Back to Blog

Stellar上的YieldBlox DAO事件:预言机配置错误导致超1000万美元被盗

Code Auditing
February 26, 2026

2026年2月22日,在Stellar的Blend V2上由YieldBlox DAO运营的一个借贷池遭到利用,导致损失超过1000万美元。

攻击者操纵了SDEX上的USTRY/USDC市场。该池配置的Reflector预言机路径随后接受了被操纵的价格,高估了USTRY的抵押品价值,并使攻击者能够提取池中的资产(USDC和XLM)。

此次事件并非Blend V2核心合约问题,而是池操作者(YieldBlox DAO)的配置问题。

2. 背景

在Stellar上,Blend V2是一个允许用户创建隔离借贷池的流动性协议。每个池定义了自己的借款资产、抵押资产和预言机设置。

在此次事件中,受影响的池允许用户使用USTRY作为抵押品借入XLMUSDC。该池使用了Reflector预言机[2],USTRY的价格来自SDEX上的USTRY/USDC市场[3],并定期更新。

3. 漏洞分析(根本原因分析)

此次利用的根本原因是池侧定价设计依赖于一个可操纵的市场。

  1. SDEX上的USTRY/USDC市场深度非常浅。
  2. 攻击者可以通过清空正常订单并下达异常订单来急剧推高市场名义价格。
  3. Reflector随后将USTRY的价格更新为被操纵的值。
  4. 该池的风险逻辑接受该值为抵押品估值,从而膨胀了借款能力。

因此,攻击者利用高估的USTRY抵押品从池中提取了可借入的资产。

4. 攻击分析

1.(Tx 1, 2)攻击者通过消耗正常流动性并下达异常订单,将SDEX上的USTRY价格从约1.06美元操纵到约107美元

2.(Tx 3)Reflector拉取了被操纵的SDEX价格并更新了其馈送。

3.(Tx 4, 5)攻击者以12,881e7 USTRY的抵押品借入了1,000,196e7 USDC

4.(Tx 6, 7)攻击者以14,987,610e7 USTRY的抵押品借入了6,124,927,810e7 XLM

5.(Tx 8, 9, 10)攻击者将提取的资产桥接到了Base、BSC和以太坊。

5. 损失/利润分析

在Stellar上估计的总损失约为1000万美元以上

6. 结论

核心问题很简单:该池的抵押品估值依赖于一个可操纵的价格来源。这是池操作者(YieldBlox DAO)的配置失败,而非Blend V2核心合约的缺陷。此次事件提醒我们,借贷池必须选择并监控价格依赖性,并具备强大的抗操纵能力。

参考资料

[1] YieldBlox DAO

[2] https://reflector.network/

[3] USTRY/USDC Market on the SDEX


关于BlockSec

BlockSec是一家提供全栈区块链安全和加密合规服务的提供商。我们构建产品和服务,帮助客户在协议和平台的整个生命周期中执行代码审计(包括智能合约、区块链和钱包),实时拦截攻击,分析事件,追踪非法资金,并满足AML/CFT义务。

BlockSec已在著名会议上发表多篇区块链安全论文,报告了多个DeFi应用的零日攻击,阻止了多次黑客攻击并挽救了超过2000万美元,并保障了数十亿美元的加密货币安全。

Sign up for the latest updates
Weekly Web3 Security Incident Roundup | Apr 13 – Apr 19, 2026
Security Insights

Weekly Web3 Security Incident Roundup | Apr 13 – Apr 19, 2026

This BlockSec weekly security report covers four attack incidents detected between April 13 and April 19, 2026, across multiple chains such as Ethereum, Unichain, Arbitrum, and NEAR, with total estimated losses of approximately $310M. The highlighted incident is the $290M KelpDAO rsETH bridge exploit, where an attacker poisoned the RPC infrastructure of the sole LayerZero DVN to fabricate a cross-chain message, triggering a cascading WETH freeze across five chains and an Arbitrum Security Council forced state transition that raises questions about the actual trust boundaries of decentralized systems. Other incidents include a $242K MMR proof forgery on Hyperbridge, a $1.5M signed integer abuse on Dango, and an $18.4M circular swap path exploit on Rhea Finance's Burrowland protocol.

The Decentralization Dilemma: Cascading Risk and Emergency Power in the KelpDAO Crisis
Security Insights

The Decentralization Dilemma: Cascading Risk and Emergency Power in the KelpDAO Crisis

This BlockSec deep-dive analyzes the KelpDAO $290M rsETH cross-chain bridge exploit (April 18, 2026), attributed to the Lazarus Group, tracing a causal chain across three layers: how a single-point DVN dependency enabled the attack, how DeFi composability cascaded the damage through Aave V3 lending markets to freeze WETH liquidity exceeding $6.7B across Ethereum, Arbitrum, Base, Mantle, and Linea, and how the crisis forced decentralized governance to exercise centralized emergency powers. The article examines three parameters that shaped the cascade's severity (LTV, pool depth, and cross-chain deployment count) and provides an exclusive technical breakdown of Arbitrum Security Council's forced state transition, an atomic contract upgrade that moved 30,766 ETH without the holder's signature.

Weekly Web3 Security Incident Roundup | Apr 6 – Apr 12, 2026
Security Insights

Weekly Web3 Security Incident Roundup | Apr 6 – Apr 12, 2026

This BlockSec weekly security report covers four DeFi attack incidents detected between April 6 and April 12, 2026, across Linea, BNB Chain, Arbitrum, Optimism, Avalanche, and Base, with total estimated losses of approximately $928.6K. Notable incidents include a $517K approval-related exploit where a user mistakenly approved a permissionless SquidMulticall contract enabling arbitrary external calls, a $193K business logic flaw in the HB token's reward-settlement logic that allowed direct AMM reserve manipulation, a $165.6K exploit in Denaria's perpetual DEX caused by a rounding asymmetry compounded with an unsafe cast, and a $53K access control issue in XBITVault caused by an initialization-dependent check that failed open. The report provides detailed vulnerability analysis and attack transaction breakdowns for each incident.

Best Security Auditor for Web3

Validate design, code, and business logic before launch. Aligned with the highest industry security standards.

BlockSec Audit