Cryip
  • Home
  • News
  • Research & Analysis
  • Reviews & Comparisons
  • Learn Crypto
  • Features
No Result
View All Result
Cryip
  • Home
  • News
  • Research & Analysis
  • Reviews & Comparisons
  • Learn Crypto
  • Features
No Result
View All Result
Cryip
No Result
View All Result
Home News Security & Hacks

Inverse Finance Not Affected: sDOLA–crvUSD Curve LlamaLend Exploit Explained

BlockSec clarifies that Inverse Finance contracts were not compromised, identifying an oracle misconfiguration in the sDOLA–crvUSD Curve LlamaLend pool as the root cause of the $240K incident.

by Saravana Kumar Mahendran
March 2, 2026
in Security & Hacks
0 0
DOLA and DolaSavings
Share on FacebookShare on Twitter

A decentralized finance (DeFi) incident that initially raised concerns about a potential exploit at Inverse Finance has now been clarified, with security researchers confirming that the protocol’s core contracts were not compromised. Blockchain security firm BlockSec issued a correction after conducting further investigation and discussions with the Inverse Finance team. According to the firm, the actual issue occurred within the sDOLA–crvUSD Curve LlamaLend pool, rather than Inverse Finance itself.

 

LlamaLend Exploit
LlamaLend Exploit

Attack Details

  • Targeted Protocol: DOLA / DolaSavings

  • Blockchain: Ethereum (ETH)

  • Estimated Loss: ~$240,000

  • Transaction Hash:
    0xb93506af8f1a39f6a31e2d34f5f6a262c2799fef6e338640f42ab8737ed3d8a4

Oracle Configuration Identified as Root Cause

The investigation determined that the exploit stemmed from an improper oracle configuration implemented by the pool creator. Specifically, the pool relied directly on the spot price from sDOLA.convertToShares as its pricing input.

Security experts explained that using a spot price in this manner can introduce manipulation risks, as it may be temporarily influenced by large transactions. This vulnerability opened the door for price distortion within the lending pool.

Flash Loan Used to Trigger Liquidations

According to the analysis, the attacker executed the exploit using a large flash loan. The borrowed funds were used to redeem sDOLA tokens and then restake them as a donation, effectively manipulating the pool’s price mechanism.

This artificial price shift caused multiple borrower positions in the LlamaLend pool to fall below their liquidation thresholds. The attacker subsequently liquidated these positions, generating an estimated profit of approximately $240,000.

No Impact on Core Protocol

BlockSec emphasized that Inverse Finance’s smart contracts were not directly affected by the exploit. The vulnerability was isolated to the specific pool’s oracle setup rather than the core protocol infrastructure.

The incident highlights ongoing risks in DeFi ecosystems, particularly when integrating pricing mechanisms and oracle feeds. Experts note that even when primary protocol contracts remain secure, misconfigurations at the pool or integration level can still expose users to significant risk.

Disclaimer: Cryip is an independent media and research outlet providing news, data, and analysis on the cryptocurrency industry. Content is for informational and research purposes only and does not constitute financial, legal, tax, or investment advice. Cryptocurrency markets are volatile and past performance is not indicative of future results. References to specific assets, platforms, or incidents are for journalistic purposes only and do not imply endorsement, and readers assume full responsibility for their decisions.
Tags: Crypto Hacks

Related Posts

Hyperbridge Exploit
Security & Hacks

Polkadot Bridge Exploit: 1B Fake DOT Minted on Ethereum

by Saravana Kumar Mahendran
April 13, 2026

Security firm CertiK has confirmed a significant exploit targeting the Hyperbridge gateway contract. The attack enabled a malicious actor to...

Read moreDetails
SubQuery Staking Contract Exploit

SubQuery Staking Contract Exploit Triggers Withdrawals Pause

April 13, 2026
Weekly Crypto Market Overview April 06 – 12, 2026

Weekly Crypto Market Overview: April 06 – 12, 2026

April 13, 2026
Zerion Web App Shutdown

Zerion Web App Shutdown After Abnormal Activity, Funds Confirmed Safe

April 11, 2026
Aethir Hack

Aethir Hack Contained: Initial $423K Loss Revised to Under $90K After Swift Response

April 10, 2026
Hyperliquid Suicide Liquidation $FARTCOIN Perpetual Attack Drains $1.5M from HLP Vault

Hyperliquid Suicide Liquidation: FARTCOIN Perpetual Attack Drains $1.5M from HLP Vault

April 9, 2026
Bitcoin Depot Reports $3.6M Crypto Theft in Cyber Breach

Bitcoin Depot Reports $3.6M Crypto Theft in Cyber Breach

April 9, 2026
Next Post
Strategy Acquires 3,015 BTC; Total Bitcoin Holdings Reach 720,737

Strategy Acquires 3,015 BTC; Total Bitcoin Holdings Reach 720,737

Cryip focuses on crypto research and on-chain analysis, supported by coverage of markets, regulation, security events, and blockchain ecosystems.

Recent Posts

  • Upcoming Crypto Token Unlocks: $61.66M Across 35 Tokens (Apr 13 – 19, 2026)
  • Bank of Korea Proposes Crypto Market Circuit Breaker After Bithumb Incident
  • Polkadot Bridge Exploit: 1B Fake DOT Minted on Ethereum

Categories

  • AI × Crypto
  • Data & Dashboards
  • Market Updates
  • On-Chain Analysis
  • OpSec
  • Policy & Regulation
  • Post Mortems
  • Reports
  • Scams & Fraud
  • Security & Hacks
  • Stablecoins
  • Tokenomics
  • VC & Funding

Company

  • About Us
  • Contact Us
  • Editorial Standards & Integrity
  • Our Team
  • Privacy Policy
  • Review Methodology
  • Terms and Conditions
  • Trust, Disclosures & Independence

© 2026 Cryip - Research-Driven Crypto Analysis & News by Hashlays.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Home
  • News
  • Research & Analysis
  • Reviews & Comparisons
  • Learn Crypto
  • Features

© 2026 Cryip - Research-Driven Crypto Analysis & News by Hashlays.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.