news

ZetaChain Ignored Bug Report Before $334K Exploit, Post-Mortem Reveals Missed Warning

Nidhi Saini
Published: April 29, 2026
(Updated: April 30, 2026)
4 min read
ZetaChain Ignored Bug Report Before $334K Exploit, Post-Mortem Reveals Missed Warning

STAY UPDATED WITH COTI

Follow COTI across social media platforms to get the latest news, updates and community discussions.

Make us preferred on Google

Summary:

  • ZetaChain's $334,000 exploit was linked to a vulnerability previously reported through its bug bounty program.
  • The issue was initially dismissed as intended behavior. 
  • The attacker combined multiple small design flaws to execute the exploit
  • No user funds were affected, as only protocol-controlled wallets were impacted.
  • The incident has triggered a review of ZetaChain's bug bounty and security processes.

The recent exploit on ZetaChain has brought an uncomfortable detail into focus. The vulnerability behind the attack wasn't unknown. It had already been reported through the project's bug bounty program - and then dismissed. In its official post-mortem, the team acknowledged that the report existed but was treated as expected behavior at the time. That decision is now under review, especially as the exploit showed how seemingly harmless issues can combine into something much bigger. The attack itself resulted in around $334,000 being drained from protocol-controlled wallets. It didn't hit user funds, but the sequence of events still raised questions about internal review processes and the risk is evaluated in complex systems. Community reactions came quickly. One user summarized the frustration in a widely shared post:

"This bug was reported and they simply ignored it, That's how bug bounty programs work with these protocols currently; they incentivize losses for the protocol, the TVL, and the user's balance instead of paying the researcher for discovering and fixing the bug,"  one user wrote on X

It's a sharp criticism, but it reflects a broader concern. Bug bounty programs are supposed to surface risks early. When those signals are missed, the consequences can play out later in ways that are harder to control.

How Small Flaws Turned Into a Full Exploit

According to the post-mortem, the gateway contract allowed anyone to send cross-chain instructions without strict limitations. On the receiving side, the system was designed to execute a wide range of commands across contracts, with only a narrow blocklist in place. That blocklist missed some basic token transfer functions. So while certain actions were restricted, others slipped through. The third piece came from wallet permissions. Some wallets that had interacted with the gateway in the past still had unlimited token approvals active. These permissions weren't revoked, creating an opening.

Put together, the attacker didn't need to break the system in a traditional sense. They simply used it as designed, chaining these behaviors together. By instructing the gateway to move tokens from those wallets, the system followed through. ZetaChain later confirmed the broader context of the attack in a public update:

"On Apr 27, ZetaChain experienced a targeted exploit involving deliberate preparation, including Tornado Cash funding and wallet address spoofing. Cross-chain ZETA transfers were not affected. No user funds were affected - all impacted wallets were ZetaChain-controlled." Source  

The mention of preparation is key and this wasn't a random attempt. It was structured, deliberate, and built on understanding how different parts of the system interacted.

READ MORE: Tether Freezes $344M USDT at US Authorities' Request, Sparking Debate Over Stablecoin Control

The Role of AI in Modern Exploits

At the same time, the broader landscape is shifting in ways that add pressure to these systems. Research from Andreessen Horowitz highlights how attack development itself is evolving. In a recent study, researchers tested whether an AI agent could move beyond identifying vulnerabilities and actually execute exploits. Using a controlled dataset of past Ethereum incidents, the agent initially succeeded only 10% of the time. But when given structured knowledge about common exploit patterns, that success rate jumped to 70%. It suggests that as tools improve, attackers may need less time and expertise to identify and combine weaknesses. In that context, overlooking a bug bounty report carries more risk than before. The window between discovery and exploitation is getting shorter.

Closing Thoughts 

For ZetaChain, the immediate damage was limited. No user funds were affected, and the exploit was contained to protocol-controlled wallets. But the incident still leaves a mark. It highlights how security is not just about code, but about process. How reports are evaluated, how risks are interpreted, and how assumptions are tested all play a role. The team's decision to revisit its bug bounty framework is a necessary step. Whether that leads to deeper structural changes will matter more over time. For now, this incident stands as a reminder. Not every warning looks urgent at first glance. But in the right conditions, even small signals can point to something much larger.

READ MORE: Arbitrum Freezes 30,766 ETH worth of $71M Linked to Kelp Hack

About the Project


About the Author

Nidhi Saini

Nidhi Saini

Nidhi Saini is a writer and co-founder of CotiNews, with over four years of experience working in Web3 marketing. She brings a practitioner’s perspective to her writing, shaped by years spent understanding how blockchain products are positioned, communicated, and adopted. As a co-founder, she is also involved in shaping the platform’s editorial direction, ensuring the publication stays thoughtful, credible, and grounded.

Disclaimer

The views and opinions expressed in this article are those of the authors and do not necessarily reflect the official stance of CotiNews or the COTI ecosystem. All content published on CotiNews is for informational and educational purposes only and should not be construed as financial, investment, legal, or technological advice. CotiNews is an independent publication and is not affiliated with coti.io, coti.foundation or its team. While we strive for accuracy, we do not guarantee the completeness or reliability of the information presented. Readers are strongly encouraged to do their own research (DYOR) before making any decisions based on the content provided. For corrections, feedback, or content takedown requests, please reach out to us at

contact@coti.news

Stay Ahead of the Chain

Subscribe to the CotiNews newsletter for weekly updates on COTI V2, ecosystem developments, builder insights, and deep dives into privacy tech and industry.
No spam. Just the alpha straight to your inbox.

We care about the protection of your data. Read our Privacy Policy.