Web3 security company GoPlus Security reported that the newly launched cross-layer protocol x402bridge suffered a security vulnerability, resulting in over 200 users losing USDC, totaling approximately $17,693. On-chain detective and security company SlowMist have confirmed that the vulnerability is most likely due to the leakage of the administrator's private key, which allowed attackers to gain special management permissions of the contract. GoPlus Security urgently advises all users with wallets on this protocol to revoke ongoing authorizations as soon as possible and reminds users to never grant unlimited authorization to contracts. This incident exposed the potential security risk of private key storage on servers in the x402 mechanism, which could lead to the leakage of administrator permissions.
New Protocol x402bridge Attacked: Excessive Authorization Exposes Private Key Security Risks
The x402bridge protocol encountered a security attack a few days after its launch on-chain, resulting in user fund losses. The mechanism of the protocol requires users to obtain authorization from the Owner contract before minting USDC. In this incident, it was this excessive authorization that led to the transfer of the remaining stablecoins of over 200 users.
Attackers exploit leaked Private Key to steal user USDC
According to observations by GoPlus Security, the attack process clearly points to privilege abuse:
- Permission Transfer: The creator address (0xed1A starting with ) has transferred ownership to the address 0x2b8F, granting the latter special management permissions held by the x402bridge team, including the ability to modify critical settings and transfer assets.
- Execute malicious functions: After gaining control, the new owner address immediately executed a function called “transferUserToken”, allowing that address to withdraw the remaining USD Coins from all wallets previously authorized to the contract.
- Loss and transfer of funds: Address 0x2b8F has stolen a total of approximately 17,693 USD worth of USDC from users, then exchanged the stolen funds for Ethereum and transferred them to the Arbitrum network through multiple cross-chain transactions.
Root Cause of the Vulnerability: Private Key Storage Risks in the x402 Mechanism
The x402bridge team has responded to this vulnerability incident, confirming that the attack was caused by a Private Key leak, which led to the theft of several teams' tests and major Wallets. The project has suspended all activities and closed the website, and has reported to law enforcement.
- Authorization process risk: The protocol previously explained the workings of its x402 mechanism: users sign or approve transactions through a web interface, and the authorization information is sent to the backend server, which then withdraws funds and mints tokens.
- Private Key Exposure Risk: The team admits, “When we go live on x402scan.com, we need to store the private key on the server to call contract methods.” This step may lead to the exposure of the administrator's private key during the phase of connecting to the internet, potentially resulting in permission leakage. Once the private key is stolen, hackers can take over all administrator privileges and redistribute user funds.
A few days before this attack occurred, the usage of x402 transactions saw a surge. On October 27, the market capitalization of the x402 token surpassed $800 million for the first time, and the trading volume of the x402 protocol on mainstream CEX reached 500,000 transactions in a week, a month-on-month increase of 10,780%.
Security Advice: GoPlus urges users to revoke authorization immediately.
Given the seriousness of this leak, GoPlus Security urgently advises users with wallets on this protocol to immediately revoke any ongoing authorizations. The security company also reminds all users:
- Verify the address: Before approving any transfers, check that the authorized address is the official address of the project.
- Limit the authorized amount: Only authorize the necessary amount, and do not grant unlimited authorization to the contract.
- Regular checks: Regularly check and revoke unnecessary authorizations.
Conclusion
The incident of x402bridge suffering a Private Key leak attack has once again sounded the alarm in the Web3 space regarding the risks posed by centralized components (such as servers storing Private Keys). Although the x402 protocol aims to utilize the HTTP 402 Payment Required status code to enable instant, programmable stablecoin payments, the security vulnerabilities in its implementation mechanism must be addressed immediately. For users, this attack serves as an expensive lesson, reminding us to remain vigilant and manage Wallet authorizations carefully when interacting with any blockchain protocol.
Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to
Disclaimer.
Related Articles
Circle, OSL Expand USDC Access as Asia Cross-Border Demand Grows
Institutional access to digital dollar liquidity is growing as cross-border settlement demand rises and stablecoins gain a larger role in market infrastructure. OSL Group and Circle are expanding USDC use across trading, payments, and settlement in Asia.
Key Takeaways:
OSL Group expanded USDC acc
Coinpedia2m ago
Pornhub Switches Creator Payouts from USDT to USDC for Greater Reliability
Pornhub swapped creator payouts from USDT to USDC, citing reliability and MiCA compliance; older USDT-PayPal ties and TronLink-based partnerships have been removed.
Abstract: Pornhub replaced USDT payouts with USDC for creators, arguing USDC is more reliable and MiCA-compliant. The move ends PayPal-USDT ties and TronLink-based payment infrastructure, and those partnerships were removed from the creator payment page.
GateNews1h ago
Circle Proposes Emergency Rate Overhaul for Aave's Frozen USDC Pool
Summary: Circle proposes an emergency Aave V3 USDC overhaul, lifting Slope 2 to ~40% to restore healthy utilization (target ~85%), with max rate rising to ~48%, arguing borrowers ignore rates; also suggests pausing the USDC risk oracle.
Abstract: Circle has urged an emergency overhaul of Aave V3's USDC pool after four days at near-6% idle liquidity and 99.87% utilization following the KelpDAO exploit. The plan would immediately raise Slope 2 for USDC deposits from about 10% to 40%, followed by governance ratification of a 50% target within a week. The aim is to attract supply and restore balanced utilization, with a move to a higher max supply rate (about 48%) at full utilization. Liao argues current borrowers use USDC borrowing as a queue-bypass mechanism and are insensitive to current rates, making supply-focused incentives essential. The proposal also recommends pausing the USDC Risk Oracle due to past underperformance. Circle’s stance is notable because a stablecoin issuer is essentially saying the market for its asset on Aave is broken.
CryptoFrontier4h ago
USDC Treasury Mints 200M USDC on Ethereum, Worth ~$199.9M
Summary: USDC Treasury minted 200M USDC on Ethereum at 22:00 UTC; worth about $199.9M, per Whale Alert.
Abstract: A Gate News update reports that the USDC Treasury minted 200 million USDC on the Ethereum network at 22:00 UTC, with Whale Alert corroborating the mint. The new supply is valued at roughly $199.9 million, illustrating a substantial increase in USDC issuance.
GateNews11h ago
RedotPay Integrates Sui and USDC-Sui, Expanding Payments to 100+ Countries
RedotPay now supports SUI and USDC-Sui on the Sui network, enabling faster global payments for 130M merchants and 7M customers, with scalable cross-border transactions bridging crypto and commerce.
Abstract: RedotPay has added support for SUI and USDC-Sui on the Sui network, enabling seamless payment processing and global payouts across its ecosystem. Serving more than 130 million merchants in over 100 countries and about 7 million customers, the platform aims to offer faster, more scalable cross-border payments and broader blockchain-enabled financial access. By integrating SUI and USDC-Sui, RedotPay seeks to simplify sending and receiving payments worldwide while ensuring secure, efficient transactions that bridge digital assets with real-world commerce.
GateNews17h ago
Whale Deposits $2M USDC to Hyperliquid, Buys 50,080 HYPE at $39.94 Average
Gate News message, April 22 — According to Onchain Lens, a whale deposited 2 million USDC to Hyperliquid and purchased 50,080 HYPE at an average price of $39.94 per token.
GateNews20h ago