Cetus Protocol
Arithmetic overflow in checked_shlw function of the integer-mate u256 math library: the bitmask for the overflow guard was off-by-(2^64-1), allowing inputs exactly equal to the mask to pass silently. Attacker used a flash swap to bootstrap a precisely crafted narrow-tick CLMM position, triggered the overflow to receive near-infinite liquidity credits for near-zero token cost, then drained pool reserves via remove_liquidity. Attack repeated across pools. $162M frozen on-chain by Sui validators; $60M bridged to Ethereum.
What Hindenrank Would Have Said
As of April 1, 2025
“Cetus earns D+ for risk — while it is a legitimate, well-audited protocol that pioneered concentrated liquidity on Sui, it operates on a novel blockchain language (Move, launched 2022) using a custom big-number arithmetic library that has not been stress-tested at Ethereum scale. The LaaS model makes Cetus a systemic single-point-of-failure for the Sui DeFi ecosystem, amplifying any exploit's impact. Appropriate for risk-tolerant users only.”
Grade Predicted This Failure
Flagged by dimensions: Mechanism Novelty, Interaction Severity, Oracle Surface, Documentation Quality, Scale Exposure
One or more collapse scenarios directly matched the actual failure mode.
Top Risks Identified
- 1.Custom integer-mate u256 math library implements CLMM tick arithmetic in Move language — a 2-year-old blockchain language with limited DeFi battle-testing and tooling maturity
- 2.Primary liquidity infrastructure for the entire Sui DeFi ecosystem: Cetus failure cascades through all protocols using CetusSDK for liquidity and price data
- 3.Flash swap attack surface combined with concentrated liquidity mechanics enables precisely crafted pool drain strategies using the CLMM's own math as a weapon
Collapse Scenarios
CLMM Math Library Overflow Exploit
ElevatedAttacker discovers that the checked_shlw function in the integer-mate u256 library accepts inputs exactly equal to its bitmask, silently proceeding through the overflow guard and corrupting the << 64 shift operation. Uses a flash swap to bootstrap the attack without requiring upfront capital.
Uniswap V3 and other CLMM implementations have been exploited via precision/rounding issues in tick math; custom big-number arithmetic in new languages has historically been a primary exploit surface (cf. Compound's oracle manipulation via integer math in 2021)
Oracle Manipulation via Concentrated Liquidity Price Push
ModerateAttacker with sufficient capital executes large concentrated swaps within thin tick ranges to dramatically move the spot price, corrupting Cetus TWAP oracle data used by dependent Sui lending protocols.
Mango Markets ($114M, 2022): attacker manipulated MNGO perpetual price using concentrated buying, then borrowed against inflated collateral. CLMM-as-oracle designs replicate this risk.
See how today's protocols score
The same 8-dimension rubric applied to 672+ live protocols.