Back to Blog

Stellar上的YieldBlox DAO事件:预言机配置错误导致超1000万美元被盗

Code Auditing
February 26, 2026

2026年2月22日,在Stellar的Blend V2上由YieldBlox DAO运营的一个借贷池遭到利用,导致损失超过1000万美元。

攻击者操纵了SDEX上的USTRY/USDC市场。该池配置的Reflector预言机路径随后接受了被操纵的价格,高估了USTRY的抵押品价值,并使攻击者能够提取池中的资产(USDC和XLM)。

此次事件并非Blend V2核心合约问题,而是池操作者(YieldBlox DAO)的配置问题。

2. 背景

在Stellar上,Blend V2是一个允许用户创建隔离借贷池的流动性协议。每个池定义了自己的借款资产、抵押资产和预言机设置。

在此次事件中,受影响的池允许用户使用USTRY作为抵押品借入XLMUSDC。该池使用了Reflector预言机[2],USTRY的价格来自SDEX上的USTRY/USDC市场[3],并定期更新。

3. 漏洞分析(根本原因分析)

此次利用的根本原因是池侧定价设计依赖于一个可操纵的市场。

  1. SDEX上的USTRY/USDC市场深度非常浅。
  2. 攻击者可以通过清空正常订单并下达异常订单来急剧推高市场名义价格。
  3. Reflector随后将USTRY的价格更新为被操纵的值。
  4. 该池的风险逻辑接受该值为抵押品估值,从而膨胀了借款能力。

因此,攻击者利用高估的USTRY抵押品从池中提取了可借入的资产。

4. 攻击分析

1.(Tx 1, 2)攻击者通过消耗正常流动性并下达异常订单,将SDEX上的USTRY价格从约1.06美元操纵到约107美元

2.(Tx 3)Reflector拉取了被操纵的SDEX价格并更新了其馈送。

3.(Tx 4, 5)攻击者以12,881e7 USTRY的抵押品借入了1,000,196e7 USDC

4.(Tx 6, 7)攻击者以14,987,610e7 USTRY的抵押品借入了6,124,927,810e7 XLM

5.(Tx 8, 9, 10)攻击者将提取的资产桥接到了Base、BSC和以太坊。

5. 损失/利润分析

在Stellar上估计的总损失约为1000万美元以上

6. 结论

核心问题很简单:该池的抵押品估值依赖于一个可操纵的价格来源。这是池操作者(YieldBlox DAO)的配置失败,而非Blend V2核心合约的缺陷。此次事件提醒我们,借贷池必须选择并监控价格依赖性,并具备强大的抗操纵能力。

参考资料

[1] YieldBlox DAO

[2] https://reflector.network/

[3] USTRY/USDC Market on the SDEX


关于BlockSec

BlockSec是一家提供全栈区块链安全和加密合规服务的提供商。我们构建产品和服务,帮助客户在协议和平台的整个生命周期中执行代码审计(包括智能合约、区块链和钱包),实时拦截攻击,分析事件,追踪非法资金,并满足AML/CFT义务。

BlockSec已在著名会议上发表多篇区块链安全论文,报告了多个DeFi应用的零日攻击,阻止了多次黑客攻击并挽救了超过2000万美元,并保障了数十亿美元的加密货币安全。

Sign up for the latest updates
Building a Secure Stablecoin Payment Network: BlockSec Partners with Morph
Partnership

Building a Secure Stablecoin Payment Network: BlockSec Partners with Morph

BlockSec has partnered with Morph as an official audit partner for the $150M Morph Payment Accelerator. By offering exclusive discounts on smart contract audits and penetration testing, BlockSec provides institutional-grade security to payment builders, ensuring a safe and resilient foundation for the future of global stablecoin payments.

Weekly Web3 Security Incident Roundup | Mar 9 – Mar 15, 2026
Security Insights

Weekly Web3 Security Incident Roundup | Mar 9 – Mar 15, 2026

This BlockSec weekly security report covers eight DeFi attack incidents detected between March 9 and March 15, 2026, across Ethereum and BNB Chain, with total estimated losses of approximately $1.66M. Incidents include a $1.01M AAVE incorrect liquidation caused by oracle misconfiguration, a $242K exploit on the deflationary token MT due to flawed trading restrictions, a $149K exploit on the burn-to-earn protocol DBXen from `_msgSender()` and `msg.sender` inconsistency, and a $131K attack on AM Token exploiting a flawed delayed-burn mechanism. The report provides detailed vulnerability analysis and attack transaction breakdowns for each incident.

Venus Thena (THE) Incident: What Broke and What Was Missed

Venus Thena (THE) Incident: What Broke and What Was Missed

On March 15, 2026, an attacker bypassed the THE (Thena) supply cap on Venus Protocol (BNB Chain) through a donation attack, inflating a collateral position to 3.67x the intended limit and borrowing ~$14.9M in assets. Both sides lost money on-chain: Venus was left with ~$2.15M in bad debt after 254 liquidation bots competed across 8,048 transactions, while the attacker retained only ~$5.2M against a $9.92M investment. This deep dive examines what broke across three lines of defense (exposure limits, collateral valuation, and liquidation) and the monitoring gaps that left months of on-chain warning signals unacted upon.

Best Security Auditor for Web3

Validate design, code, and business logic before launch. Aligned with the highest industry security standards.

BlockSec Audit