On December 2022, – JAY suffered a reentrancy — the first of 51 documented reentrancy incidents in our archive where the loss figure was not publicly disclosed but the exploit pattern is documented below.
Attack Mechanics: How the – JAY Reentrancy Played Out
Exploit Class Applied to – JAY
The – JAY incident on December 29, 2022 is classified as a Reentrancy. A malicious contract re-enters a vulnerable function before state is updated, letting it drain funds multiple times. In the full archive, – JAY is 1 of 51 documented reentrancy incidents.
– JAY in Context
The – JAY incident joins a class whose largest loss to date is Curve (2023) at $41M.
Prior Reentrancy Before – JAY
The nearest reentrancy incident before – JAY was – Defrost, 6 days earlier on December 23, 2022 ($170K lost). The same exploit class surfaced again within the reentrancy attack surface.
– JAY Vulnerability Signature
The primary source categorises the – JAY exploit specifically as “Insufficient validation + Reentrancy”. This narrower label is entity-specific: it reflects how the – JAY contract failed, rather than the broad reentrancy pattern alone.
Impact & Recovery for – JAY
– JAY Loss Figure
The loss figure for – JAY is not publicly disclosed. The primary source reports the exploit in non-USD terms, so no USD estimate is published here. For reference, the average loss across 51 reentrancy incidents in our archive is $2.87M.
Timeline Since the – JAY Incident
The – JAY exploit occurred 3.3 years ago (1,202 days). The contract, its fork-block, and the attack transaction remain on-chain and forensically reproducible.
Primary Reference for – JAY
Public post-mortem / on-chain analysis for the – JAY incident: view source.
FAQ
How much did – JAY lose?
The – JAY loss figure is not publicly disclosed. The primary source reports the exploit in non-USD token terms, so no USD estimate is published here.
When did the – JAY hack happen?
The – JAY exploit was recorded on December 29, 2022 — 1,202 days ago.
What type of exploit hit – JAY?
The – JAY incident is classified as a Reentrancy. A malicious contract re-enters a vulnerable function before state is updated, letting it drain funds multiple times.
How common is the Reentrancy pattern seen at – JAY?
Our archive contains 51 documented reentrancy incidents. The – JAY incident is one of them.
How does – JAY compare to the largest Reentrancy attack?
The largest reentrancy incident in our archive is Curve (2023) at $41M. The – JAY loss was not publicly disclosed.
How does the proposed protocol improve upon existing cross-chain solutions?
By achieving secret transmission channels between multiple parties and supporting offline tolerance.
What role do smart contracts play in blockchain applications?
Smart contracts automate commercial agreements and transactions without the need for intermediaries, enhancing efficiency and reliability.