<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://quadrigainitiative.com/cryptocurrencyhackscamfraudwiki/index.php?action=history&amp;feed=atom&amp;title=Velocore_Faulty_Pool_Execution_Logic</id>
	<title>Velocore Faulty Pool Execution Logic - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://quadrigainitiative.com/cryptocurrencyhackscamfraudwiki/index.php?action=history&amp;feed=atom&amp;title=Velocore_Faulty_Pool_Execution_Logic"/>
	<link rel="alternate" type="text/html" href="https://quadrigainitiative.com/cryptocurrencyhackscamfraudwiki/index.php?title=Velocore_Faulty_Pool_Execution_Logic&amp;action=history"/>
	<updated>2026-04-16T12:47:08Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.39.1</generator>
	<entry>
		<id>https://quadrigainitiative.com/cryptocurrencyhackscamfraudwiki/index.php?title=Velocore_Faulty_Pool_Execution_Logic&amp;diff=6001&amp;oldid=prev</id>
		<title>Azoundria: Created page with &quot;{{Imported Case Study With About|source=https://www.quadrigainitiative.com/casestudy/velocorefaultypoolexecutionlogic.php}} {{Unattributed Sources}}  Velocore Logo/HomepageVelocore offers a complex layer 2 solution, which includes decentralized exchanges between different token pairs. A vulnerability in the liquidity pools backing the swaps allowed for an attacker to execute swaps and increase the fee beyond 100%. Once the fee was beyond 100%,...&quot;</title>
		<link rel="alternate" type="text/html" href="https://quadrigainitiative.com/cryptocurrencyhackscamfraudwiki/index.php?title=Velocore_Faulty_Pool_Execution_Logic&amp;diff=6001&amp;oldid=prev"/>
		<updated>2024-09-17T19:30:18Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;{{Imported Case Study With About|source=https://www.quadrigainitiative.com/casestudy/velocorefaultypoolexecutionlogic.php}} {{Unattributed Sources}}  &lt;a href=&quot;/cryptocurrencyhackscamfraudwiki/index.php?title=File:Velocore.jpg&quot; title=&quot;File:Velocore.jpg&quot;&gt;thumb|Velocore Logo/Homepage&lt;/a&gt;Velocore offers a complex layer 2 solution, which includes decentralized exchanges between different token pairs. A vulnerability in the liquidity pools backing the swaps allowed for an attacker to execute swaps and increase the fee beyond 100%. Once the fee was beyond 100%,...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{Imported Case Study With About|source=https://www.quadrigainitiative.com/casestudy/velocorefaultypoolexecutionlogic.php}}&lt;br /&gt;
{{Unattributed Sources}}&lt;br /&gt;
&lt;br /&gt;
[[File:Velocore.jpg|thumb|Velocore Logo/Homepage]]Velocore offers a complex layer 2 solution, which includes decentralized exchanges between different token pairs. A vulnerability in the liquidity pools backing the swaps allowed for an attacker to execute swaps and increase the fee beyond 100%. Once the fee was beyond 100%, a flash loan allowed the attacker to scoop up most of the tokens and contracts in the pool. The attacker was offered a 10% bounty. They have a chance to remain anonymous as they both sent and received funds via TornadoCash.&amp;lt;ref name=&amp;quot;rektnews-14107&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;juliahexicantwitter-14108&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;officerciatwitter-14109&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;velocorexyzmedium-14110&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;beincrypto-14111&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;velocoregithub-14112&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;lineascan-14113&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;lineascan-14114&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;zksyncexplorer-14115&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;velocore-14116&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;unnamed-14553&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== About Velocore ==&lt;br /&gt;
&amp;quot;As the zkSync era is still in its early stages, major protocols may receive incentives or airdrops during the TGE. ZkSync is an even bigger project than Arbitrum, and we're eager to give back to our early supporters. Let's build the ecosystem in the zkSync era together!&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Drawing inspiration from Andre Cronje's Solidly, Velocore adopts an innovative perspective on the voting-escrow paradigm. The core of Velocore integrates an exponential decay mechanism, guaranteeing a resilient token model for the foreseeable future. The VC framework prioritizes rewarding long-term proponents and harmonizes stakeholder interests by encouraging fee generation.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Embrace the future of DeFi with Velocore by participating in the launchpad for the cutting-edge DeFi protocol in zkSync Mainnet Era&amp;quot; &amp;quot;At Velocore, we empower visionaries like you to fuel groundbreaking innovations and create limitless opportunities.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== The Reality ==&lt;br /&gt;
&amp;quot;The velo in Velocore proved too fast and furious, as the L2 DEX lost over $6.8 million in a devastating exploit on June 2nd across its pools on Linea and zkSync.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;The primary cause of the incident was faulty logic within the ‘velocore__execute()’ function of the ConstantProductPool. When a user makes a swap on Velocore, the Vault contract makes an external call to this function to calculate the result of the swap.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== What Happened ==&lt;br /&gt;
&amp;quot;According to the post-mortem from Velocore, the attacker sourced funds from Tornado Cash, bridged over to execute the dastardly exploit, and then deposited the ill-gotten gains back into Tornado Cash.&amp;quot;&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+Key Event Timeline - Velocore Faulty Pool Execution Logic&lt;br /&gt;
!Date&lt;br /&gt;
!Event&lt;br /&gt;
!Description&lt;br /&gt;
|-&lt;br /&gt;
|June 1st, 2024 4:21:29 PM MDT&lt;br /&gt;
|Linea Attack Transaction&lt;br /&gt;
|The first attack transaction on the Linea blockchain.&lt;br /&gt;
|-&lt;br /&gt;
|June 1st, 2024 4:37:29 PM MDT&lt;br /&gt;
|Linea Attack Transaction&lt;br /&gt;
|The second attack transaction on the Linea blockchain.&lt;br /&gt;
|-&lt;br /&gt;
|June 1st, 2024 4:38:00 PM MDT&lt;br /&gt;
|ZKSync Transaction&lt;br /&gt;
|The ZKSync transaction associated.&lt;br /&gt;
|-&lt;br /&gt;
|June 1st, 2024 6:52:00 PM MDT&lt;br /&gt;
|Hack Tweet Reported&lt;br /&gt;
|The attack is reported on Twitter by user officer_cia, and estimated at $10m lost.&lt;br /&gt;
|-&lt;br /&gt;
|June 2nd, 2024 1:22:00 AM MDT&lt;br /&gt;
|BeInCrypto Article&lt;br /&gt;
|BeInCrypto publishes a report on the exploit having happened.&lt;br /&gt;
|-&lt;br /&gt;
|June 2nd, 2024 9:30:42 AM MDT&lt;br /&gt;
|Post-Mortem Published&lt;br /&gt;
|The Velocore team publishes a post-mortem report on Medium.&lt;br /&gt;
|-&lt;br /&gt;
|June 2nd, 2024 12:09:00 PM MDT&lt;br /&gt;
|Centralization Concerns&lt;br /&gt;
|Centralization concerns are discussed after the Linea blockchain was shut down over the hack.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Technical Details ==&lt;br /&gt;
&amp;quot;The flurry of transactions started with the attacker directly invoking velocore__execute() to simulate huge withdrawals and jack up the feeMultiplier. With that jacked-up multiplier inflating effectiveFee1e9 past 100%, the villain executed a flash loan to scoop up most of the tokens and contract the pool.&lt;br /&gt;
&lt;br /&gt;
Finally, a small single-token withdrawal minted an egregiously large amount of liquidity tokens due to an underflow error, allowing the drainer to easily repay the flash loan and skip town with $6.8 million in ETH.&lt;br /&gt;
&lt;br /&gt;
According to an analysis of the incident from Beosin, the LP Pool lacks permission verification. The attacker directly invoke the velocore__execute function (0xec378808) of the LP contract with a carefully constructed parameter to manipulate the feeMultiplier parameter of the contract.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== Total Amount Lost ==&lt;br /&gt;
Most sources $10m. Velocore postmortem approximating $6.8 million in ETH.&lt;br /&gt;
&lt;br /&gt;
The total amount lost has been estimated at $6,800,000 USD.&lt;br /&gt;
&lt;br /&gt;
== Immediate Reactions ==&lt;br /&gt;
&amp;quot;The hack led the Linea team to halt block production, which has since resumed.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Velocore has offered a 10% bug bounty to the hacker, who has yet to respond.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;We received a critical security alert from Cyvers after the first Linea exploit. Since we revoked our admin rights from the vault last year, we couldn’t upgrade the proxy to completely block transactions. Instead, we implemented a semi-pause function by setting the fee to the maximum, which would interrupt swaps while allowing withdrawals in case of an emergency. However, in this case, the proper mitigation was to set the fee to 0%, not to max. Unfortunately, we realized this only after reverse-engineering the transactions, and by then, it was too late.&lt;br /&gt;
&lt;br /&gt;
To mitigate the issue and prevent further damage, we have set the fee to 0 for all pools. Consequently, the ‘effectiveFee1e9’ value will always be 0, effectively disabling the vulnerability described above. This measure ensures that the exploit cannot be leveraged anymore.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== Ultimate Outcome ==&lt;br /&gt;
&amp;quot;In light of the recent incident impacting our protocol, Velocore is committed to taking comprehensive measures to resolve the situation and ensure the security and trust of our users.&lt;br /&gt;
We are actively investigating to track down hackers while trying the on-chain negotiation, having requested cooperation from various protocols and central exchanges to investigate the attacker’s activities. We are also in close communication with our security partners and foundations. Based on the results of these investigations and our collaboration with partners, we will continuously adjust our future plans.&lt;br /&gt;
For those affected, we have taken a snapshot of the blockchain state prior to the incident. Once operations resume, we will implement an appropriate compensation plan to address the losses incurred to our users. We understand the importance of transparency and fairness in these times and are dedicated to providing clear and effective solutions.&lt;br /&gt;
Our goal is not only to resolve this issue but also to enhance the protocol’s security measures, rebuild trust, and minimize the damage.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== Total Amount Recovered ==&lt;br /&gt;
The total amount recovered is unknown.&lt;br /&gt;
&lt;br /&gt;
What funds were recovered? What funds were reimbursed for those affected users?&lt;br /&gt;
&lt;br /&gt;
== Ongoing Developments ==&lt;br /&gt;
What parts of this case are still remaining to be concluded?&lt;br /&gt;
== Individual Prevention Policies ==&lt;br /&gt;
{{Prevention:Individuals:Placeholder}}&lt;br /&gt;
&lt;br /&gt;
{{Prevention:Individuals:End}}&lt;br /&gt;
&lt;br /&gt;
== Platform Prevention Policies ==&lt;br /&gt;
{{Prevention:Platforms:Placeholder}}&lt;br /&gt;
&lt;br /&gt;
{{Prevention:Platforms:End}}&lt;br /&gt;
&lt;br /&gt;
== Regulatory Prevention Policies ==&lt;br /&gt;
{{Prevention:Regulators:Placeholder}}&lt;br /&gt;
&lt;br /&gt;
{{Prevention:Regulators:End}}&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&amp;lt;references&amp;gt;&amp;lt;ref name=&amp;quot;rektnews-14107&amp;quot;&amp;gt;[https://rekt.news/velocore-rekt/ Rekt - Velocore - Rekt] (Accessed Jun 3, 2024)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;juliahexicantwitter-14108&amp;quot;&amp;gt;[https://twitter.com/Julia_Hexican/status/1797329629704810719 @Julia_Hexican Twitter] (Accessed Jun 3, 2024)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;officerciatwitter-14109&amp;quot;&amp;gt;[https://twitter.com/officer_cia/status/1797068809959854340 @officer_cia Twitter] (Accessed Jun 3, 2024)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;velocorexyzmedium-14110&amp;quot;&amp;gt;[https://velocorexyz.medium.com/velocore-incident-post-mortem-6197020ec3e9 Velocore Incident Post Mortem] (Accessed Jun 3, 2024)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;beincrypto-14111&amp;quot;&amp;gt;[https://beincrypto.com/velocore-decentralized-exchange-10-million-hack/ $10 Million Hack Hits Decentralized Exchange Velocore] (Accessed Jun 3, 2024)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;velocoregithub-14112&amp;quot;&amp;gt;[https://github.com/velocore/velocore-contracts/blob/master/src/pools/constant-product/ConstantProductPool.sol velocore-contracts/src/pools/constant-product/ConstantProductPool.sol at master · velocore/velocore-contracts · GitHub] (Accessed Jun 3, 2024)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;lineascan-14113&amp;quot;&amp;gt;[https://lineascan.build/tx/0xed11d5b013bf3296b1507da38b7bcb97845dd037d33d3d1b0c5e763889cdbed1 Linea Mainnet Transaction Hash (Txhash) Details | LineaScan] (Accessed Jun 3, 2024)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;lineascan-14114&amp;quot;&amp;gt;[https://lineascan.build/tx/0x37434e674efc4e7cfeed7746095301ace5636028906fe548b786ead286e35eb0 Linea Mainnet Transaction Hash (Txhash) Details | LineaScan] (Accessed Jun 3, 2024)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;zksyncexplorer-14115&amp;quot;&amp;gt;[https://explorer.zksync.io/tx/0x4156d73cadc18419220f5bcf10deb4d97a3d3f7533d63ba90daeabc5fd11ba17 zkSync Era Block Explorer] (Accessed Jun 3, 2024)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;velocore-14116&amp;quot;&amp;gt;[https://velocore.xyz/ Velocore] (Accessed Jun 3, 2024)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;unnamed-14553&amp;quot;&amp;gt;[https://x.com/ChainAegis/status/1797107667397427570 x.com] (Accessed Jul 3, 2024)&amp;lt;/ref&amp;gt;&amp;lt;/references&amp;gt;&lt;/div&gt;</summary>
		<author><name>Azoundria</name></author>
	</entry>
</feed>