Back to Blog

Stellar上的YieldBlox DAO事件:预言机配置错误导致超1000万美元被盗

Code Auditing
February 26, 2026

2026年2月22日,在Stellar的Blend V2上由YieldBlox DAO运营的一个借贷池遭到利用,导致损失超过1000万美元。

攻击者操纵了SDEX上的USTRY/USDC市场。该池配置的Reflector预言机路径随后接受了被操纵的价格,高估了USTRY的抵押品价值,并使攻击者能够提取池中的资产(USDC和XLM)。

此次事件并非Blend V2核心合约问题,而是池操作者(YieldBlox DAO)的配置问题。

2. 背景

在Stellar上,Blend V2是一个允许用户创建隔离借贷池的流动性协议。每个池定义了自己的借款资产、抵押资产和预言机设置。

在此次事件中,受影响的池允许用户使用USTRY作为抵押品借入XLMUSDC。该池使用了Reflector预言机[2],USTRY的价格来自SDEX上的USTRY/USDC市场[3],并定期更新。

3. 漏洞分析(根本原因分析)

此次利用的根本原因是池侧定价设计依赖于一个可操纵的市场。

  1. SDEX上的USTRY/USDC市场深度非常浅。
  2. 攻击者可以通过清空正常订单并下达异常订单来急剧推高市场名义价格。
  3. Reflector随后将USTRY的价格更新为被操纵的值。
  4. 该池的风险逻辑接受该值为抵押品估值,从而膨胀了借款能力。

因此,攻击者利用高估的USTRY抵押品从池中提取了可借入的资产。

4. 攻击分析

1.(Tx 1, 2)攻击者通过消耗正常流动性并下达异常订单,将SDEX上的USTRY价格从约1.06美元操纵到约107美元

2.(Tx 3)Reflector拉取了被操纵的SDEX价格并更新了其馈送。

3.(Tx 4, 5)攻击者以12,881e7 USTRY的抵押品借入了1,000,196e7 USDC

4.(Tx 6, 7)攻击者以14,987,610e7 USTRY的抵押品借入了6,124,927,810e7 XLM

5.(Tx 8, 9, 10)攻击者将提取的资产桥接到了Base、BSC和以太坊。

5. 损失/利润分析

在Stellar上估计的总损失约为1000万美元以上

6. 结论

核心问题很简单:该池的抵押品估值依赖于一个可操纵的价格来源。这是池操作者(YieldBlox DAO)的配置失败,而非Blend V2核心合约的缺陷。此次事件提醒我们,借贷池必须选择并监控价格依赖性,并具备强大的抗操纵能力。

参考资料

[1] YieldBlox DAO

[2] https://reflector.network/

[3] USTRY/USDC Market on the SDEX


关于BlockSec

BlockSec是一家提供全栈区块链安全和加密合规服务的提供商。我们构建产品和服务,帮助客户在协议和平台的整个生命周期中执行代码审计(包括智能合约、区块链和钱包),实时拦截攻击,分析事件,追踪非法资金,并满足AML/CFT义务。

BlockSec已在著名会议上发表多篇区块链安全论文,报告了多个DeFi应用的零日攻击,阻止了多次黑客攻击并挽救了超过2000万美元,并保障了数十亿美元的加密货币安全。

Sign up for the latest updates
Tracing $1.6B in TRON USDT: Inside the VerilyHK Ponzi Infrastructure
Case Studies

Tracing $1.6B in TRON USDT: Inside the VerilyHK Ponzi Infrastructure

An on-chain investigation into VerilyHK, a fraudulent platform that moved $1.6B in TRON USDT through a multi-layered fund-routing infrastructure of rotating wallets, paired payout channels, and exchange exit funnels, with traced connections to the FinCEN-sanctioned Huione Group.

Drift Protocol Incident: Multisig Governance Compromise via Durable Nonce Exploitation
Security Insights

Drift Protocol Incident: Multisig Governance Compromise via Durable Nonce Exploitation

On April 1, 2026 (UTC), Drift Protocol on Solana suffered a $285.3M loss after an attacker exploited Solana's durable nonce mechanism to delay the execution of phished multisig approvals, ultimately transferring administrative control of the protocol's 2-of-5 Squads governance with zero timelock. With full admin privileges, the attacker created a malicious collateral market (CVT), inflated its oracle price, relaxed withdrawal protections, and drained USDC, JLP, SOL, cbBTC, and other assets through 31 rapid withdrawals in approximately 12 minutes. This incident highlights how durable nonce-based delayed execution can decouple signer intent from on-chain execution, bypassing the temporal assumptions that multisig security implicitly relies on.

Weekly Web3 Security Incident Roundup | Mar 23 – Mar 29, 2026
Security Insights

Weekly Web3 Security Incident Roundup | Mar 23 – Mar 29, 2026

This BlockSec weekly security report covers eight DeFi attack incidents detected between March 23 and March 29, 2026, across Ethereum and BNB Chain, with total estimated losses of approximately $1.53M. Incidents include a $679K flawed burn mechanism exploit on the BCE token, a $512K spot-price manipulation attack on Cyrus Finance's PancakeSwap V3 liquidity withdrawal, a $133.5K flash-loan-driven referral reward manipulation on a TUR staking contract, and multiple integer overflow, reentrancy, and accounting error vulnerabilities in DeFi protocols. The report provides detailed vulnerability analysis and attack transaction breakdowns for each incident.

Best Security Auditor for Web3

Validate design, code, and business logic before launch. Aligned with the highest industry security standards.

BlockSec Audit