Image default
AltcoinBlockchainCryptocurrenciesCryptoNewsDeFiFeatured

Audit warned before Nemo Protocol’s $2.59M hack; team admits failure to act

Nemo Protocol suffers $2.59M exploit after unaddressed audit warning

Nemo Protocol lost approximately $2.59 million in an exploit that took advantage of a vulnerability flagged weeks earlier by auditors. The team has acknowledged it failed to act on the warning promptly, and has since paused core protocol functions to prevent further losses. A technical fix and user compensation plan are now underway.

Timeline and detection

Auditing firm Asymptotic identified a critical issue (labeled C-2) on August 11th related to the pyindexstored index—a flaw that impacted interest and conversion calculations. Despite the warning, the vulnerability remained unpatched. The exploit occurred on September 7th around 16:00 UTC, with attackers quickly bridging stolen funds to Ethereum via Wormhole’s CCTP bridge.

Exploit method and vectors

The attackers used flash loans combined with a vulnerable function, getsyamountinforexactpy_out, which bypassed safety checks. This allowed them to manipulate the flawed index logic, drain pools, and withdraw illicit gains. The incident highlights how unaddressed bugs in composable DeFi systems can be exploited at scale.

Impact and community reaction

The attack resulted in $2.59 million in losses and triggered a sharp decline in Total Value Locked (TVL) from $6.3 million to $1.63 million. The community expressed frustration over the delayed response and called for greater transparency, improved accountability, and more rigorous audit follow-ups.

Response, recovery plan and mitigation

Nemo has taken several steps in response:

  • Paused vulnerable operations

  • Deployed a patch removing the flash loan exploit vector

  • Engaged Asymptotic to re-audit the fix

  • Shared attacker addresses with exchanges and blockchain tracing firms

  • Begun designing a compensation plan for affected users

The team has publicly acknowledged its failure to prioritize the audit warning—a misstep that underscores the need for stronger security practices and faster response protocols in DeFi.

Related posts

Grayscale Responds to Scaramucci by Introducing a New Bitcoin ETF

Guido Battigelli

JPMorgan and Apollo Prepare to Tokenize Assets on a Large Scale

Guido Battigelli

Bunni DEX halts contracts after exploit that drained USD 8.4 million across multiple chains

Emily Carter

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More

Please enter CoinGecko Free Api Key to get this plugin works.