$SUI
Cetus Suffers $230M Loss After Overflow Exploit
In a major blow to the DeFi ecosystem, blockchain security firm SlowMist has uncovered how a $230 million exploit was carried out against Cetus. The attacker took advantage of a critical overflow vulnerability within the get_delta_a function—specifically bypassing the checked_shlw overflow check.
This loophole allowed the attacker to manipulate input parameters, causing the system to miscalculate the required amount of haSUI tokens. As a result, they were able to swap a tiny amount of tokens for an enormous amount of liquidity.
The breach highlights the serious risks posed by unchecked mathematical operations in smart contracts. By precisely selecting inputs and exploiting the flaw in overflow detection, the attacker drained vast liquidity using just a single token. This sophisticated maneuver is a wake-up call for developers to rigorously test and validate all boundary conditions during smart contract development.