温馨提示:本站仅提供公开网络链接索引服务,不存储、不篡改任何第三方内容,所有内容版权归原作者所有
AI智能索引来源:http://www.bee.com/ru/58256.html
点击访问原文链接

The Plunge: Oracle Vulnerabilities and the DeFi Test of Billions of Dollars | Bee Network

The Plunge: Oracle Vulnerabilities and the DeFi Test of Billions of Dollars | Bee Network Login Актуальные новости Запуск мемов Агенты искусственного интеллекта DeSci TopChainExplorer Для Ньюби 100-кратное количество монет Игра "Пчелка Основные веб-сайты Must-Have APP Криптознаменитости DePIN Новички насущные Детектор-ловушка Основные инструменты Продвинутые веб-сайты Обмен Инструменты NFT Привет, Выйти Вселенная Web3 Игры DApp Пчелиный улей Растущая платформа AD Поиск Английский язык Монеты для пополнения запасов Вход в систему Скачать Web3 Uni Игры DApp Пчелиный улей AD домАнализ•The Plunge: Oracle Vulnerabilities and the DeFi Test of Billions of Dollars The Plunge: Oracle Vulnerabilities and the DeFi Test of Billions of DollarsАнализ5 месяцев назадUpdateУайатт 18 143 7

Original translation: TechFlow

On October 10-11, 2025, a $60 million market sell-off destroyed $19.3 billion in value. This was not caused by a market crash or a cascading liquidation of truly damaged positions, but rather by an oracle failure.

This isn’t new. The same attack model has been successfully exploited numerous times since February 2020, resulting in dozens of incidents across the industry totaling hundreds of millions of dollars in losses. However, the October 2025 incident amplified the scale of the previous largest oracle attack by 160 times—not due to increased technical sophistication, but rather to the expansion of the underlying system while maintaining the same fundamental vulnerability.

Over the past five years, we have paid a high price, yet we have failed to learn our lesson. This article will analyze the reasons.

The Oracle Dilemma: Sensitivity vs. Stability

Every platform faces a fundamental challenge when using leverage: how to accurately price collateral while preventing price manipulation?

Overly sensitive → vulnerable to manipulation attacks Too stable → unable to reflect real losses in a timely manner

The October 2025 event selected “Sensitivity.” The oracle faithfully tracked the spot market price, and when $60 million worth of assets were sold off, the oracle adjusted the collateral price downward in real time, triggering a mass liquidation. The system performed exactly as designed.

However, this design was disastrous.

A model that has been ignored for five years

Before analyzing the events of October 2025, we need to understand that this is not the first time this has happened.

Previous Periods (2020-2022)

February 2020: bZx ($350,000 + $630,000 lost) uses a single-source oracle. Flash loans manipulate the price of WBTC on Uniswap. 14.6% of the total supply was moved to manipulate the price data bZx relies on.

October 2020: Harvest Finance ($24 million stolen, $570 million run) manipulated the price of Curve’s stablecoin using a $50 million flash loan in just seven minutes. This triggered an infrastructure collapse and a massive liquidity withdrawal, resulting in losses far exceeding the initial theft amount.

November 2020: Compound ($89 million in liquidations) saw DAI on Coinbase Pro briefly spike to $1.30, a phenomenon unseen on this exchange. Compound’s oracle, which uses Coinbase’s price as a benchmark, led to users being liquidated due to a brief price anomaly. Manipulation required $100,000 to leverage an order book with a depth of $300,000.

October 2022: Mango Рынокs ($117 million loss) leveraged its initial $5 million capital to drive the price of the MNGO token up 2,394% across multiple trading platforms. It subsequently borrowed $117 million against high collateral and used the stolen governance tokens to vote for itself, earning $47 million in “bug bounties.” This marked the first enforcement action by the U.S. Commodity Futures Trading Commission (CFTC) against oracle manipulation.

Commonalities

Each attack follows the same logic:

Identify the manipulated data sources the oracle relies on Calculation: Manipulation cost Carrying out the attack Profit

2020-2022: 41 oracle manipulation attacks resulted in $403.2 million stolen.

Industry Response: Responses have been fragmented, slow, and incomplete. Most platforms are still using spot-based oracles with insufficient redundancy.

Then, the events of October 2025 occurred.

The Anatomy of an Oracle Failure: 2025 Edition

October 10, 2025, 5:43 AM: $60 million worth of USDe is sold into the spot market.

In a properly designed oracle: multiple independent data sources will absorb the shock and the impact will be minimal.

In this oracle: Disaster happens.

$60 million in spot sell-off → Oracles lower collateral prices (wBETH, BNSOL, USDe) → Mass liquidation triggered → Infrastructure overload → Liquidity vacuum → $19.3 billion in assets evaporated

Amplification effect

Mango Markets (2022) : $5 million manipulated → $117 million withdrawn (23x) October 2025 : $60 million manipulated → $19.3 billion destroyed (322x)

This is not due to increased technological complexity, but rather to the same vulnerabilities being magnified to an institutional scale.

Weight distribution problem

This oracle relies heavily on spot prices from major exchanges. When a single exchange dominates the trading volume:

High trading volume appears to indicate reliable price discovery (seemingly reasonable) Centralization increases the risk of manipulation (an Achilles’ heel) A single internal price creates a self-perpetuating cycle (exacerbating the problem)

One analyst’s comment reveals the flaw in this logic: “Because [the exchange] has the largest trading volume for usde/bnsol/wbeth, according to the oracle weight distribution, it should refer to the spot price.”

This instinct—believing in the largest market—has led to billions of dollars in losses over five years. Concentrated trading volume is not evidence of accurate prices; it signals an opportunity for manipulation.

Scheduled vulnerability window

The oracle method update was announced eight days before implementation. This gave the attackers:

Oracle Dependencies Predictable transition timing Eight days of preparation

While previous oracle attacks exploited existing vulnerabilities, the October 2025 attack exploited a vulnerability during the oracle method switch—a vulnerability that existed only because the improvement was announced early.

Site isolation testing

The clearest evidence suggests that this incident was caused by oracle failure, not asset loss:

Major exchanges : USDe price is $0.6567, wBETH price is $430 Other trading platforms : price deviation is less than 30 basis points On-chain liquidity pool : minimal impact

As Ethena’s Guy noted: “During the event, over $9 billion in stablecoin collateral remained available for immediate redemption.”

Prices fluctuated wildly on the exchanges the oracle sourced its data from, while remaining stable elsewhere. The oracle reported manipulated prices, triggering liquidations based on prices that didn’t exist elsewhere in the market.

This is exactly the same pattern as the Compound incident in 2020: price manipulation in isolated trading venues was recorded by oracles, causing systemic damage.

The ripple effect of infrastructure

Analyst agintender points out the amplification mechanism:

“Chained liquidations caused servers to be overloaded with millions of requests. Market makers were unable to bid in a timely manner, creating a liquidity vacuum.”

This is exactly the amplified version of the Harvest Finance incident in 2020. The attack triggered liquidations faster than the infrastructure could process, market makers were unable to respond, liquidity disappeared, and the chain reaction became self-reinforcing.

After Harvest Finance’s infrastructure collapse in October 2020 (TVL dropped from $1 billion to $599 million as users withdrew their funds), the lesson was clear: oracle systems must account for infrastructure capacity during stress events.

However, the events of October 2025 proved that we had not learned our lesson.

Sensitivity Tradeoffs: Two Approaches, One Disaster

Guy from Ethena articulated the core design challenge: the oracle must distinguish between short-term temporary deviations (market noise) and long-term asset impairment (true losses).

October 2025 shows two possible responses:

High sensitivity method (failed exchanges)

Track spot prices in real time Quickly respond to market changes The result : a $19.3 billion ripple effect

This is the bZx/Harvest approach: trusting the spot market, only to be destroyed by manipulation.

High Stability Method (Surviving DeFi Platform)

Hard-written USDe = USDT Ignore short-term market noise Result : No liquidation

This is an overcorrection, which is better than failure, but still not optimal.

The industry had five years to develop a nuanced solution. We found neither an optimal solution nor an acceptable solution—we fell into two extremes, and institutional scale ultimately chose the catastrophic solution.

Oracle Attack Theorem: Now Experimentally Proven

Theorem : In any lever system, if the following conditions are met:

Oracle prices rely heavily on the manipulable spot market Liquidation trigger conditions are deterministic Infrastructure has capacity limitations

Then: manipulation cost

Proof verified by repeated practice:

bZx (February 2020) : Uniswap manipulation → $350,000 + $630,000 withdrawn Harvest (October 2020) : Curve manipulation → $24 million stolen + triggered a $570 million bank run Compound (November 2020) : Coinbase manipulation → $89 million liquidated Mango (October 2022) : Multi-platform manipulation → Withdrawal of $117 million October 2025 : Major exchange manipulation → $19.3 billion lost

As the system scales linearly, the scale of damage increases exponentially. The cost of manipulation remains roughly constant (determined by liquidity), but the extractable value increases as the total amount of leverage in the system grows.

October 2025 verified this theorem on an unprecedented scale.

Oracle Design Principles: Lessons We Should Have Learned Multi-source verification

Never rely on a single exchange price, especially one from its own order book. This was the lesson of the bZx incident in February 2020. A sound oracle design requires:

Oracle price = weighted average of various data sources:

Prices on multiple exchanges (40%) On-chain liquidity pool (30%) Conversion rate of packaging assets (20%) Time-weighted historical prices (10%)

Weight distribution is not as important as data source independence. If all data sources can be manipulated simultaneously by reasonable capital, then you actually have only one data source, not multiple.

Adaptive sensitivity

Oracles should adjust their sensitivity based on market conditions:

Normal market : more sensitive to price changes Volatile Markets : Adding Stability Through Time Weighting Extreme Volatility: Circuit Breakers and Sanity Checks

Time-weighted average price (TWAP) oracles were widely adopted after the 2020 flash loan attacks, specifically to prevent manipulation of a single transaction. However, the oracle in October 2025 responded to the spot price in real time, as if no such incident had occurred in the past five years.

Infrastructure resilience

The oracle system must remain functional across chain events:

Independent price data infrastructure Capacity to support millions of concurrent queries Graceful degradation mechanism under high load

The October 2020 Harvest Finance infrastructure collapse highlighted the importance of system capacity under stress. Liquidation chain reactions generate exponentially increasing load. Your infrastructure must handle not only the first liquidation, but also the 1,000th liquidation when market makers can’t keep up and users panic.

Transparent but without loopholes

The 8-day window between announcement and implementation created a known attack vector. Better approaches include:

Implement changes immediately after publication Use rolling updates without fixed dates Keep audit records but avoid preview periods

This is a new lesson, but one that makes sense from a game theory perspective: Never announce exploitable changes in advance . The attackers in October 2025 had eight days to plan, lay out, and prepare. They knew precisely when the window of vulnerability would open.

Systemic impacts: lessons unlearned

This isn’t just a failure of a single platform, but rather exposes widespread vulnerabilities that the entire industry hasn’t addressed even after five years of expensive education:

Over-reliance on spot prices

Despite exploiting this vulnerability in every major attack since 2020, most platforms still use oracle designs that primarily focus on spot prices. The industry knows that spot prices are susceptible to manipulation, and that time-weighted average prices (TWAP) and multi-source oracles offer better protection, but implementation remains incomplete.

Speed and sensitivity are advantages in normal circumstances, but become fatal flaws when it comes to manipulation. Real-time price updates appear more accurate until someone manipulates them.

Concentration risk

Dominant trading venues become single points of failure. This was evident with bZx’s reliance on Uniswap, Compound’s reliance on Coinbase, and, in October 2025, the platform’s reliance on its own order book. Обменs may differ, but the vulnerabilities remain the same.

When a single exchange accounts for the majority of trading volume, it seems logical to use it as the primary oracle data source. However, the risk of price data concentration is like the risk of concentration in any system: it may seem harmless until exploited, but once exploited, the consequences can be severe.

Infrastructure assumptions

Systems designed for normal markets will completely break down under stress. Harvest Finance proved this in 2020, and October 2025 proved it again. We’re still designing systems for normal conditions and hoping that stress never happens.

Hope is not a strategy.

The transparency paradox

Publicizing improvements creates an attack window. The eight-day gap between the announcement and implementation of the oracle change provided attackers with a clear roadmap and timeline. They knew exactly when to launch their attack and how to exploit the vulnerability.

This is a new failure mode, but the problem remains essentially unsolved. While previous oracle attacks exploited existing vulnerabilities, the October 2025 attack exploited a vulnerability during the oracle method switch—a vulnerability that existed only because the change was announced early.

Way forward: Have we really learned our lesson this time?

Improve now

The hybrid oracle design combines multiple price sources with practical and efficient sanity checks: Centralized exchange prices (weighted by exchange trading volume) Decentralized exchange prices (high liquidity pools only) On-chain Proof of Reserves Cross-exchange deviation limits

Each data source should be independent of each other. If manipulating one data source affects other data sources, there is no redundancy.

Dynamic weight adjustment adjusts the oracle sensitivity according to market conditions: Normal Fluctuation: Standard Weight High volatility: Increase TWAP window to reduce spot impact Extreme volatility: Liquidations suspended pending investigation and subsequent action

The Compound attack demonstrated that sometimes the “correct” price on a single exchange can be wrong for the entire market. Your oracle should be smart enough to recognize this.

Circuit breakers suspend liquidations during periods of extreme price volatility — not to prevent legitimate deleveraging, but to distinguish manipulation from market reality: If prices converge across venues within a few minutes: it could be real If price fluctuations are limited to one venue: Possible manipulation If infrastructure is overloaded: suspend liquidation until capacity is restored

The goal is not to prevent all liquidations, but to prevent cascading liquidations triggered by price manipulation.

The infrastructure expansion was designed to handle 100 times the normal system capacity, as the chain reaction would create this level of load: Independent price data infrastructure Independent liquidation engine Rate limiting for a single address Graceful degradation protocol

If your system can’t handle the load during a chain reaction, it will amplify the chain reaction. This is a design requirement, not an optimization option.

Long-term solution

Decentralized oracle networks use mature oracle solutions like Chainlink, Python, or UMA, which aggregate multiple data sources and have built-in manipulation resistance. These solutions are not perfect, but they are better than relying on spot oracles that are exploited every 18 months.

bZx integrated Chainlink after the 2020 attack. They are no longer vulnerable to oracle manipulation attacks. This is no coincidence.

Proof of Reserves Integration: For wrapped assets and stablecoins, collateral value is verified on-chain. USDE should be priced based on verifiable reserves, not order book dynamics. The technology exists, but implementation lags. Gradual liquidation prevents chain reactions from amplifying by liquidating in stages: Phase 1: Warning and time to add collateral Phase 2: Partial Liquidation (25%) Phase 3: Larger Liquidation (50%) Final stage: Complete liquidation

This provides users with time to respond and reduces the impact of large simultaneous liquidations on the system.

Real-time audit monitoring of oracle manipulation behavior: Cross-exchange price deviation Unusual trading volume on low-liquidity trading pairs Rapidly increasing position size before an oracle update Pattern matching against known attack signatures

The October 2025 attack likely displayed warning signs. Someone selling $60 million in USDe at 5:43 AM should have set off alarms. If your monitoring system didn’t pick up on these signals, then your monitoring system wasn’t adequate.

Conclusion: A $19 Billion Reminder

The liquidation chain reaction of October 10-11, 2025, was not caused by excessive leverage or market panic, but rather by a massive oracle design failure. $60 million in market action was amplified into $19.3 billion in damage because the price data system was unable to distinguish between manipulation and genuine price discovery.

But this isn’t a new failure mode. It’s the same failure mode that destroyed bZx in February 2020, Harvest in October 2020, Compound in November 2020, and Mango in October 2022.

The industry has learned this lesson five times, with increasing cost:

2020 : Individual protocols learn lessons and implement fixes 2022 : Regulators learn lessons and begin enforcement 2025 : The entire market has learned its lesson and paid $19.3 billion in tuition fees

The only question is whether we have finally learned this lesson.

Every platform that handles leveraged positions must now ask:

Are our oracles robust enough to protect against known attack vectors in 2020-2022? Can our infrastructure cope with the ripple effects we’ve already witnessed? Have we struck the right balance between sensitivity and stability? Are we repeating the mistakes that have cost the industry hundreds of millions of dollars?

Five years of history have proven that oracle manipulation is not a hypothetical risk or an edge case—it is a documented, repeatable, and highly profitable attack strategy that continues to amplify as the market grows.

October 2025 demonstrates what happens when these lessons are not learned at an institutional scale. The attack was neither sophisticated nor novel, it was simply the same playbook being run again on a larger system, exploiting a known vulnerability window.

The oracle is the cornerstone of the system. When it cracks, all the superstructures collapse.

In the modern connected market, oracle design is not only about data transmission but also about system stability.

A design error of $60 million can destroy $19.3 billion.

If you make the same mistake over and over again, you’re not learning from it; instead, you’re repeating it at a higher cost.

Analysis based on public market data, platform statements, and five years of case studies of oracle manipulation. The opinions expressed are my own and do not represent those of any entity.

Эта статья взята из интернета: The Plunge: Oracle Vulnerabilities and the DeFi Test of Billions of DollarsRecommended Articles

Related: A quick look at the new launchpad Heaven and its token LIGHT: With 100% revenue repatriation, can it challenge Pump.fun? Original translation: TechFlow Disclaimer: This article is for informational purposes only and does not constitute financial advice. The author has personal investments in the aforementioned tokens. Any opinions expressed below are solely the author’s and should not be relied upon for investment decisions or considered investment trading advice or recommendations. May the light illuminate the way ahead. If you’ve been following me on X or Telegram , you may have seen my thoughts and writings about $LIGHT. This post is just to organize my current thoughts and paint a more complete picture for those who want to understand Heaven. Original image link: click here Initially, I wrote about Heaven after its market cap stabilized at around $18 million, understandably due to issues caused by a failed TGE (token generation event)…

Анализ ## defiОбмен #Рынок #Токен #© Copyright NoticeМассив Pre Popular Interaction Collection | Aster Phase 3 is now live; Rayls Points Quest updated (October 13th) Next Understanding the Meteora Project in One Article Related articles Почему спустя 17 лет нам все еще нужен биткойн? 6086cf14eb90bc67ca4fc62b 16 540 Gate founder Dr. Han: CEX and DEX are driving the dual development to accelerate the large-scale adoption of Web3Recomme 6086cf14eb90bc67ca4fc62b 23 802 1 In-depth analysis of Perp DEX: Hyperliquid, Aster, Lighter, edgeX (3) 6086cf14eb90bc67ca4fc62b 23 675 Circle’s own Arc is about to launch its own cryptocurrency. Will retail investors be able to get a share of the profits? 6086cf14eb90bc67ca4fc62b 17 111 1 Zcash surged 10 times in a short period; is the privacy sector becoming the next narrative? 6086cf14eb90bc67ca4fc62b 17 398 1 Solana CEO Interview: From Garage Startup to Top Public Chain, Talking about Solana’s Past and Future 6086cf14eb90bc67ca4fc62b 47 728 12 Нет комментариев Вы должны войти в систему, чтобы оставить комментарий! Немедленно войдите в систему Нет комментариев... Последние статьи Did Jane Street “Manipulate” BTC? Decoding the AP System, Understanding the Power Struggle Behind ETF Creation and Redemption Pricing 8hrs ago 318 Stop Comparing Bitcoin to Gold—It’s Now a High-Volatility Software Stock 8hrs ago 448 Matrixport Research: $25 Billion Gamma Unwinding Imminent, Liquidity Yet to Return Behind the Rebound 8hrs ago 416 ERC-5564: Ethereum’s Stealth Era Has Arrived, Receiving Addresses No Longer ‘Exposed’ 8hrs ago 351 Hong Kong Regulatory Green Light: Asseto Enables DL Holdings to Achieve Compliance for Two RWA Business Implementations 8hrs ago 399 Популярные сайтыTempoLighterGAIBПланерПланкаRaylsBCPokerVooi Bee.com Крупнейший в мире портал Web3. Партнеры CoinCarp Binance CoinMarketCap CoinGecko Coinlive Доспехи Загрузите приложение Bee Network APP и начните путешествие по web3 Белая книга Роли ЧАСТО ЗАДАВАЕМЫЕ ВОПРОСЫ © 2021-2026. Все права защищены. Политика конфиденциальности | Условия предоставления услуг Скачать приложение Bee Network APP и начните путешествие по web3 Крупнейший в мире портал Web3 Партнеры CoinCarp Binance CoinMarketCap CoinGecko Coinlive Armors Белая книга Роли ЧАСТО ЗАДАВАЕМЫЕ ВОПРОСЫ © 2021-2026. Все права защищены. Политика конфиденциальности | Условия предоставления услуг Поиск ПоискInSiteOnChainСоциальнаяНовости Hot to you: Охотники за воздухом Анализ данных Криптознаменитости Детектор-ловушка Русский English 繁體中文 简体中文 日本語 Tiếng Việt العربية 한국어 Bahasa Indonesia हिन्दी اردو Русский

智能索引记录