shield Access Control · $6.8K loss

AIRBTC_exp Access Control postmortem (September 2024) — $6.8K drained

On September 2024, AIRBTC_exp was exploited in a access control, resulting in approximately $6.8K in losses. That makes the AIRBTC_exp exploit the 403rd largest DeFi incident out of 690 documented in our archive.

Attack Mechanics: How the AIRBTC_exp Access Control Played Out

Exploit Class Applied to AIRBTC_exp

The AIRBTC_exp incident on September 11, 2024 is classified as a Access Control. A privileged function lacks a proper authorisation check, letting an unauthorised caller execute it. In the full archive, AIRBTC_exp is 1 of 77 documented access control incidents.

AIRBTC_exp in Context

At $6.8K, the AIRBTC_exp exploit is a minor (<$1M) event compared to the largest same-class incident in our archive — Corkprotocol (2025) at $12M.

Prior Access Control Before AIRBTC_exp

The nearest access control incident before AIRBTC_exp was PLN, 6 days earlier on September 5, 2024 ($400K lost). The same exploit class surfaced again within the access control attack surface.

Impact & Recovery for AIRBTC_exp

AIRBTC_exp Loss Figure

The AIRBTC_exp exploit caused $6,800 in losses — a minor (<$1M) incident and the 122nd largest of 188 documented in 2024.

Where AIRBTC_exp Sits Among Access Control Attacks

Ranked by loss size, AIRBTC_exp is the 51st largest of 77 access control incidents documented. That puts the AIRBTC_exp loss below the class average of $636K.

Timeline Since the AIRBTC_exp Incident

The AIRBTC_exp exploit occurred 1.6 years ago (580 days). The contract, its fork-block, and the attack transaction remain on-chain and forensically reproducible.

Primary Reference for AIRBTC_exp

Public post-mortem / on-chain analysis for the AIRBTC_exp incident: view source.

FAQ

How much did AIRBTC_exp lose?

The AIRBTC_exp exploit in September 2024 resulted in $6,800 in losses — the 122nd largest of 188 DeFi incidents that year.

When did the AIRBTC_exp hack happen?

The AIRBTC_exp exploit was recorded on September 11, 2024 — 580 days ago.

What type of exploit hit AIRBTC_exp?

The AIRBTC_exp incident is classified as a Access Control. A privileged function lacks a proper authorisation check, letting an unauthorised caller execute it.

How common is the Access Control pattern seen at AIRBTC_exp?

Our archive contains 77 documented access control incidents. The AIRBTC_exp incident is one of them.

How does AIRBTC_exp compare to the largest Access Control attack?

The largest access control incident in our archive is Corkprotocol (2025) at $12M. The AIRBTC_exp loss is $6.8K.

How does SALRS enhance the security and privacy in blockchain systems?

By integrating with UC-secure primitives for scalable, secure transactions.

What is SALRS designed for in cryptocurrency transactions?

To conceal the identities of both the payer and payee, ensuring privacy.