Blockaid, a Web3 safety agency, recognized and alerted the neighborhood to the INK Finance safety incident
INK Finance’s Workspace Treasury Proxy contract was exploited as a consequence of a logic flaw in its authentication course of
The attacker exploited the flaw by deploying a malicious contract that mimicked a whitelisted claimer entry in INK Finance’s Workspace controller
DeFi governance infrastructure platform INK Finance has confirmed a safety incident on its Polygon deployment, with its Workspace Treasury Proxy exploited for roughly $140,000 in USDT earlier at the moment.
The breach was first surfaced by Web3 safety agency Blockaid at round 1:41 PM UTC on Could 11, 2026, in a neighborhood alert that flagged the sufferer contract, attacker handle, and the exploit transaction on Polygonscan.
The compromised contract sits at 0xa184Af4B1c01815A4B57422A3419E4FB78a96Ee4, identified on-chain as INK Finance’s Workspace Treasury Proxy. The proxy is an EIP-1967 beacon sample contract that was initially deployed in December 2023, and routes calls via a shared implementation at 0x72225ccb…7AFc89890. The treasury sat dormant till the exploit transaction landed earlier at the moment.
INK Finance has positioned itself for years as Web3’s “gold customary” for DAO monetary infrastructure, providing treasury administration, governance flows, and on-chain cost modules throughout Avalanche and Polygon. At present’s incident strikes instantly on the treasury layer that the protocol’s total pitch is constructed on.
How the exploit labored
In accordance with Blockaid’s post-incident breakdown and on-chain forensics, the attacker didn’t break cryptography or steal a key. They exploited a logic flaw in INK’s Workspace controller, particularly in how the controller authenticates accounts permitted to name its declare() perform.
The vector unfolded in three steps:
The 1st step. The attacker deployed a malicious contract at an handle that matched, or was registered as, a whitelisted claimer entry inside INK Finance’s Workspace controller. Whitelisted-claimer logic is a typical DeFi sample that permits pre-approved addresses to say or execute on behalf of customers, typically to allow atomic claim-and-stake or claim-and-forward flows.
The integrity of the sample relies upon completely on the whitelist being tightly certain to trusted entities, which, on this case, it was not.
Step two. As soon as the attacker managed an handle that handed the whitelist test, they invoked declare(claimId) on the controller. The perform ran its eligibility test, discovered the caller within the allowed set, and signaled approval downstream.
The treasury proxy’s approved switch perform trusted that approval implicitly and launched funds with out making use of any extra possession or balance-sanity gate.
Step three. To inflate the payout, the attacker pulled a roughly $25,000 flashloan from Balancer V2, used it inside the identical transaction to fulfill no matter stability situation the declare path was checking, drained roughly $140K USDT from the Workspace Treasury Proxy, and repaid the flashloan in the identical atomic name.
The flashloan piece turned a logic flaw right into a worthwhile extraction, because it let the attacker quickly seem like a a lot bigger eligible claimant than they really have been.
The malicious actor contract is logged at 0x90b147592191388e955401af43842e19faa87ee2, and the exploit transaction is publicly viewable on Polygonscan.
Funding path factors to railgun
Blockaid’s hint of the attacker’s pockets’s funding historical past reveals a textbook obfuscation chain. The pockets was funded by way of Railgun on Ethereum, the privacy-preserving smart-contract system that shields sender, receiver, and quantity metadata, earlier than the funds have been bridged over to Polygon roughly 32 minutes earlier than the exploit transaction landed.
The brief delta between bridging and exploit suggests the attacker had the contract pre-staged and was merely ready for fuel and capital to be in place.
Railgun has change into an more and more recurrent footprint in post-exploit forensic write-ups over the previous yr, in lots of instances functioning as the trendy successor to Twister Money for attackers who need privateness with out the regulatory baggage of sanctioned mixers.
What it means
The $140K determine is small in greenback phrases in comparison with the eight and nine-figure exploits which have outlined current DeFi quarters, however the class of vulnerability is the bigger story. Whitelist-gated declare capabilities, paired with proxy-based treasuries, are deployed throughout a significant slice of DAO infrastructure at the moment.
The exploit is basically a textbook case of an authorization test that confirms who is asking with out re-validating what they’re entitled to obtain, and it generalizes uncomfortably properly to different treasury controllers constructed on the identical sample.
A number of particular observations stand out for protocols operating comparable architectures:
The Workspace Treasury Proxy was an unverified contract on Polygonscan on the time of the exploit, which restricted the power of exterior auditors and white-hat researchers to identify the flaw pre-incident. The implementation it factors to has been stay since 2023 with out additional upgrades on this proxy, that means the susceptible logic has been on-chain and exploitable for an prolonged window.
The flashloan-assisted nature of the assault additionally reinforces a sample that has performed out repeatedly throughout DeFi exploits: so long as a contract’s authorization or accounting logic is delicate to caller balances or token holdings in the meanwhile of the decision, attackers will hire that stability from Balancer, Aave, or Morpho for the size of a single transaction and stroll away with the payout.
What’s subsequent
INK Finance has not, on the time of this report, posted a proper public assertion by itself channels detailing the scope, remediation timeline, or whether or not person funds past the drained Workspace are in danger. Blockaid has tagged the attacker handle and the exploit transaction publicly, which generally precedes coordinated outreach with centralized exchanges and bridges to flag the funds in the event that they try to maneuver additional.
For customers with lively INK Finance Workspaces or treasury setups on Polygon or Avalanche, the prudent stance till INK points steerage is to revoke any excellent approvals to the Workspace controller and treasury proxy contracts, audit present claimer whitelists for any unfamiliar entries, and keep away from deploying recent capital into INK-managed treasuries till a autopsy and patch are confirmed on-chain.
The Crypto Occasions will proceed to trace the incident and replace this report as INK Finance, Blockaid, and on-chain investigators publish additional findings.
Additionally Learn: 40+ DeFi Protocols Shut Down in 2026: Inside the $770M Hack Crisis Reshaping Crypto
Disclaimer: The data researched and reported by The Crypto Occasions is for informational functions solely and isn’t an alternative choice to skilled monetary recommendation. Investing in crypto belongings includes important danger as a consequence of market volatility. All the time Do Your Personal Analysis (DYOR) and seek the advice of with a certified Monetary Advisor earlier than making any funding choices.





