UwuLend Oracle Manipulation Attack: A Deep Dive into the $19.4 Million Exploit

The UwuLend oracle manipulation attack, which led to a $19.4 million loss, highlights the critical need for advanced security measures and continuous vigilance in the DeFi space, revealing vulnerabilities even in protocols that have undergone thorough security audits.

July 3, 2024

UwuLend Oracle Manipulation Attack: A Deep Dive into the $19.4 Million Exploit

The Web3 and decentralized finance (DeFi) spaces are known for their innovation and high stakes, but with these come significant risks. A recent incident that has rocked the DeFi world is the $19.4 million oracle manipulation attack on UwuLend, a lending protocol. This article provides an in-depth analysis of the attack, the vulnerabilities exploited, and the broader implications for Web3 security, especially concerning smart contract development and auditing.


The UwuLend exploit underscores the critical need for robust security measures in the ever-evolving world of DeFi. Despite having undergone a thorough security audit, UwuLend fell victim to a sophisticated attack, highlighting vulnerabilities that even seasoned security firms might miss. This incident serves as a stark reminder to Web3 security researchers, audit firms, and developers of smart contracts about the importance of continuous vigilance and innovation in security practices.

Background: UwuLend and the Oracle Manipulation Attack

UwuLend, launched by the controversial figure Sifu, the former CFO of Frog Nation, was designed as a decentralized lending platform. On June 10, 2024, the protocol was hacked for $19.4 million in an oracle manipulation attack, a type of exploit that has become increasingly common in the DeFi sector.

What Happened?The attack was executed with precision, involving a series of three transactions completed within six minutes. The attacker used Tornado Cash to fund the initial stages and then manipulated UwuLend's oracles to create a significant price discrepancy. This allowed them to borrow and liquidate assets at artificially inflated rates.

The FalloutThe stolen funds were quickly transferred to two Ethereum addresses, casting doubts on UwuLend's security measures and raising questions about the involvement of Sifu, given his controversial history. The exploit's impact was not just financial but also reputational, shaking the confidence of UwuLend’s depositors and the broader DeFi community.

Section 1: Detailed Analysis of the Exploit

Oracle Manipulation Exploits: An Overview

Oracles are essential components in DeFi protocols, providing real-time data that smart contracts rely on to execute transactions. However, their integration also introduces potential vulnerabilities. Oracle manipulation occurs when an attacker influences the data fed into a smart contract, leading to erroneous execution logic.

How It WorksIn the UwuLend attack, the vulnerability lay in the fallback logic of their oracles. The attacker leveraged a flash loan to manipulate the state of Curve pools used by UwuLend’s fallback oracle to calculate asset prices. This discrepancy allowed the attacker to borrow assets at a low rate and liquidate them at a higher, manipulated rate, profiting from the artificial price difference.

Technical Breakdown

  1. Flash Loan: The attacker took out a large flash loan, a type of loan that must be repaid within the same transaction, providing significant leverage without needing upfront collateral.
  2. Manipulating Curve Pools: The borrowed funds were used to manipulate the state of specific Curve pools, altering the price feeds that UwuLend’s oracles relied on.
  3. Price Discrepancy: The manipulated oracle data allowed the attacker to borrow sUSD at a rate of 0.99 and liquidate it at a rate of 1.03, creating a profit from the inflated prices.
  4. Asset Conversion and Transfer: The attacker converted the borrowed assets into ETH and transferred them to two distinct Ethereum addresses, making it challenging to trace the funds back to their origin.

Key Takeaways

  • The reliance on decentralized exchange (DEX) prices for oracle data can introduce significant risks, as these can be manipulated through large trades.
  • Flash loans, while legitimate financial tools, can be weaponized in attacks to manipulate market states without needing initial capital.

The Role of Security Audits

UwuLend’s code had been audited by Peckshield, which had previously characterized it as “well designed and engineered” with no high-severity issues. This raises critical questions about the scope and depth of traditional security audits.

Audit Limitations

  • Scope of Audits: Traditional audits might focus on code quality and known vulnerabilities but can miss complex interactions like oracle manipulations.
  • Dynamic Threat Landscape: As DeFi protocols evolve, so do the tactics of attackers, making it imperative for audits to include scenarios that simulate potential attack vectors beyond static code analysis.

Section 2: Trends in DeFi Security and Oracle Vulnerabilities

Increasing Frequency of Oracle Attacks

The UwuLend incident is part of a broader trend in DeFi where oracle manipulation has become a preferred attack vector for exploiting smart contracts. Recent examples include the bZx and Harvest Finance exploits, which similarly leveraged oracle vulnerabilities to siphon funds.

Factors Contributing to Oracle Vulnerability

  • Complex Dependency Chains: DeFi protocols often rely on multiple oracles and data sources, increasing the risk of inconsistencies and exploitation.
  • Market Liquidity Manipulation: Attackers can exploit low liquidity in certain pools to create significant price impacts, which are then reflected in the oracle feeds.

Enhancing Oracle Security

To mitigate the risk of oracle manipulation, DeFi protocols must adopt multi-layered security strategies. These include:

  • Decentralized Oracle Networks: Utilizing oracles from multiple, independent sources to reduce the impact of a single manipulated feed.
  • Time-Weighted Average Prices (TWAP): Implementing TWAP can smooth out sudden price changes, making it harder for attackers to manipulate prices over a short time frame.
  • On-Chain Price Verification: Integrating on-chain mechanisms to cross-verify prices can add an additional layer of security.

Section 3: Advanced Techniques and Future Directions

Advanced Defense Mechanisms

Given the sophisticated nature of recent attacks, new defense mechanisms are needed to protect DeFi protocols from similar exploits.

Multi-Sig and Timelocks

  • Multi-Sig Wallets: Requiring multiple signatures for critical transactions can prevent unauthorized or rushed actions.
  • Timelocks: Implementing timelocks on governance changes or large fund transfers allows the community to react to potential threats before they are executed.

Economic Incentives and Bounty Programs

  • White Hat Bounties: Encouraging ethical hackers to disclose vulnerabilities by offering rewards can preempt malicious exploits.
  • Economic Guardrails: Designing systems where the cost of attack outweighs the potential profit can deter exploit attempts.

Case Study: Curve and Michael Egorov

One of the notable victims of the UwuLend attack was Michael Egorov, the founder of Curve, who lost over 23.5 million CRV ($9.85M). The attacker used these stolen tokens in Curve’s Llama Lend to borrow crvUSD, demonstrating the interconnected nature of DeFi protocols and the cascading effects of security breaches.

Lessons Learned

  • Inter-Protocol Dependencies: The attack on UwuLend affected multiple DeFi platforms, highlighting the need for cross-protocol security considerations.
  • Community Response: The swift liquidation of the attacker’s position by crvUSD lenders in LlamaLend showed the resilience and responsiveness of the DeFi community.


The UwuLend exploit serves as a critical learning moment for the entire DeFi ecosystem. It underscores the need for continuous improvement in security practices, from deeper and more dynamic audits to the adoption of advanced defensive mechanisms. As DeFi continues to grow and attract more capital, the importance of robust, multi-faceted security cannot be overstated.


  • Enhance Security Audits: Ensure audits go beyond static code analysis to include dynamic testing and attack simulations.
  • Adopt Multi-Layered Oracle Security: Use decentralized oracle networks and implement TWAP and on-chain verification.
  • Engage with the Community: Participate in and support bounty programs and community-driven security initiatives.

For further insights on the Web3 security space and engagement with top-tier smart contract auditors in the industry, join our TRUSTBYTES Discord.

References and Further Reading

This comprehensive analysis aims to arm Web3 security professionals, developers, and audit firms with the knowledge and tools needed to better protect the DeFi ecosystem from future threats.

Author's image