Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Launchpad
Be early to the next big token project
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
DEX Aggregator Hit by $16.8M SwapNet Exploit After Approval Bypass
Decentralized exchange aggregator Matcha Meta has confirmed a security incident linked to its SwapNet integration, resulting in an estimated $16.8 million loss.
The breach was first flagged by blockchain security firm PeckShield, with further technical analysis later provided by CertiK.
What Went Wrong
According to findings shared by security researchers, the exploit specifically impacted users who had disabled Matcha Meta’s “One-Time Approval” feature. By opting out, those users granted persistent permissions directly to the SwapNet router contract, creating an attack surface that was later abused.
CertiK identified the root cause as an “arbitrary call” vulnerability in the SwapNet contract. This flaw allowed an attacker to initiate unauthorized transfers from wallets that had previously approved the router, effectively bypassing normal safeguards.
Fund Movement and Scope
On-chain activity shows the attacker swapped approximately $10.5 million in USDC on Base for around 3,655 ETH, before bridging the assets to Ethereum. The cross-chain movement appears designed to complicate tracking and recovery efforts.
Importantly, the incident did not affect all Matcha users. Exposure was limited to wallets that had manually disabled one-time approvals and granted direct permissions to SwapNet contracts.
Emergency Response Measures
In response to the exploit, Matcha Meta has taken several immediate steps:
(0x616000e384Ef1C2B52f5f3A88D57a3B64F23757e).
The incident highlights the security trade-offs associated with persistent contract approvals and reinforces the importance of regular permission reviews, especially when interacting with aggregators and routing contracts.