shield Reentrancy

– JAY Exploit: Reentrancy Incident Explained (2022)

On December 2022, – JAY suffered a reentrancy — the first of 51 documented reentrancy incidents in our archive where the loss figure was not publicly disclosed but the exploit pattern is documented below.

Attack Mechanics: How the – JAY Reentrancy Played Out

Exploit Class Applied to – JAY

The – JAY incident on December 29, 2022 is classified as a Reentrancy. A malicious contract re-enters a vulnerable function before state is updated, letting it drain funds multiple times. In the full archive, – JAY is 1 of 51 documented reentrancy incidents.

– JAY in Context

The – JAY incident joins a class whose largest loss to date is Curve (2023) at $41M.

Prior Reentrancy Before – JAY

The nearest reentrancy incident before – JAY was – Defrost, 6 days earlier on December 23, 2022 ($170K lost). The same exploit class surfaced again within the reentrancy attack surface.

– JAY Vulnerability Signature

The primary source categorises the – JAY exploit specifically as “Insufficient validation + Reentrancy”. This narrower label is entity-specific: it reflects how the – JAY contract failed, rather than the broad reentrancy pattern alone.

Impact & Recovery for – JAY

– JAY Loss Figure

The loss figure for – JAY is not publicly disclosed. The primary source reports the exploit in non-USD terms, so no USD estimate is published here. For reference, the average loss across 51 reentrancy incidents in our archive is $2.87M.

Timeline Since the – JAY Incident

The – JAY exploit occurred 3.3 years ago (1,202 days). The contract, its fork-block, and the attack transaction remain on-chain and forensically reproducible.

Primary Reference for – JAY

Public post-mortem / on-chain analysis for the – JAY incident: view source.

FAQ

How much did – JAY lose?

The – JAY loss figure is not publicly disclosed. The primary source reports the exploit in non-USD token terms, so no USD estimate is published here.

When did the – JAY hack happen?

The – JAY exploit was recorded on December 29, 2022 — 1,202 days ago.

What type of exploit hit – JAY?

The – JAY incident is classified as a Reentrancy. A malicious contract re-enters a vulnerable function before state is updated, letting it drain funds multiple times.

How common is the Reentrancy pattern seen at – JAY?

Our archive contains 51 documented reentrancy incidents. The – JAY incident is one of them.

How does – JAY compare to the largest Reentrancy attack?

The largest reentrancy incident in our archive is Curve (2023) at $41M. The – JAY loss was not publicly disclosed.

How does the proposed protocol improve upon existing cross-chain solutions?

By achieving secret transmission channels between multiple parties and supporting offline tolerance.

What role do smart contracts play in blockchain applications?

Smart contracts automate commercial agreements and transactions without the need for intermediaries, enhancing efficiency and reliability.