Defimon Alerts (@defimonalerts) 's Twitter Profile
Defimon Alerts

@defimonalerts

Real-time security alerts for DeFi

⚠️ Alerts: t.me/defimon_alerts
πŸ’Ž Signals: t.me/+m9BMRKlMuW5iM…

ID: 1981269826497892352

linkhttp://defimon.xyz calendar_today23-10-2025 08:01:59

170 Tweet

508 Followers

7 Following

Defimon Alerts (@defimonalerts) 's Twitter Profile Photo

πŸ’¬ Onchain Message: It is clear you are not DPRK. Many people lost their life savings in this exploit. You are sitting on a heavily monitored treasure that, without state-level resources, will be nearly impossible to launder cleanly. The funds have gained $30M+ since April 1st.

Defimon Alerts (@defimonalerts) 's Twitter Profile Photo

πŸ’¬ Onchain Message: please return my money u taken from me my mney 10 usd with intreset give me actual u taken frm my wallet 6 or 7 usd with 37 days intreset its 10 usd soo give me please please please god hacker punish this hacker if he doesnt given my money back

Defimon Alerts (@defimonalerts) 's Twitter Profile Photo

πŸ’¬ Onchain Message: hacker ohh good hacker how are u are u eaten break fast .. how is ur life i am also fine and you and i am asking u to return my 7 usd with 37 days intreset with toatl 100 usd ... love u or not but lve uuuu .. bscscan.com/tx/0x7589a4093…

Decurity (@decurityhq) 's Twitter Profile Photo

How we cut block latency 4x and scaled exploit detection to 8 chains: our CTO Raz0r shares insights on how Defimon Alerts works under the hood on the Quicknode blog πŸ‘‡

Defimon Alerts (@defimonalerts) 's Twitter Profile Photo

🚨 Giddy - Loss $1.3M (2026-04-23) Type: Incomplete Signature Coverage / Arbitrary Aggregator Call GiddyVaultV3's _validateAuthorization() uses EIP-712 signatures that only cover the data bytes of each SwapInfo struct, but NOT the aggregator, fromToken, toToken, or amount

🚨 <a href="/giddydefi/">Giddy</a> - Loss $1.3M (2026-04-23)

Type: Incomplete Signature Coverage / Arbitrary Aggregator Call

GiddyVaultV3's _validateAuthorization() uses EIP-712 signatures that only cover the data bytes of each SwapInfo struct, but NOT the aggregator, fromToken, toToken, or amount
Defimon Alerts (@defimonalerts) 's Twitter Profile Photo

πŸ’¬ Onchain Message: hey, you pulled ~4 WETH from our contract 0xD1950a138328B52Da4fE73DbdB167a83f2c83DB9 across blocks 44039167–44055571. config bug on us. open to a bounty + return? basescan.org/tx/0xae84d4283…

Defimon Alerts (@defimonalerts) 's Twitter Profile Photo

⛑️ Defimon is live in the Ethereum Security QF round on Giveth! Our incident response & white-hat defense has saved $2M+ so far. Thanks to quadratic funding (500 ETH matching pool by thedao.fund), a $10 donation can be worth $5K+. Round ends May 15. qf.giveth.io/project/defimo…

Defimon Alerts (@defimonalerts) 's Twitter Profile Photo

🚨 Singularity Finance - Loss ~$413K (2026-04-26) Type: Oracle Misconfiguration / Share Inflation The dynBaseUSDCv3 vault on Base prices its non-USDC reserves via UniswapV3Oracle. On 2026-01-19 the protocol admin registered the six yield-token oracle routes with a Uniswap V3 fee

🚨 <a href="/Singularity_Fi/">Singularity Finance</a>  - Loss ~$413K (2026-04-26)

Type: Oracle Misconfiguration / Share Inflation

The dynBaseUSDCv3 vault on Base prices its non-USDC reserves via UniswapV3Oracle. On 2026-01-19 the protocol admin registered the six yield-token oracle routes with a Uniswap V3 fee
Defimon Alerts (@defimonalerts) 's Twitter Profile Photo

🚨 JUDAO (T3 JUDAO) - Loss ~$464K (2026-04-28) Token: $JUDAO @ $0.3957 (DeBank) MC: Unknown (not on CoinGecko) TVL: $22.3M (PancakeSwap JUDAO/USDT LP) Type: Deflationary Token LP Drain The JUDAOToken contract has a custom _update() transfer function that drains tokens directly

Defimon Alerts (@defimonalerts) 's Twitter Profile Photo

πŸ’¬ Onchain Message: We are aware that you have exploited Purrlend and removed user funds. We are actively investigating the incident and tracking fund movements onchain. We want to resolve this constructively. If you return 90% of the funds taken, you can retain 10% as a bug

Defimon Alerts (@defimonalerts) 's Twitter Profile Photo

πŸ’¬ Onchain Message: We are the YieldCore team. You exploited our yieldcore-3rd-deal vault on April 29 via the redeem() vulnerability, draining 382,864 USDC from 7 users. We are offering a 20% white-hat bounty (~76,500 USDC equivalent) if you return the remaining 80% within 48

Defimon Alerts (@defimonalerts) 's Twitter Profile Photo

🚨 @YieldCore - Loss $398.6K (2026-04-28) Type: Access Control The RWAVault contract overrides the ERC4626 withdraw() function but removes the critical allowance check that prevents unauthorized withdrawals. In standard ERC4626, if msg.sender != owner, the caller must have a

🚨 @YieldCore - Loss $398.6K (2026-04-28)

Type: Access Control

The RWAVault contract overrides the ERC4626 withdraw() function but removes the critical allowance check that prevents unauthorized withdrawals. In standard ERC4626, if msg.sender != owner, the caller must have a
Defimon Alerts (@defimonalerts) 's Twitter Profile Photo

πŸ’¬ Onchain Message: Hey Purrlend Team, Don’t waste time with the "whitehat bounty" theater. We have already traced the flows, and the data points to a one-man inside job. Your "compromised signer" narrative has zero legs. You have 48 hours to return 100% of the funds stolen

Defimon Alerts (@defimonalerts) 's Twitter Profile Photo

πŸ’¬ Onchain Message: Authorities have been notified, this is the new address you're to refund to, giving you 30 minutes also giving you the chance to keep 5% as a whitehat bounty. You don't need a criminal record attached to your image. 0x948DC50d1f8d1b9034341E0746C8c80FAA6e6e2D

Defimon Alerts (@defimonalerts) 's Twitter Profile Photo

🚨 Wasabi Protocol 🟒 - Loss $4.5M (2026-04-30) Type: Compromised Admin Key The protocol admin EOA granted ADMIN_ROLE to the attacker's exploit contract which suggests a compromised private key. In the first drain tx the attacker called strategyDeposit() on 7 Wasabi vaults

🚨 <a href="/wasabi_protocol/">Wasabi Protocol 🟒</a>  - Loss $4.5M (2026-04-30)

Type: Compromised Admin Key

The protocol admin EOA granted ADMIN_ROLE to the attacker's exploit contract which suggests a compromised private key. 

In the first drain tx the attacker called strategyDeposit() on 7 Wasabi vaults
Defimon Alerts (@defimonalerts) 's Twitter Profile Photo

πŸ’¬ Onchain Message: Your funds have been intercepted by our whitehat bot, funds are SAFU. Please join t.me/+wnU2FE5MOHoyM… arbiscan.io/tx/0x17edc5bc5…

Defimon Alerts (@defimonalerts) 's Twitter Profile Photo

πŸ’¬ Onchain Message: We're the Wasabi team. Can we talk over blockscan chat about the return of funds and your bounty? Reply to 0xdfcf63b785818c47b4ae26a0b66014a0ede4763d etherscan.io/tx/0x875f3b587…

Defimon Alerts (@defimonalerts) 's Twitter Profile Photo

We've just returned to Wasabi Protocol 🟒 around 8000$ rescued in various tokens from the recent incident. In the course of the attack a WasabiLongPool contract on Base was upgraded by the malicious actor to drain the funds. After the implementation was upgraded our AI whitehat

We've just returned to <a href="/wasabi_protocol/">Wasabi Protocol 🟒</a> around 8000$ rescued in various tokens from the recent incident.

In the course of the attack a WasabiLongPool contract on Base was upgraded by the malicious actor to drain the funds. After the implementation was upgraded our AI whitehat
Defimon Alerts (@defimonalerts) 's Twitter Profile Photo

πŸ’¬ Onchain Message: LBP Protocol β€” white-hat negotiation. We acknowledge the exploit on 0x888841b1DC93CC25c6A193AC63C804F197888888 (txs 0xc5a662... and 0x47df1be...). Proposed terms (white-hat resolution): - Return 85% of extracted USDT (~123,250) to