The Portal highlights real-time cost of of TWAP manipulation across V3 pools.
2/ But first, why is Oracle Manipulation an attractive exploit vector for attackers?
TWAP oracle manipulation leads to severe consequences for protocols that consume those price feeds, enabling attackers to distort prices, leading to economic exploits. Examples below 👇
3/ @Moola_Market and @mangomarkets, both suffered significant losses due to TWAP oracle manipulation. In each case, attackers exploited thin liquidity to pump collateral value, leading to under-collateralized loans and substantial financial damage.
4/ The @chaos_labs TWAP Market Risk application, leverages pool data, including liquidity depth and exhaustion prices, to quantify real-time manipulation risk across all V3 pools and deployments. Users can view manipulation costs across all pools
5/ The portal factors real-time concentrated liquidity distribution into quantifying manipulation costs:
6/ Furthermore, we quantify capital requirements for moving the current spot price
7/ As well as quantifying the capital requirements for moving the time-weighted average price over a 30-minute window
8/ Real-time data is important, but we'd like to make this information actionable for protocols using TWAPs. Therefore, we allow users to simulate how additional liquidity across specific ticks increases capital requirements for manipulations. Thanks @fedeebasta for this idea!
9/ The research and methodologies for quantifying the price of manipulation can be found in our full-length risk assessment here: chaoslabs.xyz/posts/chaos-la…
10/ As always, we encourage you to check out our application and we'd love to hear your feedback. Your ideas and feature requests can help us make it even more powerful. Explore the portal here: community.chaoslabs.xyz/uniswap/twap
11/ @chaos_labs is dedicated to ensuring the economic and oracle security in the #DeFi space. If you're an application grappling with these challenges, don't hesitate to reach out 🙏
12/ We're incredibly proud to partner on this critical research with our partners at @UniswapFND@Uniswap. Their collaboration is invaluable, and we look forward to what comes next. Stay tuned, as we're releasing additional research with @UniswapFND soon!
• • •
Missing some Tweet in this thread? You can try to
force a refresh
Good design allows you to design a system where, for every unit of risk you take, you earn the most reward, and for every unit of reward you take, you incur the least risk.
From a liquidity risk PoV, Morpho's model is suboptimal.
2/ To start, every lending protocol carries risk. We’ve explored this previously
Hours after a multichain @Balancer exploit triggered widespread uncertainty across DeFi, @berachain executed an emergency hard fork, and @SonicLabs froze the attacker’s wallet.
Shortly after, Stream Finance’s xUSD began to depeg materially below its target range.
2/ Long-standing questions resurfaced around leverage, oracle construction, and PoR transparency.
It's a textbook case of the reflexive stress events we outlined last Friday in our DeFi’s Black Box/Vaults article.
3/ What Happened & Backdrop
A Balancer v2 exploit unfolded across several chains, and for an extended period, it was unclear which pools were affected on which networks or which integrated protocols had direct exposure.
Exploring @Bybit_Official exploit impact on @aave, @ethena_labs, and USDe pricing.
How DeFi responded to the largest hack ever, contagion risk, pricing, and how Proof of Reserves could have prevented $20M+ in liquidations 🧵👇
2/ In the aftermath of the attack, our team at @chaos_labs, alongside @bgdlabs, @AaveChan, and @LlamaRisk opened a war room to assess potential @aave exposure and systemic risk.
3/ Inside the war room, key concerns emerged:
- Was Bybit solvent?
- Was this just the first wave of a larger attack?
- How would any insolvency or haircut affect Aave, given sUSDe exposure?
The Morpho PAXG/USDC market (tokenized gold via @Paxos) was exploited, leading to a $230K loss.
The root cause? A misconfigured oracle pricing gold at $2.6 trillion USD.
2/ Exploit Breakdown: Pt. 1 → Oracle Misconfiguration pricing gold at $2.6 Trillion
Morpho’s markets allow users to create markets. Unfortunately, in this case, the deployer may not have fully understood Morpho's decimal system.
3/ Exploit Breakdown, Pt. 2 → Supply and Drain
The exploiter realized the $2T dollar pricing of gold, supplied $350 dollars of $PAXG, and withdrew $250K, as viewed on @BlockAnalitica's Morpho portal.