On September 2024, AIRBTC_exp was exploited in a access control, resulting in approximately $6.8K in losses. That makes the AIRBTC_exp exploit the 403rd largest DeFi incident out of 690 documented in our archive.
Attack Mechanics: How the AIRBTC_exp Access Control Played Out
Exploit Class Applied to AIRBTC_exp
The AIRBTC_exp incident on September 11, 2024 is classified as a Access Control. A privileged function lacks a proper authorisation check, letting an unauthorised caller execute it. In the full archive, AIRBTC_exp is 1 of 77 documented access control incidents.
AIRBTC_exp in Context
At $6.8K, the AIRBTC_exp exploit is a minor (<$1M) event compared to the largest same-class incident in our archive — Corkprotocol (2025) at $12M.
Prior Access Control Before AIRBTC_exp
The nearest access control incident before AIRBTC_exp was PLN, 6 days earlier on September 5, 2024 ($400K lost). The same exploit class surfaced again within the access control attack surface.
Impact & Recovery for AIRBTC_exp
AIRBTC_exp Loss Figure
The AIRBTC_exp exploit caused $6,800 in losses — a minor (<$1M) incident and the 122nd largest of 188 documented in 2024.
Where AIRBTC_exp Sits Among Access Control Attacks
Ranked by loss size, AIRBTC_exp is the 51st largest of 77 access control incidents documented. That puts the AIRBTC_exp loss below the class average of $636K.
Timeline Since the AIRBTC_exp Incident
The AIRBTC_exp exploit occurred 1.6 years ago (580 days). The contract, its fork-block, and the attack transaction remain on-chain and forensically reproducible.
Primary Reference for AIRBTC_exp
Public post-mortem / on-chain analysis for the AIRBTC_exp incident: view source.
FAQ
How much did AIRBTC_exp lose?
The AIRBTC_exp exploit in September 2024 resulted in $6,800 in losses — the 122nd largest of 188 DeFi incidents that year.
When did the AIRBTC_exp hack happen?
The AIRBTC_exp exploit was recorded on September 11, 2024 — 580 days ago.
What type of exploit hit AIRBTC_exp?
The AIRBTC_exp incident is classified as a Access Control. A privileged function lacks a proper authorisation check, letting an unauthorised caller execute it.
How common is the Access Control pattern seen at AIRBTC_exp?
Our archive contains 77 documented access control incidents. The AIRBTC_exp incident is one of them.
How does AIRBTC_exp compare to the largest Access Control attack?
The largest access control incident in our archive is Corkprotocol (2025) at $12M. The AIRBTC_exp loss is $6.8K.
How does SALRS enhance the security and privacy in blockchain systems?
By integrating with UC-secure primitives for scalable, secure transactions.
What is SALRS designed for in cryptocurrency transactions?
To conceal the identities of both the payer and payee, ensuring privacy.