Matcha Meta Hit by $16.8M SwapNet Smart Contract Hack

CryptoBreaking

Introduction On Sunday, Matcha Meta disclosed that a security breach linked to one of its main liquidity providers, SwapNet, compromised users who had granted approvals to SwapNet’s router contract. The incident underscores how permissioned components within decentralized exchange ecosystems can become attack vectors even when the core infrastructure remains intact. Early public assessments place the losses in the range of roughly $13 million to $17 million, with the on-chain activity centering on the Base network and cross-chain movements toward Ethereum. The disclosure prompted prompts for users to revoke approvals and heightened scrutiny of how smart contracts exposed to external routers are safeguarded.

Key Takeaways

The breach originated through SwapNet’s router contract, prompting an urgent call for users to revoke approvals to prevent further losses.

Estimates of the stolen funds vary: CertiK reported about $13.3 million, while PeckShield tallies at least $16.8 million on the Base network.

On Base, the attacker swapped roughly 10.5 million USDC for about 3,655 ETH and began bridging funds to Ethereum.

CertiK attributed the vulnerability to an arbitrary call in the 0xswapnet contract, which allowed the attacker to transfer funds already approved to it.

Matcha Meta indicated the exposure was tied to SwapNet rather than its own infrastructure, and officials have not yet provided details on compensation or safeguards.

Smart-contract weaknesses continue to be the dominant driver of crypto exploits, accounting for 30.5% of incidents in 2025, per SlowMist’s annual security report.

Tickers Mentioned

Tickers mentioned: Crypto → USDC, ETH, TRU

Sentiment

Sentiment: Neutral

Price Impact

Price impact: Negative. The breach highlights ongoing security risks in DeFi and can influence risk sentiment around responsible liquidity provision and approval management.

Trading idea (Not Financial Advice)

Trading idea (Not Financial Advice): Hold. The incident is specific to a router-approval pathway and does not directly imply broader systemic risk to all DeFi protocols, but it warrants caution around approval management and cross-chain liquidity.

Market context

Market context: The event arrives amid heightened attention to DeFi security and cross-chain activity, where liquidity providers and aggregators increasingly rely on modular components. It also sits against a backdrop of evolving discussions about on-chain governance, audits, and the need for robust safeguards as blue-chip protocols and new entrants compete for user trust.

Why it matters

Why it matters

Security incidents at DeFi aggregators illustrate the persistent risk surfaces present when multiple protocol layers interact. In this case, the breach was attributed to a vulnerability in SwapNet’s router contract rather than Matcha Meta’s core architecture, underscoring how trust is distributed across partner components in a composable ecosystem. For users, the episode serves as a reminder to review and revoke token approvals regularly, especially after suspicions of abnormal on-chain activity.

The financial impact, while still evolving, reinforces the importance of rigorous vetting of external liquidity providers and the need for real-time monitoring of approval flows. The fact that attackers were able to convert a substantial portion of the stolen funds into stablecoins and then bridge assets to Ethereum highlights the cross-chain dynamics that complicate post-incident traceability and restitution efforts. Exchanges and security researchers stress the value of granular, time-bound permission scopes and early revocation capabilities to limit the blast radius of such exploits.

From a market perspective, the episode adds to a broader narrative about the fragility of permissionless finance and the ongoing race to implement robust, auditable safeguards across layers of DeFi ecosystems. While not a systemic indictment of Matcha Meta, the incident intensifies calls for standardized security audits of router contracts and clearer accountability for third-party modules that interact with user funds.

What to watch next

What to watch next

Matcha Meta’s official updates on the root cause and any remediation or compensation plans for affected users.

Any external audits or third-party reviews of SwapNet’s router contract and governance changes to prevent reoccurrence.

On-chain monitoring of the Base-to-Ethereum bridge activity related to this incident and subsequent fund movements.

Regulatory and industry-standard developments around DeFi security, particularly smart-contract auditing frameworks and user-approval controls.

Sources & verification

Matcha Meta’s post on X warning users to revoke SwapNet approvals after the breach.

CertiK advisory identifying the exploit as stemming from an arbitrary call in the 0xswapnet contract that allowed transfer of approved funds.

PeckShield’s update noting approximately $16.8 million drained on Base, including the swap of USDC for ETH and bridging to Ethereum.

SlowMist’s 2025 Blockchain Security and AML Annual Report detailing the share of incidents by category, including 30.5% attributed to smart-contract vulnerabilities and 24% to account compromises.

Cointelegraph coverage of the Truebit incident, including a $26 million loss and the TRU token’s decline, for broader context on smart-contract risk exposure.

Rewritten article body

Security breach at Matcha Meta underscores smart-contract risks in DEX ecosystems

In the latest example of how DeFi can be compromised from within, Matcha Meta disclosed that a security breach occurred through one of its primary liquidity-provision pathways—SwapNet’s router contract. The user-facing consequence is the revocation of token approvals, which the protocol explicitly urged in its public post. The breach did not appear to originate from Matcha Meta’s core infrastructure, the company indicated, but rather from a vulnerability in a partner’s router layer that granted permissions to move funds on users’ behalf.

Early estimates from security researchers put the financial impact in a tight band. CertiK quantified the losses at about $13.3 million, while PeckShield reported a higher, minimum figure of $16.8 million on the Base network. The discrepancy reflects different on-chain accounting methods and timing of post-incident reviews, but both analyses confirm a meaningful loss tied to SwapNet’s router functionality. On Base, the attacker reportedly swapped approximately 10.5 million USDC (CRYPTO: USDC) for roughly 3,655 ETH (CRYPTO: ETH) and began bridging the proceeds toward Ethereum, according to PeckShield’s bulletin posted to X.

So far, ~$16.8M worth of crypto has been drained. On Base, the attacker swapped ~10.5M USDC for ~3,655 ETH and has begun bridging funds to Ethereum.

CertiK’s assessment provides a technical explanation for the exploit: an arbitrary call in the 0xswapnet contract enabled the attacker to pull funds that users had already approved, effectively bypassing a direct theft from SwapNet’s liquidity pool and instead leveraging the permissions granted to the router. This distinction matters because it points to a governance or design flaw at the integration layer rather than a breach of Matcha Meta’s own custody or security controls.

Matcha Meta acknowledged the exposure is linked to SwapNet and did not attribute the vulnerability to its own infrastructure. Attempts to secure comment on compensation mechanisms or safeguards were not immediately returned, leaving affected users without a clear remediation path in the near term. The incident illustrates a broader risk profile for DEX aggregators: when partnerships introduce new contract interfaces, attackers may target permissioned flows that sit at the intersection of user approvals and automated fund transfers.

The broader security landscape in crypto remains stubbornly precarious. In 2025, smart-contract vulnerabilities were the leading cause of crypto exploits, accounting for 30.5% of incidents and 56 total events, according to SlowMist’s annual report. This share highlights how even sophisticated projects can be tripped up by edge-case bugs or misconfigurations in code that governs automatic value transfer. Account compromises and compromised social accounts (such as victims’ X handles) also represented a sizable portion of incidents, underscoring the multi-vector nature of attackers’ toolkit.

Beyond the purely technical angles, the incident feeds into a growing discourse around the use of artificial intelligence in smart-contract security. DECEMBER reports noted that commercially available AI agents uncovered roughly $4.6 million worth of on-chain exploits in real-time, leveraging tools such as Claude Opus 4.5, Claude Sonnet 4.5, and OpenAI’s GPT-5. The emergence of AI-enabled probing and exploitation techniques adds a layer of complexity to risk assessment for auditors and operators alike. This evolving threat landscape reinforces the need for continuous monitoring, rapid revocation of permissions, and adaptable defensive measures in DeFi ecosystems.

Two weeks prior to the SwapNet incident, another high-profile smart-contract vulnerability resulted in $26 million in losses for the Truebit protocol, followed by a steep price reaction in the TRU token (CRYPTO: TRU). Such episodes underscore the fact that the smart-contract layer remains a prime attack surface for hackers, even as other domains within the crypto sphere—custody, centralized infrastructure, and off-chain components—also face persistent threats. The recurring theme is that risk management must extend beyond audits and bug bounties to include live governance, real-time monitoring, and prudent user practices around approvals and cross-chain movements.

As the market digests the implications, observers emphasize that the path to resilience in DeFi relies on layered safeguards and transparent incident response. While SwapNet’s vulnerability appears isolated to a particular integration, the incident reinforces a central lesson: even trusted partners can introduce systemic risk if their contracts interact with user funds in ways that bypass standard safeguards. The on-chain record will continue to unfold as investigators, Matcha Meta, and its liquidity partners conduct forensic reviews and determine whether victims will receive compensation or enhancements to risk controls that can prevent similar incidents in the future.

This article was originally published as Matcha Meta Hit by $16.8M SwapNet Smart Contract Hack on Crypto Breaking News – your trusted source for crypto news, Bitcoin news, and blockchain updates.

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Related Articles

Russia bans Telegram from "sending files and videos"! Calls for eliminating anonymity, TON ecosystem faces a test

Russia's communications regulator Roskomnadzor has implemented speed restrictions on Telegram since February 10, and has received over 13,000 user complaints about service disruptions. Although a complete ban is not currently planned, if Telegram fails to comply with legal requirements, it could impact its user experience in Russia and subsequently affect the TON blockchain ecosystem closely linked to it.

動區BlockTempo3h ago

SBF Denies FTX Bankruptcy in Prison, Reveals Truth, and $8 Billion Funding Gap Sparks New Crypto Controversy

On February 10th, Sam Bankman-Fried, who has been sentenced to 25 years in prison on multiple charges of fraud and conspiracy, spoke out again through his verified X account, claiming "FTX has never gone bankrupt," and accused the company's lawyers of submitting a "false bankruptcy petition." This statement starkly contrasts with the U.S. court rulings, regulatory documents, and financial audit results, and has quickly attracted attention within the crypto community. According to judicial records, SBF was involved in embezzling over $8 billion of customer assets, leading the platform to become insolvent by the end of 2022. The massive losses of his affiliated trading firm Alameda Research were the direct cause of the collapse. Although subsequent asset recoveries and market rebounds have improved creditor expectations in some cases, prosecutors and judges both emphasized that this does not change the established facts of fraud.

GateNewsBot5h ago

South Korea Turns to AI to Detect Crypto Manipulation in 2026

_South Korea deploys AI to detect crypto manipulation in real-time, analyzing trades by the second._ _FSS targets whale schemes, pump-and-dumps, and social media fraud with automated detection tools._ _New Digital Asset Basic Act brings licensing rules for exchanges, operators, and

LiveBTCNews02-09 12:16

Facing Aave liquidation risk! World Liberty Financial is urgently selling off Bitcoin to rescue the situation and prevent further losses.

Amidst the intense volatility in the cryptocurrency market, DeFi protocol World Liberty Financial (WLFI), supported by the family of U.S. President Donald Trump, has unexpectedly come under pressure due to liquidation risks faced by lending platforms. The protocol was forced to sell Bitcoin to repay debts, drawing significant market attention. According to on-chain data platform Arkham Intelligence, the official wallet of World Liberty Financial sold over 170 Bitcoins on Wednesday at an approximate price of $67,000 each, cashing out about $11 million. The funds were immediately transferred to leading lending protocol Aave to repay loans and avoid liquidation. Alongside the forced sale of assets to cover debts, WLFI tokens have also continued to experience downward pressure.

区块客02-09 09:44

Bithumb mistakenly sent 40 billion USD worth of Bitcoin! The accounts were frozen for 35 minutes, during which 99% of the funds were recovered.

Bithumb mistakenly sent 620,000 BTC (worth $40 billion) to 695 users on February 6 (intended to send 2,000 KRW). The team discovered the error within 20 minutes and froze the accounts within 35 minutes. This incident triggered a flash crash in Bitcoin to $55,000. The team ultimately recovered 99.7% of the funds. Online users received 20,000 KRW and 7 days of zero trading fees.

MarketWhisper02-09 01:43

Facing Aave liquidation risk! World Liberty Financial is urgently selling off Bitcoin to rescue the situation and prevent further losses.

Amidst the intense volatility in the cryptocurrency market, DeFi protocol World Liberty Financial (WLFI), supported by the family of U.S. President Donald Trump, has unexpectedly come under pressure due to liquidation risks faced by lending platforms. The protocol was forced to sell Bitcoin to repay debts, drawing significant market attention. According to on-chain data platform Arkham Intelligence, the official wallet of World Liberty Financial sold over 170 Bitcoins on Wednesday at an approximate price of $67,000 each, cashing out about $11 million. The funds were immediately transferred to leading lending protocol Aave to repay loans and avoid liquidation. Alongside the forced sale of assets to cover debts, WLFI tokens have also continued to experience downward pressure.

区块客02-08 09:39
Comment
0/400
No comments
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate App
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)