Nemo Protocol says unaudited code deployment led to $2.6 million exploit

Partner offers
The Block may may earn a commission if you use our partner offers, at no extra cost to you.

Quick Take

  • Nemo Protocol said it found two vulnerabilities that were deployed into the codebase without audits by a developer.
  • The team is collaborating with security teams on Sui to trace the funds and is developing a compensation plan for affected users.

Sui-based DeFi platform Nemo Protocol said its $2.6 million exploit earlier this month resulted from two vulnerabilities that were introduced into the code by a developer and deployed without proper audits.

In a post-mortem report published late Wednesday night, Nemo explained that the Sept. 7 attack was caused by two issues: an internal flash loan function that was mistakenly exposed to the public, and a flaw in a query function that allowed unauthorized state changes within the contract.

According to the report, the vulnerabilities date back to January of this year. After receiving the initial audit report from blockchain security firm MoveBit, one Nemo developer introduced these new, unaudited features into the codebase. The version of the contract containing this code was then deployed to the mainnet. 

"The governance root cause was the protocol's reliance on a single-signature address for upgrades, which failed to prevent the deployment of code that had not undergone rigorous scrutiny," the report said, adding that the team failed to act on a warning from the Asymptotic security team in August regarding a separate but related vulnerability.

The attacker used the combination of the flash loan and the state-modifying query function to manipulate the internal state of the contract, draining "substantial" assets from the SY/PT liquidity pool. The stolen funds were moved from the Sui network to Ethereum via Wormhole CCTP, with the majority of the assets currently remaining in a single address.

Nemo Protocol said it has since paused its core functions, patched the vulnerabilities, and submitted the updated code for an emergency audit. The team is collaborating with security teams on Sui to trace the funds and is developing a compensation plan for affected users. 

"Despite multiple audits and safeguards, we acknowledge that we allowed ourselves to rely too heavily on past assurances, rather than maintaining uncompromising scrutiny at every step," Nemo said in the report.

Nemo Protocol is a yield infrastructure and native yield-trading platform built on Sui, designed to improve DeFi interactions. It focuses on yield tokenization, enabling users to trade, hedge, or leverage yields more efficiently.


Disclaimer: The Block is an independent media outlet that delivers news, research, and data. As of November 2023, Foresight Ventures is a majority investor of The Block. Foresight Ventures invests in other companies in the crypto space. Crypto exchange Bitget is an anchor LP for Foresight Ventures. The Block continues to operate independently to deliver objective, impactful, and timely information about the crypto industry. Here are our current financial disclosures.

© 2025 The Block. All Rights Reserved. This article is provided for informational purposes only. It is not offered or intended to be used as legal, tax, investment, financial, or other advice.

AUTHOR

Danny Park is an East Asia reporter at The Block writing on topics including Web3 developments and crypto regulations in the region. He was formerly a reporter at Forkast.News, where he actively covered the downfall of Terra-Luna and FTX. Based in Seoul, Danny has previously produced written and video content for media companies in Korea, Hong Kong and China. He holds a Bachelor of Journalism and Business Marketing from the University of Hong Kong.

See More
Connect on

Editor

To contact the editor of this story: Timmy Shen at [email protected]

WHO WE ARE

The Block is a news provider that strives to be the first and final word on digital assets news, research, and data.

+ Follow us on Google News
Connect with the block on