PECO Liquidity Pool Exploit

James Wang
Amun
Published in
2 min readOct 31, 2021

TLDR

  • On October 30th, there was an exploit on the Wrapped PECO–ETH liquidity pool on SushiSwap.
  • PECO holders were not affected by this attack. All PECO held by customers is safe.
  • A total of 30.5 ETH was drained from the liquidity pool. The liquidity pool was seeded wholly by Amun. Only Amun company funds were lost.
  • We have identified and fixed the vulnerability, and the updated contract has been deployed.
  • We have re-seeded the Wrapped PECO–ETH liquidity pool to facilitate trading.
  • The exploit only affected the Wrapped PECO–ETH pool on Ethereum. The PECO–MATIC pool on Polygon was not affected.

What happened?

At 4:54 PM UTC on October 30th there was a liquidity exploit on our ETH — PECO pool on SushiSwap that allowed the exploiter to drain 73.2 ETH out of the pool. No funds in PECO were compromised. The exploiter returned 42.9 ETH to Amun’s deployer contract and leveraged Tornado Cash to walk away with the other 30.5 ETH. The vulnerability which allowed for the exploit was resolved by our team within five hours and the pool has been replenished with new liquidity. Since Amun was the sole liquidity provider, there is no monetary impact on the PECO holders.

What made this possible?

This exploit was made possible by the Burn function in the Wrapped PECO contract being left unprotected (see offending function here). Because of this, the exploiter was able to burn all the tokens in the Sushi Pool which allowed for the successful exploit. The Amun team has updated the contract to prevent this same exploit from occurring again.

Follow Up

We are conducting a comprehensive security review to ensure that there are no other vulnerabilities. For any questions or support, please reach out to us on Telegram or Discord. If you have any information on this exploit or feedback, please let us know.

Important Links

Contract Address
0x566e1f69cb0692901ddab39867347ff3aa01120e

Contract Creation Transaction
https://etherscan.io/tx/0x0ab05c290ef677ee24e519e9a6e896441cd0aff45ddce698cd274982616e75e6

Exploit Transaction
https://etherscan.io/tx/0x4cb2bc4350e8799e9931e2703af2e89758798c26e54652c555df6022750fce27

Contract Self Destruct
https://etherscan.io/tx/0x095d9954146c5d060a666cc91a15392580a7de6f7715c1477d810ee4a047bcfb

Destination Address of the exploited ETH
0x1c5761a7b9170c42af726902b378fe897fe08ad3

Funds returned to the deployer address
https://etherscan.io/tx/0xe666860d173af649fa8a66515451352d51de9950b060322262aa181c183dabee

Funds sent to another address that later sent to Tornado Cash
https://etherscan.io/tx/0x2e20819438d1ee519e3e67cbb1ade7e2083bb022bbcda8d626b9c420cb9f9b99

PECO is minted to replace the tokens that were burned
https://etherscan.io/tx/0x6d91768337bc60e45d5c320d0f18f7830f6be7384a93018aa7e107a0d06aa8bb

--

--