.

INOs: A New Era in Web3 Fundraising — Opportunities and Challenges

INOs: A New Era in Web3 Fundraising — Opportunities and Challenges

What is driving the rise of INOs, and how might they shape the future of decentralized networks and project funding? Let’s dive into the potential benefits and challenges of this emerging model.

Clober Dex Incident Analysis

Clober Dex Incident Analysis

On 10 December 2024, Clober DEX liquidity vault on Base Network was exploited resulting in a loss of 133.7 ETH (~$501k). The root cause of the attack was a reentrancy vulnerability in the _burn() function of the Rebalancer contract. Clober made an announcement via their X account, offering a 20% bounty to the attacker.