No connection

Search Results

Crypto Score 32 Bearish

ZetaChain Admits Bug Bounty Oversight Following $334,000 Exploit

Apr 29, 2026 12:17 UTC
ZETA
Short term

ZetaChain has revealed that a vulnerability leading to a $334,000 loss was previously flagged by a researcher but dismissed by the team. The exploit targeted the protocol's cross-chain gateway, though the company maintains that no user funds were compromised.

  • $334,000 drained across Ethereum, Arbitrum, Base, and BSC
  • Vulnerability was previously reported but dismissed as intended behavior
  • Attack combined arbitrary call functionality and unlimited spending permissions
  • Patch being rolled out to disable arbitrary call functionality
  • No user funds were lost in the incident

ZetaChain is reviewing its security protocols after a premeditated attack drained approximately $334,000 from wallets controlled by the platform. In a recent post-mortem, the project admitted that the vulnerability had been reported through its bug bounty program prior to the event but was incorrectly dismissed as intended behavior. The exploit targeted the protocol's cross-chain gateway contract, executing nine transactions across Ethereum, Arbitrum, Base, and BSC. The attacker utilized a sophisticated approach, funding their wallet via Tornado Cash and deploying a custom drainer contract three days before the attack, alongside an address poisoning campaign. According to the post-mortem, the breach resulted from a combination of three design flaws. These included the ability to send arbitrary cross-chain instructions without restrictions, a narrow blocklist that failed to restrict basic token transfers on the receiving end, and the persistence of unlimited spending permissions for previous gateway users. To prevent future occurrences, ZetaChain is deploying a patch to mainnet nodes to permanently disable arbitrary call functionality. Additionally, the platform is updating its deposit flow to replace unlimited token approvals with exact-amount approvals. The company stated that the incident has prompted a broader review of how it handles bug bounty submissions, particularly those involving chained attack vectors.

Sign up free to read the full analysis

Create a free account to unlock full AI-curated market articles, personalized alerts, and more.

Share this article

Related Articles

Stay Ahead of the Markets

Join thousands of traders using AI-powered market intelligence. Get personalized insights, real-time alerts, and advanced analysis tools.

Home
Terminal
AI Chat
Markets
Profile