Connect with us
DAPA Banner

Crypto World

CoW Swap Points to Legacy Code and Solver Failures in $50M Loss That Aave Attributes to Illiquid Market

Published

on

CoW Swap Points to Legacy Code and Solver Failures in $50M Loss That Aave Attributes to Illiquid Market

While Aave blamed an illiquid market, CoW Swap identified a stale gas ceiling, silent solver failures, and a possible mempool leak that turned a bad trade into the worst execution loss in DeFi history.

Aave and CoW Protocol published separate post-mortem reports over the weekend dissecting the March 12 swap that resulted in a trader converting $50.4 million in USDT into roughly $36,000 worth of AAVE tokens, widely considered the largest execution loss of its kind in decentralized finance (DeFi).

The two accounts largely agree on the basic sequence of events but diverge sharply in emphasis and tone, with Aave framing the loss as the predictable consequence of trading in an illiquid market and CoW Swap painting a more complex picture of compounding infrastructure failures that made the outcome dramatically worse than it needed to be.

‘An Illiquid Market’

Aave’s analysis drew a technical distinction between price impact and slippage, arguing that the two are often conflated. The protocol said, “the primary root cause was the routing of a large trade through a market with poor liquidity, leading to an extreme price impact.”

Advertisement

“It is critical to distinguish between price impact due to an illiquid market and price impact due to slippage,” the team wrote. The user was quoted a price that was already 99.9% below expected market value before the swap even executed, Aave said, and the interface displayed a warning flagging the extreme price impact and required the user to check a confirmation box acknowledging a potential 100% loss.

An internal audit trail confirmed the user acknowledged the warning on a mobile device before proceeding, meaning the catastrophic outcome was visible to the user at the point of confirmation.

Aave stressed that its core lending protocol was never at risk, since the swap occurred via a third-party CoW Swap integration rather than through the protocol’s smart contracts.

‘Technically Correct Is Not the Ceiling’

CoW Swap’s report told a markedly different story, identifying what it called a “chain of compounding factors” that turned an already bad trade into something far worse.

Advertisement

During the initial quoting phase, three independent solvers submitted potential routes. The best unverified quotes would have returned roughly $5–6 million worth of AAVE for the $50 million order, still an approximately 90% loss but dramatically better than the $36,000 the user ultimately received.

Those better-priced routes never reached the user. CoW Swap’s quote verification system enforced a hardcoded 12-million gas unit ceiling — what the team described as “legacy code predating current gas consumption patterns” — which caused the more efficient routes to fail verification. The only quote that passed came from a solver offering roughly 329 AAVE tokens, far worse than the rejected alternatives. That figure was then used to set the order’s limit price in the Aave interface.

The situation deteriorated further in the auction phase. A solver identified in the report as “Solver E” won two consecutive auctions with a superior execution route but never submitted either transaction onchain. After two failed attempts, the solver stopped bidding entirely, leaving the worst route as the only remaining option.

CoW’s report also flagged evidence of a possible mempool leak. Despite the transaction being submitted via a private RPC endpoint, Etherscan displayed a “confirmed within 30 seconds” tag — a marker that typically appears only when a transaction is visible in the public mempool before being included in a block. CoW said the leak likely enabled the significant MEV activity observed in the execution block.

Advertisement

CoW struck a notably more self-critical tone than Aave throughout its report, acknowledging that a confirmation checkbox is an inadequate safeguard when trades involve tens of millions of dollars.

“Technically correct is not the ceiling we should be building toward,” the team wrote.

CoW said it has already deployed a fix removing the stale gas ceiling and is continuing to investigate both the solver execution failures and the suspected mempool leak.

AAVE is trading around $121, up roughly 6% over the past 24 hours, according to CoinGecko. Aave is the largest DeFi lending protocol with approximately $25.5 billion in total value locked, per DefiLlama.

Advertisement

This article was written with the assistance of AI workflows. All our stories are curated, edited and fact-checked by a human.

Source link

Continue Reading
Click to comment

You must be logged in to post a comment Login

Leave a Reply

Crypto World

North Korean Hackers Infiltrated Crypto For Seven Years

Published

on

North Korean Hackers Infiltrated Crypto For Seven Years

North Korean IT workers have been embedding themselves in crypto companies and decentralized finance projects for at least seven years, according to a cybersecurity analyst.

“Lots of DPRK IT workers built the protocols you know and love, all the way back to DeFi summer,” said MetaMask developer and security researcher Taylor Monahan on Sunday. 

Monahan claimed that over 40 DeFi platforms, some being well-known names, have had North Korean IT workers working on their protocols.

The “seven years of blockchain dev experience” on their resume is “not a lie,” she added.

Advertisement

The Lazarus Group is a North Korean-affiliated hacking collective that has stolen an estimated $7 billion in crypto since 2017, according to analysts at creator network R3ACH. 

It has been linked to the industry’s highest-profile hacks, including the $625 million Ronin Bridge exploit in 2022, the $235 million WazirX hack in 2024 and the $1.4 billion Bybit heist in 2025.

Monahan’s comments came just hours after the Drift Protocol said it had “medium-high confidence” that the recent $280 million exploit against it was carried out by a North Korean state-affiliated group.

DeFi execs speak up on DPRK infiltration attempts

Tim Ahhl, founder of the Titan Exchange, a Solana-based DEX aggregator, said that in a previous job, “we interviewed someone who turned out to be a Lazarus operative.”

Advertisement

Ahhl said the candidate “did video calls and was extremely qualified.” He declined an in-person interview and they later discovered his name in a Lazarus “info dump.” 

The US Office of Foreign Assets Control has a website where crypto businesses can screen counterparties against updated OFAC sanctions lists and be alert to patterns consistent with IT worker fraud. 

Lazarus Group attack timeline. Source: R3ACH Network

Related: Drift Protocol says $280M exploit took ‘months of deliberate preparation’

Drift Protocol targeted by DPRK third-party intermediaries 

Drift Protocol’s postmortem on last week’s $280 million exploit also pointed to North Korean-affiliated hackers for the attack.

However, it said the face-to-face meetings that eventually led to the exploit were not with North Korean nationals, but rather “third-party intermediaries” with “fully constructed identities including employment histories, public-facing credentials, and professional networks.”

Advertisement

“Years later, and it seems Lazarus now has non-NKs [North Koreans] working for them to con people in person,” said Ahhl. 

Threats via job interviews are not sophisticated

Lazarus Group is the collective name for “all DPRK state-sponsored cyber actors,” explained blockchain sleuth ZachXBT on Sunday.

“The main issue is that everyone groups them all together when the complexity of threats is different,” he added. 

ZachXBT said that threats via job postings, LinkedIn, email, Zoom, or interviews are “basic and in no way sophisticated … the only thing about it is they’re relentless.”

Advertisement

“If you or your team still falls for them in 2026, you’re very likely negligent,” he said. 

There are two types of attack vectors, one more sophisticated than the other. Source: ZachXBT

Magazine: No more 85% Bitcoin collapses, Taiwan needs BTC war reserve: Hodler’s Digest