Euler Finance (Backtest)
Attacker exploited a vulnerability in the donateToReserves function combined with flash-loan-funded leveraged borrowing to manipulate eToken/dToken exchange rates. The donateToReserves function burned eTokens (collateral) without checking the caller's liquidity status, allowing the attacker to create deeply undercollateralized positions and then self-liquidate at the maximum 20% penalty, draining $197M across DAI, WBTC, stETH, and USDC markets.
What Hindenrank Would Have Said
As of February 1, 2023
“Elevated risk — high mechanism novelty and complex flash loan interaction surface create material attack vectors, partially offset by multiple audits and a clean 14-month track record.”
Scenario Predicted the Failure Mode
The C grade (50/100) did not cross the D+ threshold for a high-risk flag. However, our collapse scenario analysis predicted the exact failure mode that occurred.
Flagged by dimensions: Mechanism Novelty, Interaction Severity, Oracle Surface
One or more collapse scenarios directly matched the actual failure mode.
Top Risks Identified
- 1.Flash loans combined with deferred liquidity checks and leveraged borrowing create a wide attack surface for multi-step manipulation. Euler's sub-account system allows deferring health checks across a batch transaction, meaning an attacker could build up complex undercollateralized positions within a single transaction before liquidity is verified.
- 2.Permissionless asset listing enables anyone to create lending markets for any ERC-20 token with a Uniswap V3 WETH pair, relying on Uniswap V3 TWAP oracles that may be manipulable for low-liquidity tokens. The tiered asset classification (isolation/cross/collateral) mitigates but does not eliminate this risk, as even isolation-tier assets can be borrowed against.
- 3.Tokenized debt (dTokens) combined with the soft liquidation mechanism creates potential for self-liquidation attacks. The transferability of debt tokens and the graduated penalty structure (0% to 20% based on health factor) could be exploited to extract value from the reserve system.
- 4.The protocol's codebase is significantly more complex than established lending protocols like Aave or Compound — sub-accounts, deferred liquidity checks, permissionless markets, reactive interest rates, and soft liquidations all increase the surface area for smart contract vulnerabilities, despite having undergone multiple audits.
Collapse Scenarios
Flash Loan Leveraged Position Manipulation via Deferred Liquidity Checks
ElevatedAttacker identifies a function in Euler's smart contracts that modifies eToken or dToken balances without a subsequent liquidity check, allowing manipulation of collateral-to-debt ratios within a deferred-check batch transaction
Cream Finance v2 suffered a $130M flash loan exploit in October 2021 via price manipulation of a self-listed token (similar to Euler's permissionless listing). Beanstalk lost $182M in April 2022 via a flash-loan-funded governance attack. Both exploited the interaction between flash loans and protocol-specific mechanisms.
Oracle Manipulation on Permissionless Low-Liquidity Markets
ModerateA newly listed isolation-tier token on Euler has less than $1M in Uniswap V3 liquidity, making the TWAP oracle manipulable for under $500K in capital over a multi-block window
Mango Markets lost $116M in October 2022 when an attacker manipulated the price of the MNGO token on thin markets to inflate their collateral value and drain the protocol's deposits. The attack exploited the same class of vulnerability: oracle manipulation on a permissionless market with thin liquidity.
See how today's protocols score
The same 8-dimension rubric applied to 672+ live protocols.